ISE® West Sponsors 2016

Exabyte Sponsors

Invincea twitter    linked in

Over 25,000 customers rely on Invincea to prevent and detect endpoint threats while enabling their workforce to conduct business. Invincea stops malware, spear-phishing, weaponized Office documents, and other threats. This is achieved by combining deep learning, behavioral monitoring, and isolation technology in a single agent– working together for better protection. ​



Kilobyte Sponsors

kenna twitter    linked in

Arxan is the trusted global leader in end- to- end Application Protection and Management solutions for Mobile, JavaScript, IoT and other applications that reside in unsecured environments. We protect our customers against financial loss, brand damage, fraud, IP theft, stolen credentials, fraudulent transactions, unauthorized access, non-compliance with regulatory and industry standards. Arxan’s enterprise level solutions enable the trust our customers need to confidently build and distribute their most valuable applications.

We are currently protecting applications running on more than 1 billion devices across a range of industries, including: financial services, mobile payments, and healthcare (connected medical devices)

The company’s headquarters and engineering operations are based in San Francisco with global offices in EMEA and APAC.



GlobalScape twitter    linked in

Globalscape ensures the reliability of mission-critical operations by securing sensitive data. Globalscape’s suite of solutions features Enhanced File Transfer, the industry-leading enterprise file transfer platform that delivers military-grade security and a customizable solution for achieving best-in-class control and visibility of data in motion or at rest, across multiple locations.



Display Sponsors

attackiq twitter    linked in

AttackIQ provides a continuous security testing platform to challenge existing host, network and cloud infrastructures to help organizations safely test, measure, and perform security validation and improve their defense in depth strategy. Its flagship platform, FireDrill™, duplicates real-world attacks and safely applies test scenarios in active environments. FireDrill provides security assurance to validate that deployed solutions are providing protection as designed. Headquartered in San Diego, California, AttackIQ’s management team has more than 20 years of experience leading security teams at some of the world’s top security companies.



Bay Dynamics twitter    linked in

Bay Dynamics® enables organizations to quantify the business impact of cyber risk from both insider and outsider attacks. Using UEBA technology and dynamic telemetry from security and IT infrastructure, our Risk Fabric® cyber analytics platform calculates the value at risk associated with specific threats and vulnerabilities, and prescribes prioritized actions across the organization to reduce the risks that matter most.



Cloud Passage twitter    linked in

CloudPassage® Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.



Fidelis Cybersecurity Solutions twitter    linked in

Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber



kenna twitter    linked in

The Kenna Security Platform is a scalable, cloud-based solution that delivers the most informed and accurate risk prioritization available, enabling security and IT operations teams to take a risk-based approach to vulnerability management. Using predictive modeling technology, the platform can also accurately forecast the future risk of vulnerabilities the instant they’re discovered.



novetta twitter    linked in

Now available for commercial enterprises, Novetta Cyber Analytics provides complete, truthful, near real-time network security visibility and awareness. Dramatically increase the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers almost instantly. Handle an estimated 30 times the incidents. www.novetta.com/cyber-analytics



Onapsis twitter    linked in

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses. For more information, please visit www.onapsis.com.



redowl twitter    linked in

RedOwl provides information security teams a single platform to proactively monitor insider risk across the enterprise. The RedOwl platform analyzes all observable interactions between employees, contractors, devices, and applications within your organization. Only RedOwl analyzes structured and unstructured data to provide immediate and unparalleled visibility into human risk to combat intellectual property loss, detect compromised accounts, monitor privileged users and enhance forensics.



twitter    linked in

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime. For more information, go to www.rsa.com.



simeio twitter    linked in

Simeio Solutions is a unique strategic partner offering a comprehensive suite of enterprise Identity and Access Management (IAM) resources designed to provide a fully integrated solution that meets the specific needs of each client. The company's single-source approach to IAM encompasses expert managed services (both on-premise and remotely managed), business-ready IAM cloud, and professional services that ensure on-target, smooth and cost-effective system design and implementation.



TripWire twitter    linked in

Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire’s integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire® VIA™, the comprehensive suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through Visibility, Intelligence and Automation.



Tufin twitter    linked in

Tufin®, the leader in Network Security Policy Orchestration, allows enterprises to streamline the management of security policies across complex, heterogeneous environments. Serving over 1,900 customers, Tufin’s network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Learn more: www.tufin.com.



Varonis twitter    linked in

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.



veracode twitter    linked in

Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capability, and advanced application analytics Veracode enables scalable, policy-driven application risk management programs. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide.