ISE® Northeast Sponsors 2016

Exabyte Sponsor

Intralinks twitter    linked in

Intralinks (NYSE: IL) is a leading secure content collaboration company that helps organizations share high-value content across teams, partners, customers and regulators. Our technology controls content in motion to speed up deals, streamline business processes, deepen customer engagement and reduce regulatory risk. Intralinks’ unmatched security and governance capabilities are fully integrated into our platform and include market-leading features such as Information Rights Management and customer-managed encryption keys. With a 20-year track record of enabling high-stakes transactions and business collaborations valued at more than $31 trillion, more than 90,000 clients at 99 percent of the Fortune 1000 companies have depended on Intralinks’ technology to get work done.



Kilobyte Sponsors

Cloud Passage twitter    linked in

Attivo Networks® is the leader in deception technology for real-time detection, analysis, and accelerated response to advanced, credential, insider, and ransomware cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform accurately detects advanced in-network threats and provides scalable continuous threat management for user networks, data centers, cloud, IoT, ICS-SCADA, and POS environments. Attivo Camouflage dynamic deception techniques and decoys set high-interaction traps to efficiently lure attackers into revealing themselves. Advanced attack analysis and lateral movement tracking are auto-correlated for evidence-based alerts, forensic reporting, and automatic blocking and quarantine of attacks.



Bay Dynamics twitter    linked in

Bay Dynamics® enables organizations to quantify the business impact of cyber risk from both insider and outsider attacks. Using UEBA technology and dynamic telemetry from security and IT infrastructure, our Risk Fabric® cyber analytics platform calculates the value at risk associated with specific threats and vulnerabilities, and prescribes prioritized actions across the organization to reduce the risks that matter most.



Cybereason twitter    linked in

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response. Its platform identifies both known and unknown attacks using big data, behavioral analytics and machine learning, revealing the complete attack story. This eliminates the need for manual investigation and radically reduces response time.



Delphix twitter    linked in

Delphix delivers agility to enterprise application and modernization projects, addressing the largest source of inefficiency and inflexibility in the datacenter—provisioning, managing, and refreshing data for business-critical applications. Leading global organizations use Delphix to dramatically reduce the time, cost, and risk of application rollouts, retirements, and migrations.



Digital Guardian twitter    linked in

Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. It’s buttressed by the DG Cloud, a big data security analytics backend that sees and blocks all threats to sensitive information. This platform is recognized as a Leader in the latest Gartner Magic Quadrant for Enterprise Data Loss Prevention.



GlobalScape twitter    linked in

Globalscape ensures the reliability of mission-critical operations by securing sensitive data. Globalscape’s suite of solutions features Enhanced File Transfer, the industry-leading enterprise file transfer platform that delivers military-grade security and a customizable solution for achieving best-in-class control and visibility of data in motion or at rest, across multiple locations.



HP twitter    linked in

About HPE Security
HPE Security helps organizations detect and respond to cyber threats while safeguarding continuity and compliance to effectively mitigate risk and incident impact. Delivering an integrated suite of market-leading products, services, threat intelligence and security research, HPE Security helps customers proactively protect the interactions among users, applications and data, regardless of location or device. With a global network of security operations centers and more than 5,000 IT security experts, HPE Security empowers customers and partners to safely operate and innovate while keeping pace with the speed of today’s idea economy. Find out more about HPE Security at https://www.hpe.com/us/en/solutions/security.

About Hewlett Packard Enterprise
Hewlett Packard Enterprise is an industry leading technology company that enables customers to go further, faster. With the industry’s most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure..


Illusive twitter    linked in

lllusive continuously discovers and automatically mitigates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organization’s endpoints and servers, then eliminate them or deploy deception-based detection techniques as a compensating control to stop attackers. Illusive has participated in over 140 red team exercises and has never lost one! Founded by nation state attackers, Illusive’s technology is trusted by large global financials, retailers, services organizations, and pharmaceuticals.



Leidos twitter    linked in

Leidos is a global provider of cybersecurity solutions focused on developing, implementing, maintaining, and securing critical infrastructures for both government and commercial clients in Oil & Gas, Utilities, Financial Services, Healthcare and Chemical industries. Leidos engineers literally span the globe, overseeing more than 4,000 programs at 600 locations in all 50 states and in 75 countries. We employ over 3,000 cyber-security professionals and have robust IT and OT technology partnerships. Our lifecycle-focused products and programs enable both success and sustainability protecting networks across our commercial clients' infrastructures.



