Loading... Please wait...

Fall Current Sponsors

 

 Platinum Sponsors

fsisac-fall-bastille-networks.jpg

Bastille Networks

booz-allen-100-yr-logo-black-red-2014-spring-fsisac.jpg

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for 100 years. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning consulting, analytics, mission operations, technology, and engineering—which it combines with specialized expertise in clients' mission and domain areas to help solve their toughest problems.

Booz Allen is headquartered in McLean, Virginia, employs approximately 23,000 people, and had revenue of $5.76 billion for the 12 months ended March 31, 2013. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH)

ibm-logo.jpg

IBM

skyhigh-logo-final-jan2014-fsisac-spring-2014.jpg

Skyhigh Networks, the Cloud Visibility and Enablement Company, allows companies to embrace cloud services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, professional services, energy, healthcare, high technology, media and entertainment, manufacturing, and legal verticals, the company was a finalist for the RSA Conference Most Innovative Company award and was recently named a “Cool Vendor” by Gartner, Inc. For more information, visit us at skyhighnetworks.com

Gold Sponsors

inspired-logo.jpg

BAE Systems Applied Intelligence creates solutions with our clients to protect and enhance the connected world.

We help leading enterprises and government departments to manage multiple threats from digital criminality – whether your goal is to manage cyber security risk, reduce losses from banking or insurance fraud, protect mobile banking, uncover unauthorised trading, prevent tax or healthcare fraud or ensure regulatory compliance.

Our expertise in advanced data acquisition, network analytics, threat intelligence and operations management gives you the ability to derive intelligence from IT network, communications and transactions data to:

  • access more, and better quality, data from multiple sources
  • identify harmful activity from sophisticated external and insider threats
  • improve your risk view through continuous monitoring
  • improve the efficiency and effectiveness of investigations, analysis and remediation

Our solutions are delivered securely through multiple deployment options, enabling your organisation to successfully deliver its core mission at lower risk.

Applied Intelligence is part of BAE Systems, a global defence, aerospace and security company with approximately 90,000 employees.  Learn more at www.baesystems.com/ai.

fsisac-fall-cisco-color.jpg

Cisco

kaspersky-rgb-fsisac-spring-2014.jpg

Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions and the owner of the most advanced global threat intelligence ecosystem. Kaspersky Lab technologies prevent cyber threats for over 300 million people and 250,000 corporate clients throughout 200 countries and territories. Kaspersky Fraud Prevention combines Kaspersky Lab's global security intelligence and innovative security technologies – to provide rigorous, multi-layered security for online and mobile transactions that prevent fraud by proactively breaking the fraud lifecycle at its earliest stages and eliminate financial information theft. These solutions minimize impact to the end user experience, enable cross-channel visibility, and provide comprehensive, measurable controls against fraud.

mandiant-fsisac-2012-web.gif

Mandiant

pan-logo-fsisac-spring-2014-2.jpg

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, steadfast commitment to innovation and game-changing next-generation security platform, more than 13,500 customers have chosen Palo Alto Networks and this number grows every day. Our platform natively brings together all key network security functions, including firewall, URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy products. As a result, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives like cloud, SDN and mobility, and protect the organization from the most basic to multi-faceted and complicated cyber attacks – known and unknown.

phishme-logo-rgb-2c.jpg

PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.

pindrop2014.png

Pindrop Security provides solutions to protect enterprise call centers and phone users. Pindrop's solution combines authentication and anti-fraud detection technology to verify legitimate callers while detecting malicious callers. Pindrop's unique Phoneprinting™ technology is the first of its kind to analyze and fingerprint individual phone calls, providing the caller's true location and calling device and matching them to Pindrop's fraud database. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner "Cool Vendor" in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security's solutions restore enterprises' confidence in the security of phone-based transactions.

final-logo.jpg

RiskIQ protects corporate brands and their customers on the internet. The company combines a worldwide proxy network with synthetic clients that emulate real users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and brands in the US to protect their web assets and visitors/users from security threats and fraud. RiskIQ is headquartered in San Francisco and is backed by growth equity firm Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.

sonatype-logo-whitebg.jpg

Sonatype

symantec-fsisac-spring-2013.gif

Symantec is a global leader in providing security; storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

threatmetrix-fsisac-fall-2013.jpg

ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix™ Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

trendmicrologo-notagline-printjpg.jpg

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.

