ISE® Northeast Sponsors 2019

Exabyte Sponsor

qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



Kilobyte Sponsors

Capgemini twitter    linked in

Capgemini a Global 2000 leader recent made a strategic acquisition of Leidos Cyber, Inc., the commercial cybersecurity arm of the FORTUNE 500® company Leidos. Bringing new capabilities, proven expertise and a wide portfolio of cybersecurity services to our clients Capgemini’s cybersecurity practitioners can provide services, solutions and delivery that match your company’s needs and footprint across the globe. Our end-to-end services can accelerate your cybersecurity growth through a process of cybersecurity transformation.

Our services include;

  • Cybersecurity Defense Maturity Evaluation
  • Cybersecurity Transformation
  • Cybersecurity Device Management
  • Managed Detection and Response
  • Network Security and Segmentation
  • Penetration testing, Red Teaming and Threat Simulation

Capgemini is driven by the conviction that the business value of technology comes from and through people. It is a multicultural company of over 200,000 team members in more than 40 countries. The Group reported 2018 global revenues of EUR 13.2 billion.



cisco twitter    linked in

Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco's threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack. Cisco security technologies can turn your existing network into an always-on security sensor and enforcer to fill in gaps in your protection, playing a critical role in protecting and enabling today’s innovative digital networks.



Digital Hands twitter    linked in

Digital Hands is a globally trusted, five-time TSIA award-winning, Managed Security Service Provider (MSSP) focused on delivering 24/7/365 security operations and services to protect our customers from cyber threats in a world where compliance alone is no guarantee of protection. Our philosophy is to Get There First™ - every time, and we do. That’s why organizations with some of the most sensitive data of all- such as hospitals, financial institutions, law firms, and government agencies- continue to give Digital Hands an industry-leading CSAT of 98% year after year after year. For more information regarding our services, solutions, and seamless customer journey, please visit www.digitalhands.com.



extrahop twitter    linked in

ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business. Learn more at www.extrahop.com.



splunk twitter    linked in

MAKE MACHINE DATA ACCESSIBLE,USABLE AND VALUABLE TO EVERYONE.
What is Splunk? We take your machine data and make sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone.



tanium twitter    linked in

Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. With the unprecedented speed, scale and simplicity of Tanium, security and IT operations teams now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.



Display Sponsors

OneTrust twitter    linked in

OneTrust is the #1 most widely used privacy, security and third-party risk technology platform trusted by more than 3,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s three primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, and OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange. To learn more, visit OneTrust.com or connect on LinkedIn, Twitter and Facebook.



protegrity twitter    linked in

Protegrity offers the only data-first security solution to ensure comprehensive discovery and protection of sensitive enterprise data in motion, in use and at rest. The solution is a single, scalable offering of technology, services, and expertise that ensures total data privacy and regulatory compliance, while enabling new data-driven innovation throughout the enterprise.



respond software twitter    linked in

Respond Software is the cybersecurity investigation automation company and creator of the Respond Analyst, an XDR engine built to accelerate investigations for security operations teams. Defense agencies, government bodies, universities, large enterprises, and leading managed service providers use the Respond Analyst to get investigation power at machine speed. The Respond Analyst works with the broadest range of vendors, sensors, threat intelligence and data repositories in the industry to improve detection and response while raising security analyst productivity. Since its founding in 2016, Respond Software has partnered with more than 100 customers to apply data science to help security operations defend their enterprise. www.respond-software.com.



ShieldX twitter    linked in

SafeBreach is the leader in Breach and Attack Simulation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture to proactively predict attacks, validate security controls and improve SOC analyst response. SafeBreach automatically executes thousands of breach methods from an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. Headquartered in Sunnyvale, California, the company is funded by Sequoia Capital, Deutsche Telekom Capital Partners, Draper Nexus, Hewlett Packard Pathfinder, PayPal, and investor Shlomo Kramer. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.



saltworks twitter    linked in

Saltworks Security is an application security consulting company. We partner with organizations to build world-class application security programs from Policy to Production.



secureworks twitter    linked in

Secureworks® (NASDAQ: SCWX) is a technology-driven cybersecurity leader that protects organizations in the digitally connected world. Built on proprietary technologies and world-class threat intelligence, our applications and solutions help prevent, detect, and respond to cyber threats. Red Cloak™ software brings advanced threat analytics to thousands of customers, and the Secureworks Counter Threat Platform™ processes over 300B threat events per day. We understand complex security environments and are passionate about simplifying security with Defense in Concert™ so that security becomes a business enabler. More than 4,000 customers across over 50 countries are protected by Secureworks, benefit from our network effect and are Collectively Smarter. Exponentially Safer.™



qualys twitter    linked in

ServiceNow makes work better. Getting simple stuff completed at work can be easy, and getting complex multistep tasks accomplished can be painless. Automate, digitize, and optimize processes across security, risk, and IT to resolve risks quickly based on business impact. Reduce manual processes and collaborate across functions to make your teams more efficient. Visit https://www.servicenow.com/solutions/security-incidents.html for more information.



ShieldX twitter    linked in

ShieldX provides East-West agentless, application layer microsegmentation and threat prevention for on prem, hybrid and multi cloud data centers across AWS, Azure and VMWare. By leveraging deep packet inspection, our elastic security platform delivers enhanced visibility, threat prevention and fine-grained East-West controls, allowing customers to more effectively and automatically orchestrate security in elastic environments.

With ShieldX, security teams can:
- Visualize multi-cloud deployments and associated risks
- Easily segment flat networks to stop lateral movement and satisfy regulatory requirements
- Automatically secure hybrid cloud with adaptive security policy
- Consolidate controls into a single platform and deploys quickly to lower the cost of security



Media Sponsor

NYInfoSecurity twitter

NY Information Security Meetup (NYIS) is about getting the latest information on enterprise security trends in Cyber Security, Mobile Computing, Networks and Endpoint Protection, Governance, and Compliance. The meetings will feature speakers, emerging vendor demos in the security space, panel discussions, hands-on workshops, and networking. We are in of an era where Cyber Security is taking the front page and enterprises are embracing new technologies to defend them.

Explore the latest innovations and ideas that are carving tomorrow’s industry landscape. We engage IT Security professionals in first-hand peer interactions within the growing field of security, creating an ecosystem of interactive lectures, product demonstration, hand-on workshops, and networking sessions. Run your enterprise safely and transparently through sharing of gained knowledge and enriching your horizon of known unknowns, unknown knowns, and unknown unknowns. Elevate your security maturity level and data breach resistance and resiliency.