| ||nCircle is the leading provider of Information Risk & Security Performance Management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to 1) automate compliance and reduce risk, and 2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer's premise, as a cloud-based service, or in combination, for maximum flexibility and value. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. For more information, visit www.ncircle.com.|
AlienVault provides organizations of all types and sizes with unprecedented visibility across the entire security ‘stack’ with the AlienVault Unified Security Management™ (AV-USM™) platform. Based on OSSIM – the de facto standard open source SIEM created by AlienVault – the AV-USM has five essential security capabilities built-in: asset discovery, vulnerability assessment, threat detection, behavioral monitoring and security intelligence. The AlienVault Open Threat Exchange™, a system for sharing threat intelligence among OSSIM users and AlienVault customers, ensures AV-USM always stays ahead of threats. AlienVault is a privately held company headquartered in Silicon Valley. For more information visit www.AlienVault.com or follow us on Twitter @alienvault.
Bit9 is the leader in Adaptive Application Whitelisting Solutions. The company's award-winning Application Whitelisting solutions provide total visibility and control over all software on endpoints, eliminating the risk caused by malicious, illegal and unauthorized software. Bit9 specializes in protecting organizations against the Advanced Persistent Threat. Bit9 leverages the Bit9 Global Software Registry™ – the world's largest database of software intelligence – to identify and classify software, delivering the highest levels of endpoint security, compliance, and manageability. Bit9's dynamic application whitelisting technology makes it simple to deploy application whitelisting in the largest of organizations. The company's global customers come from a wide variety of industries, such as government, financial services, retail, healthcare, e-commerce and education. Visit us at www.bit9.com. Download Bit9 Whitepaper
|Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses, government agencies, and service providers take control of their physical, virtual, and cloud infrastructure. Thousands of customers rely on Tripwire's integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire VIA, the integrated compliance and security solution delivers best-of-breed file integrity, policy compliance and log and event management solutions, paving the way for organizations to proactively achieve continuous compliance, mitigate risk, and ensure operational control through Visibility, Intelligence and Automation. Learn more at www.tripwire.com and @TripwireInc on Twitter.|
|WatchDox enables organizations to access, sync, share and control critical documents wherever they go: on any tablet, smartphone, or PC, even beyond the IT department’s control. Available on premise or as SaaS, WatchDox facilitates secure collaboration and BYOD initiatives, all while providing users a superior experience across every device. For more information, visit www.watchdox.com.|
Protegrity is the leading global security software company providing high performance, infinitely scalable, end-to-end data security solutions. Protegrity customers centrally develop, manage and control data security policy that protects sensitive information across the enterprise in databases, applications and file systems from the point of acquisition to deletion. Protegrity’s solutions give corporations the ability to implement a variety of data protection methods, including strong encryption, vaultless tokenization, masking and monitoring to ensure the protection of their sensitive data and enable compliance for PCI DSS, HIPAA and other data security requirements. For more information visit www.protegrity.com or call 203.326.7200.
|RedSeal Networks is the leading provider of proactive enterprise security management solutions that enable organizations to continually monitor, assess and fortify their cyber-defenses while automating compliance. The RedSeal platform enables businesses and government agencies to visualize, model and analyze complex network and security control interactions across their entire network of firewalls, routers, load balancers and hosts. With RedSeal, organizations can better understand their security state and regulatory compliance, identify the inherent risk to their operations and critical assets, and drive actions that reduce the risks associated with cybertheft and cyberespionage. For more information, visit RedSeal at www.redsealnetworks.com.|
|SDG Corporation partners with global organizations on Governance, Risk, and Compliance solutions including policy management, application and infrastructure security, auditing and compliance assessment. SDG provides thought leadership and strategic solutions for Identity and Access Management to many of the Fortune 500. The TruOps GRC Hub architecture provides role-relevant views of IT risk across the organization—from CXOs to infrastructure/application owners. TruOps dashboards offer advanced visibility to policy adherence and risk metrics with drill down to source platforms. TruOps strengthens Policy Exception and Incident Management through real time alerts and workflows, enabling instant actions against risk. Please visit us at www.sdgc.com|
|Solutionary reduces the information security and compliance burden, delivering flexible managed security services that align with client goals, enhancing organizations’ existing security program, infrastructure and personnel. Founded in 2000, Solutionary’s services are based on experienced security professionals, actionable threat intelligence and ActiveGuard service platform that provide expert security and compliance management. Solutionary works as an extension of clients’ internal teams, providing industry-leading customer service, patented technology, thought leadership, years of innovation and proprietary certifications, exceeding industry standards. This client focus and dedication to customer service has enabled Solutionary to boast one of the highest client retention rates in the industry.|
|AsTech Consulting’s mission is helping organizations discover and manage the risks associated with their critical applications and systems. Founded in 1997, AsTech delivers information security services designed to maximize Return on Security Investment, including vulnerability discovery and analysis, application security (source code assessment, secure development training, and remediation), secure architecture design, fraud management, information risk management and compliance guidance. AsTech recommends and implements solutions that work, informed by a deep sensitivity to the business objectives and risk appetites of our clients. There are no silver bullets or one-size-fits-all solutions for today’s emerging threats - that’s why understanding risk in context is essential for tomorrow’s evolving security landscape. |
Please visit www.astechconsulting.com to learn more.