In today's organizations, information has become the most strategic asset; embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need smart protection of information, with technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Trend Micro solutions enable a smart protection strategy for organizations. Smart. Simple. Security that fits.

Trend Micro provides layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For additional information, visit www.trendmicro.com

tripwire-logo-2014.jpg

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration managementvulnerability managementfile integrity monitoringlog and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.

websense-fsisac-2013.jpg

Websense

Silver Sponsors

Agari

Agari collects terabytes of email data from email receivers like Gmail and Yahoo! representing 85% of the email inboxes in the U.S., to provide global brands with a cloud-based SaaS solution that eliminates email threats, protects customers and their personal data, and proactively guards brand reputation.Today, Agari has analyzed over a trillion emails, and has blocked over a 2.5 billion malicious messages at a clip of over 200 per second. Founded by the thought leaders behind Cisco's IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award, is headquartered in Silicon Valleyand is backed by Alloy Ventures, Battery Ventures, First Round Capital, and Greylock Partners. Learn more at www.agari.com.

AirWatch by VMware

AirWatch is the leader in enterprise-grade mobility management and security solutions designed to simplify mobility. More than 10,000 customers across the world trust AirWatch to manage their most valuable assets: their mobile devices, including the applications, content and security requirements on those devices. From deployment through support, our highly scalable solution provides an integrated, real-time view of an entire fleet of corporate and employee-owned Apple iOS, Android, Windows, BlackBerry and Symbian devices.

As the largest MDM provider with more than 1,600 employees, 450 focused on R&D, AirWatch offers the most comprehensive mobility management solution providing: mobile security, device management, application management with SDK for enterprise apps, secure content management, and advanced mobile integration. Our solution's multi-tenant architecture allows for centralized, simultaneous management of multiple business units, geographies or brands. With a proven track record of deployments larger than 100,000 devices, organizations can confidently manage every single device used across the enterprise.

With AirWatch, IT professionals can fully automate device enrollment and configuration; mitigate business and legal risks associated with enterprise mobility; streamline the management of all mobile assets, applications and content; reduce the cost and effort of mobile device deployments; improve the support experience for mobile workers; increase mobile worker productivity; enable and enforce IT security policies; and increase IT and help desk efficiencies, productivity and response times.

Battelle Memorial Institute

Battelle Memorial Institute

BioCatch

BioCatch analyzes user interactions in online and mobile applications, providing visibility into a whole new dimension: user behavior. We collect hundreds of behavioral, cognitive and physiological biometric parameters by observing how the user holds and touches a mobile device, interacts with an online site, and responds to subtle challenges.

This allows us to continuously, biometrically authenticate users, detecting when someone else is inside their account. It's a completely frictionless authentication, and it works equally well on both mobile devices and PCs.

We spot abnormal interactions indicative of criminal behavior, separate between machines and humans, detect Remote Access (RAT) attacks, and identify advanced cyber threats such as Man in the Browser.

Gartner named us a Cool Vendor in their 2013 report and we have installations in US, Canada and Europe showing superb performance. Our team consists of subject matter experts in Cyber, machine learning, cognitive studies and web fraud detection.

CipherCloud

CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks.  CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, cloud data loss prevention, cloud malware detection and activity monitoring. CipherCloud's ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.

CipherCloud has experienced exceptional growth and success with over 2 million business users, more than 250 million customer records, in over 10 industries, and with marquee customers around the globe.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as Salesforce, Chatter, Box, Google Gmail, Microsoft Office 365, and Amazon Web Services. Additionally, CipherCloud for Any App and CipherCloud for Databases enable organizations to extend data protection to hundreds of third-party cloud and private cloud applications and databases.

CipherCloud, named as SC Magazine's 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

CSG International

CSG International

CXOWARE, Inc.

