ISE® Southeast Sponsors 2015

ISE® Signature Luncheon Sponsor

ISE Talent twitter    linked in

ISE® Talent is an executive search and talent management firm dedicated exclusively to Information Security Executives. A 100% woman-owned business, ISE® Talent is a division of T.E.N., the leading national technology and security executive networking firm that facilitates peer-to-peer relationships between top executives, industry visionaries and solution providers. Learn more about our parent company by visiting www.ten-inc.com.



Kilobyte Sponsors

Accuvant twitter    linked in

Accuvant is the Authoritative Source for information security. Since 2002, the company has served more than 5,200 clients, including half of the Fortune 100 and more than 900 educational institutions and government entities. Headquartered in Denver, Accuvant has offices across the United States and Canada and boasts the largest and most elite army of technical security professionals in the world – Accuvant LABS.



courion twitter    linked in

With deep experience providing security solutions to seventeen million users in 500 organizations, Courion offers complete Identity and Access Management, from Provisioning to Governance to Identity and Access Intelligence. Real-time risk analytics enable you to visualize enterprise activity and the context of identity and access relationships so you can recognize, manage and reduce risk - everyday. With Courion, you can provide open and compliant access to all while protecting critical company data from unauthorized access.



HP twitter    linked in

Today’s organizations are facing the most aggressive threat environment in the history of information technology. Emerging computing trends have greatly increased productivity and business agility—but at the same time, have introduced a host of new risks. Actionable security intelligence is critical to protecting your organization from this rising tide of security threats.

HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today’s most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today.

More information about HP Enterprise Security Products is available at hp.com/go/esp.


Net IQ twitter    linked in

NetIQ is a global, enterprise software company with a relentless focus on customer success. Our portfolio includes scalable, automated solutions for Identity, Security and Governance and IT Operations Management that help organizations securely deliver, measure and manage computing services across physical, virtual and cloud computing environments.



qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



twitter    linked in

Rapid7 security analytics software and services reduce cyber threat exposure and detect compromise for 3,000 organizations across 78 countries, including over 250 of the Fortune 1000. We understand the attacker better than anyone and build that insight into our solutions to help you improve risk management and stop threats faster.



RiskIQ twitter    linked in

RiskIQ is a cybersecurity company that helps organizations discover and protect their external facing known, unknown and 3rd party web, mobile and social digital assets. The company’s External Threat Management platform combines a worldwide proxy network with synthetic clients that emulate users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and other companies to protect their web assets and users from external security threats and fraud.



symantec twitter    linked in

The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.



tanium twitter    linked in

Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. With the unprecedented speed, scale and simplicity of Tanium, security and IT operations teams now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.



z scaler twitter    linked in

Zscaler protects 12 million employees at 5,000 organizations worldwide against cyberattacks and data breaches. Zscaler’s Security-as-a-Service platform delivers Internet security, APT protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence, ensuring a safe and productive Internet experience for every user, from any device and any location.



Display Sponsors

Beyond Trust twitter    linked in

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company's products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.



bromium twitter    linked in

Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers.



cisco twitter    linked in

Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco's threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack. Cisco security technologies can turn your existing network into an always-on security sensor and enforcer to fill in gaps in your protection, playing a critical role in protecting and enabling today’s innovative digital networks.



Click Security twitter    linked in

Click Security's Real-time Security Analytics automatically finds unknown attack activity hidden in the "event haystack". Our solution converts logs, flows and events into contextual "actor-based" information – empowering the analyst with true situational awareness. Our unique Click Platform, open-authored Click Modules, and Click Labs intelligence agency set our solution apart.



elastica twitter    linked in

Elastica is the innovator of Data Science Powered™ Cloud Application Security. Its CloudSOC™ solution enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. The solution offers cloud audit for Shadow IT, granular transaction visibility, threat detection, security controls and post-incident analysis. Learn more at www.elastica.net



fire eye twitter    linked in

FireEye is changing the way organizations strengthen their defense against a new breed of cybercriminals, combining best-in-class technology with an unmatched global intelligence network and an experienced team of security consulting services professionals. FireEye has over 3,100 customers across 67 countries, including over 200 of the Fortune 500. For more information visit www.FireEye.com.



Identity Finder twitter    linked in

Identity Finder is the leading provider of sensitive data management technologies, helping companies identify and minimize the risks associated with costly data breaches. The company’s data discovery and dynamic classification solutions add significant value to data management and security programs employed by today’s enterprises.



GlobalScape twitter    linked in

Infoblox network control solutions connect end users, devices, and networks, enabling approximately 7,300 enterprises to transform, secure, and scale complex networks. They reduce costs, maximize uptime, and ensure availability. And our DNS security solutions defend against the widest range of threats. Headquartered in California, Infoblox operates in over 25 countries.



Intralinks twitter    linked in

Intralinks (NYSE: IL) is a leading secure content collaboration company that helps organizations share high-value content across teams, partners, customers and regulators. Our technology controls content in motion to speed up deals, streamline business processes, deepen customer engagement and reduce regulatory risk. Intralinks’ unmatched security and governance capabilities are fully integrated into our platform and include market-leading features such as Information Rights Management and customer-managed encryption keys. With a 20-year track record of enabling high-stakes transactions and business collaborations valued at more than $31 trillion, more than 90,000 clients at 99 percent of the Fortune 1000 companies have depended on Intralinks’ technology to get work done.



Invincea twitter    linked in

Over 25,000 customers rely on Invincea to prevent and detect endpoint threats while enabling their workforce to conduct business. Invincea stops malware, spear-phishing, weaponized Office documents, and other threats. This is achieved by combining deep learning, behavioral monitoring, and isolation technology in a single agent– working together for better protection. ​



novetta twitter    linked in

Now available for commercial enterprises, Novetta Cyber Analytics provides complete, truthful, near real-time network security visibility and awareness. Dramatically increase the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers almost instantly. Handle an estimated 30 times the incidents. www.novetta.com/cyber-analytics



Palerra twitter    linked in

Palerra designed LORIC to protect an enterprise’s entire cloud footprint ranging from branded applications such as Microsoft Office 365 to infrastructure such as AWS, and everything in between. It combines automated threat detection, predictive analytics, continuous monitoring, and incident response into a single platform. No hardware, software or agents.



layer 7 twitter    linked in

Synack is the premier on-demand security testing platform harnesses a vetted community of world-class security researchers for continuous penetration testing and vulnerability management. We partner with enterprises to add vital security testing capabilities and capacity to find the vulnerabilities that matter, even at scale. We are committed to making the world more secure by closing the cybersecurity skills gap, giving organizations on-demand access to the most-trusted security researchers in the world.



TripWire twitter    linked in

Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire’s integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire® VIA™, the comprehensive suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through Visibility, Intelligence and Automation.



Varonis twitter    linked in

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.



Association Sponsor

ISSA twitter    linked in

The Metro Atlanta Information Systems Security Association is a non-profit group dedicated to providing educational and networking opportunities. We promote the exchange of ideas and knowledge for each member's growth within the information security profession.  Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial and government.



ISSA Middle Tennessee twitter    linked in

The primary purpose of the Middle Tennessee ISSA Chapter is to promote the Information Security profession through education of its members and interaction with the community.