|Avatier is the most innovative identity and access risk management solutions company in the world. The company invented the world's first business service catalog in the form of an IT Store with automatic workflow, and its award-winning products are deployed worldwide across sixteen vertical markets and hundreds of organizations with millions of managed user identities. The company's Identity and Access Risk Management (ARM) suite incorporates products for user provisioning, password management, compliance governance and risk intelligence. Solutions represent the quickest time to value and the best operational efficiencies in the industry because of graphical configuration versus complex coding and scripting. |
|Courion, the leader in identity and access management (IAM) solutions that effectively and securely manage user access risk, helps companies identify, quantify and manage the risks associated with information access. With more than 14 million users in 500 organizations worldwide, Courion’s on-premise and cloud-based solutions offer full arrays of IAM functions such as identity and access governance, user provisioning and password management that deliver the industry’s fastest time to value and the lowest total cost of ownership. For more information, visit our website at www.courion.com or contact us at email@example.com.|
|PhishMe.com provides organizations the ability to train their employees and customers about the risks of spear phishing with just a few simple clicks. With 3.1 million individuals trained since its launch in 2008, PhishMe provides a cost effective way to mitigate this challenge. The company has proven that its trainings can reduce the threat of employees and customers falling victim to phishing attacks by up to 80 percent. PhishMe.com works with Federal Agencies and Fortune 1000 companies across multiple vertical market sectors including financial services, healthcare, higher education and defense. For additional information, please visit: www.phishme.com. |
|Established in 1987, Quest Software (Nasdaq: QSFT) provides simple and innovative IT management solutions that enable more than 100,000 global customers to save time and money across physical and virtual environments. Quest products solve complex IT challenges ranging from database management, data protection, identity and access management, monitoring, user workspace management to Windows management. For more information, visit www.quest.com. |
|SEEBURGER streamlines business process while reducing infrastructure costs by providing our customers with comprehensive integration and secure Managed File Transfer (MFT) solutions. These solutions provide visibility to the farthest edges of the supply chain to maximize your ERP’s effectiveness and innovate your business. SEEBURGER customers continue to lower total cost of ownership and reduce implementation time with our unified platform that we’ve precision-engineered from the ground up. With more than 25 years in the industry, SEEBURGER today is ranked among the top business integration providers by industry analysts, serves 9,000 customers in more than 50 countries and 15 industries. For more information, visit www.seeburger.com. |
|Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance by protecting structured and unstructured data as it is used across data centers, public and private clouds and mobile devices. For more information, visit www.voltage.com|
|WinMagic Inc. provides the world’s most secure, manageable and easy-to–use data security solutions. WinMagic’s SecureDoc is a comprehensive encryption and security management product that can manage data security across the enterprise. By encrypting entire disks, specific files or folders locally or on the network as well as mobile devices and removable media, SecureDoc provide enterprise grade data security policy and key management across all operating systems such as Windows, Mac OS, Android and Linux. Our solutions help organizations to minimize business risks, meet privacy/regulatory compliance requirements, and protect valuable information assets against unauthorized access.|
|Wombat Security Technologies, Inc. is the first and only company to offer a complete suite of anti-phishing and security awareness products that leverage progressive training techniques of professional educators to effectively improve human response against cyber-attacks up to 70%. Wombat’s breakthrough software-based training solutions teach users how to recognize and avoid the most advanced attacks involving phishing, password security, social networking, smartphones, and working outside of the office.|
All of Wombat’s security awareness training solutions are part of their award-winning Security Training Platform which integrates interactive training modules, mock attack services, analysis and reporting and administrative capabilities in one easy to use interface. For more info please visit www.wombatsecurity.com.
|RiskIQ discovers, scans, and monitors brand assets across the web and|
mobile, neutralizing threats to the online presence of the Fortune
500's most recognizable companies. Outside Looking In Security with
RiskIQ. For more information, please visit www.riskiq.com.
|Marketwire advances the way the world communicates. Serving more than 12,000 clients worldwide through 20 offices on four continents, Marketwire is a dominant distributor of company news releases and other communications, electronically delivering global news and information to traditional and new media outlets including newspapers, magazines, databases, analyst terminals, online portals, blogs, and more. Specializing in maximizing the power of its clients’ communications, Marketwire leverages the latest in search engine optimization, multimedia, social media, and new technologies. |