CXOWARE's RiskCalibrator is the only risk assessment and analysis application that effectively communicates the financial ramifications of cybersecurity risk to C-Level executives, BOD's, and auditors. For the first time CRO's, CIO's, & CISO's can identify and report on total cybersecurity loss exposure, show where risk is concentrated, and then optimize budgets and mitigation efforts. By understanding cybersecurity from a financial perspective, considerations such as budget allocations, cybersecurity insurance, and capital set-aside/loss reserves become more aligned with BOD and C-Level oversight and fiduciary care.

CyberArk

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world's leading companies – including 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.

Cylance

Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world's most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what's in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker's mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats. www.cylance.com

Guardian Analytics

Guardian Analytics offers behavioral analytics solutions that prevent online and mobile banking fraud, detect fraudulent ACH and wire payments, and detect unauthorized access to Web portals such as Web mail, wealth management, board portals, and merchant accounts.

FraudMAP behavioral analytics solutions provide banks and credit unions with the ability to proactively recognize account takeover, reconnaissance, and fraud setup, and stop fraudulent transactions before the money is gone, regardless of the fraud scheme in play.

For Guardian Analytics' 300+ customers, FraudMAP is a critical factor in their ability to achieve strategic business objectives, including improved competitiveness, revenue growth, enhanced customer experience and trust, and operational efficiency. By mitigating fraud risks, our customers can offer new and improved services while also decreasing costs stemming from fraud attacks, including direct losses, client churn, damaged reputations, lost productivity, and litigation.

Please stop by our display to see our full suite of behavioral analytics solutions, including FraudMAP Online, FraudMAP Mobile, FraudMAP ACH, FraudMAP Wire, and FraudMAP Access.

Imperva

Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

Invincea, Inc.

Invincea is the market leader in user protection solutions, delivering advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach— attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.

The company's solutions include a desktop security software suite and cloud hosted management and threat intelligence service. The solutions offer a unique ability to protect networks against all types of threats directed at end users, including zero-days, by seamlessly moving applications that render untrusted content into controlled, secure virtual containers that automatically detect and terminate threats in real time. Invincea's platform seamlessly moves the browser, PDF reader and Microsoft Office suite from the native operating system into secure virtualized environments without altering the user experience.

Netskope

Netskope™ is the leader in cloud app analytics and policy enforcement. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps. The Netskope Active Platform™ performs deep analytics and lets decision-makers create policies in a few clicks that prevent the loss of sensitive data and optimize cloud app usage in real-time and at scale, whether IT manages the app or not. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.

Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter@Netskope.

Northrop Gruman Corporation

Northrop Gruman Corporation

Shape Security

Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world's first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Venrock, Norwest, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley Networks, Palo Alto Networks, VMware, and Google.

ThreatTrack Security

ThreatTrack Security

Triumfant

Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Volatile Threat, Advanced Persistent Threatzero-day attacks, targeted attacks and rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image.  No signatures or prior knowledge of any kind are required to stop the adversary. Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready.  To learn more about the company go to: http://www.triumfant.com/default.asp or follow Triumfant on Twitter and YouTube.

Vorstack

Vorstack is a venture-backed company founded and staffed by security and legal experts. We offer solutions that provide automation and control over threat and fraud intelligence sharing, resulting in a significant reduction in human resources and earlier identification of relevant threats. The Vorstack solution for financial services is a distributed analytics and correlation platform for multi-party coordinated cyber defense. We provide the control and auditability necessary to satisfy strict domestic and international privacy, anonymity and compliance requirements. Our solution natively operates across emerging threat-sharing standards like STIX/TAXII to enable organizations to leverage public-private partnerships and ISACS to promote intelligence sharing. Vorstack's solution provides a configurable channel for human intelligence collaboration complementing real-time data intelligence analysis.

Bronze Sponsors

Accellion

Description

CyberSponse, Inc.

Description

DB Networks

DB Networks is innovating behavioral analysis technology in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks' unique approach uses behavioral analysis technology to automatically learn each application's proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack. DB Networks is a privately held company headquartered in San Diego, Calif.

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyberattacks. The company's CounterACT platform dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based mitigation of security issues. ForeScout's open ControlFabric technology allows a broad range of IT security products and management systems to share information and automate remediation actions. Because ForeScout's solutions are easy to deploy, unobtrusive, flexible and scalable, they've been chosen by over 1,500 enterprises and government agencies. Headquartered in Campbell, California, ForeScout offers its solutions through its network of authorized partners worldwide.