Net IQ twitter    linked in

NetIQ is a global, enterprise software company with a relentless focus on customer success. Our portfolio includes scalable, automated solutions for Identity, Security and Governance and IT Operations Management that help organizations securely deliver, measure and manage computing services across physical, virtual and cloud computing environments.



qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



Shape Security twitter    linked in

Shape Security is defining a new future in which excellent cybersecurity not only stops attackers, but also welcomes good users. Shape disrupts the economics of cybercrime, making it too expensive for attackers to commit online fraud, while enabling enterprises to more easily identify and transact with genuine customers on their websites and mobile apps. The world’s leading organizations rely on Shape as their primary line of defense against attacks on their web and mobile applications, including three of the Top 5 US banks, five of the Top 10 global airlines, two of the Top 5 global hotels and two of the Top 5 US government agencies. The Shape platform, covered by 55 patents, was designed to stop the most dangerous application attacks enabled by cybercriminal fraud tools, including credential stuffing (account takeover), fake account creation, and unauthorized aggregation. Today, the Shape Network defends 1.7 billion user accounts from account takeover and protects 30% of all US savings. The company is headquartered in Mountain View, California, and also has offices in London and Sydney.



sourceit twitter    linked in

Source IT Technologies is a value-added reseller. We partner closely with our customers and vendors to architect IT solutions and financial packages that meet the challenges of today’s technical and fiscal environments. With security at the core of our business, our team of skilled engineers and consultants service large enterprise clients in government, healthcare, higher education, and Fortune 1000 corporations delivering comprehensive IT products and services including: Security, Storage, Data Center Solutions, Business Intelligence, and Cloud & Virtualization.



Display Sponsors

kenna twitter    linked in

Arxan is the trusted global leader in end- to- end Application Protection and Management solutions for Mobile, JavaScript, IoT and other applications that reside in unsecured environments. We protect our customers against financial loss, brand damage, fraud, IP theft, stolen credentials, fraudulent transactions, unauthorized access, non-compliance with regulatory and industry standards. Arxan’s enterprise level solutions enable the trust our customers need to confidently build and distribute their most valuable applications.

We are currently protecting applications running on more than 1 billion devices across a range of industries, including: financial services, mobile payments, and healthcare (connected medical devices)

The company’s headquarters and engineering operations are based in San Francisco with global offices in EMEA and APAC.



attackiq twitter    linked in

AttackIQ provides a continuous security testing platform to challenge existing host, network and cloud infrastructures to help organizations safely test, measure, and perform security validation and improve their defense in depth strategy. Its flagship platform, FireDrill™, duplicates real-world attacks and safely applies test scenarios in active environments. FireDrill provides security assurance to validate that deployed solutions are providing protection as designed. Headquartered in San Diego, California, AttackIQ’s management team has more than 20 years of experience leading security teams at some of the world’s top security companies.



check point twitter    linked in

Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.



Cloud Passage twitter    linked in

CloudPassage® Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.



core security twitter    linked in

Core Security provides market-leading, threat-aware, identity, access and vulnerability management solutions that provide actionable intelligence and context needed to manage security risks across the enterprise. Solutions include multi-factor authentication, provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make better security remediation decisions and maintain compliance.



echoworx twitter    linked in

Echoworx is a security software developer and recognized industry leader in email encryption. We bring simplicity and scalability to encryption while assuring its integrity. OneWorld, our flagship solution, is the first smart message encryption platform that makes secure messaging easy and cost effective. The same software that acts as a gateway solution can also be used to automatically encrypt and deliver secure statements at industry-leading speeds - consolidating all email encryption use cases into a single solution. Our encryption experts transform chaos into order for world leading enterprises and providers who understand secure communication is of the upmost importance.



Fidelis Cybersecurity Solutions twitter    linked in

Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber



lookout security twitter    linked in

Lookout predicts mobile attacks before they happen. Our cloud-based mobile security platform continuously analyzes mobile apps and activity against the world’s most comprehensive view of mobile threats in order to identify and eliminate malicious activity before it does harm. To date, a network of than 50 million people, as well as leading mobile operators such as AT&T, Sprint and T-Mobile, choose Lookout as their preferred mobile security solution.



novetta twitter    linked in

Now available for commercial enterprises, Novetta Cyber Analytics provides complete, truthful, near real-time network security visibility and awareness. Dramatically increase the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers almost instantly. Handle an estimated 30 times the incidents. www.novetta.com/cyber-analytics



Onapsis twitter    linked in

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses. For more information, please visit www.onapsis.com.



TripWire twitter    linked in

Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire’s integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire® VIA™, the comprehensive suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through Visibility, Intelligence and Automation.



Tufin twitter    linked in

Tufin®, the leader in Network Security Policy Orchestration, allows enterprises to streamline the management of security policies across complex, heterogeneous environments. Serving over 1,900 customers, Tufin’s network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Learn more: www.tufin.com.



Varonis twitter    linked in

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.