ISE® Southeast Sponsors 2016

Exabyte Sponsors

Invincea     

Over 25,000 customers rely on Invincea to prevent and detect endpoint threats while enabling their workforce to conduct business. Invincea stops malware, spear-phishing, weaponized Office documents, and other threats. This is achieved by combining deep learning, behavioral monitoring, and isolation technology in a single agent– working together for better protection. ​



Kilobyte Sponsors

cisco     

Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco's threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack. Cisco security technologies can turn your existing network into an always-on security sensor and enforcer to fill in gaps in your protection, playing a critical role in protecting and enabling today’s innovative digital networks.



Cloud Passage     

CloudPassage® Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.



exabeam     

Exabeam is a user behavior analytics solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value immediately.



GlobalScape     

Globalscape ensures the reliability of mission-critical operations by securing sensitive data. Globalscape’s suite of solutions features Enhanced File Transfer, the industry-leading enterprise file transfer platform that delivers military-grade security and a customizable solution for achieving best-in-class control and visibility of data in motion or at rest, across multiple locations.



HP     

About HPE Security
HPE Security helps organizations detect and respond to cyber threats while safeguarding continuity and compliance to effectively mitigate risk and incident impact. Delivering an integrated suite of market-leading products, services, threat intelligence and security research, HPE Security helps customers proactively protect the interactions among users, applications and data, regardless of location or device. With a global network of security operations centers and more than 5,000 IT security experts, HPE Security empowers customers and partners to safely operate and innovate while keeping pace with the speed of today’s idea economy. Find out more about HPE Security at https://www.hpe.com/us/en/solutions/security.

About Hewlett Packard Enterprise
Hewlett Packard Enterprise is an industry leading technology company that enables customers to go further, faster. With the industry’s most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure..


Intralinks     

Intralinks (NYSE: IL) is a leading secure content collaboration company that helps organizations share high-value content across teams, partners, customers and regulators. Our technology controls content in motion to speed up deals, streamline business processes, deepen customer engagement and reduce regulatory risk. Intralinks’ unmatched security and governance capabilities are fully integrated into our platform and include market-leading features such as Information Rights Management and customer-managed encryption keys. With a 20-year track record of enabling high-stakes transactions and business collaborations valued at more than $31 trillion, more than 90,000 clients at 99 percent of the Fortune 1000 companies have depended on Intralinks’ technology to get work done.



Logrhythm     

LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.



qualys     

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



    

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime. For more information, go to www.rsa.com.



symantec     

The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.



TrendMicro

Trend Micro provides leading Internet content security solutions for businesses and consumers. We protect against malware, spam, data leaks, and the newest Web threats designed to steal digital information. Our unique solutions stop these threats where they first emerge - in the Internet - before they can attack corporate networks and PCs. Founded in 1988, Trend Micro operates globally and protects hundreds of millions of users in the office, at home and on the go. www.trendmicro.com



Display Sponsors

bromium     

Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers.



carbon black     

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.



check point     

Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.



Fidelis Cybersecurity Solutions     

Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber



imperva     

Recognized by industry analysts as a cybersecurity leader, Imperva champions the fight to secure data and applications wherever they reside. In today’s fast-moving cybersecurity landscape, your assets require continuous protection, but analyzing every emerging threat taxes your time and resources. For security to work, it has to work for you. By accurately detecting and effectively blocking incoming threats, we empower you to manage critical risks, so you never have to choose between innovating for your customers and protecting what matters most. At Imperva, we tirelessly defend your business as it grows, giving you clarity for today and confidence for tomorrow. Imperva—Protect the pulse of your business.



novetta     

Now available for commercial enterprises, Novetta Cyber Analytics provides complete, truthful, near real-time network security visibility and awareness. Dramatically increase the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers almost instantly. Handle an estimated 30 times the incidents. www.novetta.com/cyber-analytics



Onapsis     

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses. For more information, please visit www.onapsis.com.



RiskIQ     

RiskIQ is a cybersecurity company that helps organizations discover and protect their external facing known, unknown and 3rd party web, mobile and social digital assets. The company’s External Threat Management platform combines a worldwide proxy network with synthetic clients that emulate users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and other companies to protect their web assets and users from external security threats and fraud.



qualys     

ServiceNow makes work better. Getting simple stuff completed at work can be easy, and getting complex multistep tasks accomplished can be painless. Automate, digitize, and optimize processes across security, risk, and IT to resolve risks quickly based on business impact. Reduce manual processes and collaborate across functions to make your teams more efficient. Visit https://www.servicenow.com/solutions/security-incidents.html for more information.



splunk     

MAKE MACHINE DATA ACCESSIBLE,USABLE AND VALUABLE TO EVERYONE.
What is Splunk? We take your machine data and make sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone.



Tufin     

Tufin®, the leader in Network Security Policy Orchestration, allows enterprises to streamline the management of security policies across complex, heterogeneous environments. Serving over 1,900 customers, Tufin’s network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Learn more: www.tufin.com.



Varonis     

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.



venafi     

Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—cryptographic keys and digital certificates—so they can’t be misused by bad guys in attacks. Venafi constantly assesses which SSL/TLS, SSH, WiFi, VPN and mobile keys and certificates are trusted, protects those that should be trusted, and fixes or blocks those that are not. As the market-leading cybersecurity company in Next Generation Trust Protection (NGTP), the Venafi Trust Protection Platform™ protects keys and certificates and eliminates blind spots from threats hidden in encrypted traffic. Venafi customers include the world’s leading Global 5000 companies.



Association Sponsor

ISSA     

The Metro Atlanta Information Systems Security Association is a non-profit group dedicated to providing educational and networking opportunities. We promote the exchange of ideas and knowledge for each member's growth within the information security profession.  Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial and government.



ISSA Middle Tennessee     

The primary purpose of the Middle Tennessee ISSA Chapter is to promote the Information Security profession through education of its members and interaction with the community.