HP

HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today's most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today.

More information about HP Enterprise Security Products is available at www.hpenterprisesecurity.com.

Lookingglass

Lookingglass Cyber Solutions is the world leader in threat intelligence monitoring and management enabling global cyber threat visibility and risk decision support. With its ScoutVisionTM and CloudScoutTM products, Lookingglass leverages all-source intelligence to provide context and continuously monitor threats far and near, such as the presence of botnets, hosts associated with cybercriminal networks, unexpected route changes and the loss of network resiliency. Lookingglass' outside-in approach accounts for a client's entire enterprise cyber ecosystem including the extended enterprise, and other networks beyond their control. This visibility brings an unprecedented view to help organizations understand their risks and enable a more proactive approach to the management of their overall security posture. For more information, visit www.LGScout.com.

Lookout

Description

Norse

Norse is the leading innovator in the live threat intelligence security market. With the goal of transforming the traditionally reactive IT security industry, Norse offers proactive, intelligence-based security solutions that enable organizations to identify and defend against the advanced cyberthreats of today and tomorrow. Norse's synchronous, global platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high-risk Internet traffic to identify the sources of cyber attacks and fraud. Norse is the only provider of live, actionable, cyberthreat intelligence that enables organizations to prevent financial fraud and proactively defend against today's most advanced cyber threats including zero day and advanced persistent threats. Norse has offices in Silicon Valley, St. Louis, and Atlanta. Visit us online at norse-corp.com.

NSS Labs, Inc.

Description

PwC

PwC US helps organizations and individuals create the value they're looking for. We're a member of the PwC network of firms in 158 countries with more than 180,000 people. We're committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/us

Return Path

Return Path is the worldwide leader in email threat intelligence. We analyze more data about email than anyone else in the world and use that data to power solutions that protect your brand and customers from the full-spectrum of email-borne threats. Our email brand protection solutions provide financial services organizations with a proactive means of mitigating fraud risk and potential financial loss by providing real-time visibility into all outbound mail activity, blocking malicious email from reaching customers, and forensic data for efficient takedown of malicious sites.

 Additional Sponsors

CyberSponse, Inc.

Padfolios
Full Page Handbook Ad
Premiere Signage Banner

Description

Cyveillance

Description

eSentire

Bag Insert
Full Page Handbook Ad
After Hours Hospitality Suite
(Wednesday)
After Hours Hospitality Suite
(Tuesday)
Lanyard Sponsor
Conference Totebags

Description

HP

HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today's most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today.

More information about HP Enterprise Security Products is available at www.hpenterprisesecurity.com.

Invincea, Inc.

Full Page Handbook Ad
Key Cards

Invincea is the market leader in user protection solutions, delivering advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach— attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.

The company's solutions include a desktop security software suite and cloud hosted management and threat intelligence service. The solutions offer a unique ability to protect networks against all types of threats directed at end users, including zero-days, by seamlessly moving applications that render untrusted content into controlled, secure virtual containers that automatically detect and terminate threats in real time. Invincea's platform seamlessly moves the browser, PDF reader and Microsoft Office suite from the native operating system into secure virtualized environments without altering the user experience.

Lookout

Off-site Dinner Monday Night

Description

NetSPI

Description

Ntrepid Corporation

Description

RiskIQ

RiskIQ protects corporate brands and their customers on the internet. The company combines a worldwide proxy network with synthetic clients that emulate real users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and brands in the US to protect their web assets and visitors/users from security threats and fraud. RiskIQ is headquartered in San Francisco and is backed by growth equity firm Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.

ThreatGrid

Full Page Handbook Ad

Description

vArmour

Off-site Dinner Monday Night

Privately held and based in Santa Clara, CA, vArmour Networks is the pioneer of software-defined security (SDSec). vArmour's SDSec solution brings a scalable, flexible, programmable network security enforcement layer to highly-virtualized computing environments in a way that fits; the security now mirrors the environment, rather than contorting the environment to fit the security.

For more information, visit www.varmour.com.

 

 

 




?