To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CXO to attend as a conference attendee.
Partner of the Year
EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect, and analyze their most valuable asset—information—in a more agile, trusted, and cost-efficient way.
Learn more at www.EMC.com
Founded in 2005, Box (NYSE: BOX) is transforming the way people and organizations work, so they can achieve their greatest ambitions. As the world's leading enterprise software platform for content collaboration, Box helps business of all sizes - in every industry - securely access and manage their critical information in the cloud. Headquartered in Redwood City, CA, Box has offices across the United States, Europe and Asia. To learn more about Box, visit www.box.com.
Learn more at www.box.com
National Thought Leader
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software-as-a- Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage — even malware-free intrusions. Falcon’s patented lightweight endpoint sensor can be deployed to over 100,000 endpoints in hours providing visibility into billions of events in real-time. CrowdStrike operates on a highly scalable subscription-based business model that allows customers the flexibility to use CrowdStrike-as-a-Service to multiply their security team’s effectiveness and expertise with 24/7 endpoint visibility, monitoring, and response
Learn more at www.crowdstrike.com
PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Learn more at www.phishme.com
Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, virtual and cloud environments. Data is the new currency and Vormetric helps enterprise customers and government agencies protect what matters — their sensitive data — from both internal and external threats. In a world of Advanced Persistent Threats (APTs), Vormetric’s market-leading privileged user access controls and security intelligence are invaluable. The company's scalable solution suite protects any file, any database and any application — anywhere it resides — while maintaining application performance and avoiding key management complexity. Many of the world's largest and most security-conscious organizations and government agencies, including 17 of the Fortune 25, have standardized on Vormetric to protect their sensitive data and provide them with advanced security intelligence.
Learn more at www.vormetric.com
Cybereason was founded in 2012 by a team of ex-military cyber security experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel and Tokyo, Japan.
Learn more at www.cybereason.com/
Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT™ stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Visit www.cylance.com or call 877-973-3336 for more information.
Learn more at www.cylance.com/
Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber
Learn more at www.fidelissecurity.com
FireEye® has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,000 customers across more than 40 countries, including over one-third of the Fortune 100.
Learn more at www.fireeye.com
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere — in the cloud, on the road, in the office — simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.
Learn more at www.forcepoint.com
Fortinet, a global provider of IT security, delivers customer-proven solutions providing organizations with the power to protect and control their IT infrastructure. Our customers rely on our purpose-built technologies, integrated solution architecture, and global security intelligence to block external threats and gain precise control of their network, data, and users. With 170,000+ customers in every industry around the world, Fortinet has the broad base of experience necessary to help secure diverse networks, and improve network and business performance.
Fortinet maintains a robust focus on security, and was created with an integrated security vision to increase protection and
control, while optimizing performance, simplifying management and reducing costs. The company pioneered an innovative,
high performance multithread network security platform to address the fundamental problems of ever-evolving, sophisticated
multi-vector IT threat landscape. Fortinet has pursued that vision for the last 14 years and continues to innovate and enrich
its solution portfolio.
Learn more at www.fortinet.com
Innovation is in IBM's DNA, bringing new approaches to clients, the company, and the world at large. Today, IBM is much more than a "hardware, software, services" company. IBM is emerging as a cognitive solutions and cloud platform company. Using Watson-powered technology, IBM is creating new ways of understanding, reasoning, and learning from data to develop businesses that think. And when your business thinks, you can outthink challenges, competitors, limits, and more.
Learn more at www.ibm.com/outthink
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. More than 2,000 customers, including Adobe, Allergan, Chiquita, LinkedIn, MGM Resorts International and Western Union, trust Okta to help their organizations work faster, boost revenue, and stay secure.
Learn more at www.okta.com
Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.
Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.
Learn more at www.optiv.com
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this we safely enable applications, users and content and deliver visibility, automation and control, as well as the ability to detect and prevent breaches at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.
Learn more at www.paloaltonetworks.com
Saviynt is the leading provider of access and data governance & intelligence solutions across Cloud, Critical Enterprise Applications, and Big Data platforms (e.g. Office 365, Workday, Box, SAP, Epic, SAP HANA, Hadoop, Oracle EBS, PeopleSoft, etc.) Saviynt combines application access management, usage analytics, data access governance, and security & compliance controls to secure enterprise applications & data assets.
Learn more at saviynt.com/
ServiceNow is changing the way people work. With a service-orientation toward the activities, tasks and processes that make up day-to-day work life, we help the modern enterprise operate faster and be more scalable than ever before. Customers use our service model to define, structure and automate the flow of work, removing dependencies on email and spreadsheets to transform the delivery and management of services for the enterprise. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more. We deliver a ‘lights-out, light-speed’ experience through our enterprise cloud — built to manage everything as a service.
Learn more at www.servicenow.com
Splunk Enables Operational Intelligence
Splunk is software used to monitor, report and analyze machine data. This data is generated by all applications, systems and infrastructure - located on-premise or in the cloud. Machine data is massive in scale, unstructured and contains a definitive record of transactions, systems, applications and user activity. It’s also largely unused, trapped in rigid, silo-based systems. Only Splunk lets you capture and analyze real-time and historical machine data in one place, so you can unlock its value.
Learn more at www.splunk.com
Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005, Workday delivers human capital management, financial management, and analytics applications designed for the world’s largest organizations. Hundreds of companies, ranging from medium-sized businesses to Fortune 50 enterprises, have selected Workday.
Learn more at www.workday.com
CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies — including 40 of the Fortune 100 — to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Learn more at www.cyberark.com
FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies and risk. Using the FireMon Security Intelligence Platform, today’s enterprise organizations, government agencies and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. Built around a massively scalable engine and distributed data architecture, FireMon Security Manager and the Policy Planner, Policy Optimizer and Risk Analyzer modules empower proactive firewall cleanup, policy change workflow, compliance assessment and IT risk mitigation — providing a closed loop approach to network security infrastructure management while reducing related expenses.
Learn more at www.firemon.com
Kudelski Security is the premier advisor and cybersecurity innovator for today’s most security-conscious organizations. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to recommend solutions that reduce business risk, maintain compliance and increase overall security effectiveness. With clients that include Fortune 500 enterprises and government organizations in Europe and across the United States, we address the most complex environments through an unparalleled set of solution capabilities including advisory, technology, managed security services and custom innovation.
Learn more at www.kudelskisecurity.com
LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC) and information security (InfoSec) software. Built on the patented Dynamic Content Framework (DCF), LockPath’s flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. LockPath serves a client base of global organizations ranging from small and midsize companies to Fortune 10 enterprises in more than 15 industries. LockPath is headquartered in Overland Park, Kansas.
Learn more at www.lockpath.com
Mimecast makes business email and data safer for more than 15,000 customers and millions of employees worldwide. Founded in 2003, the Company's next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management in a single, fully-integrated subscription service. Mimecast reduces email risk and the complexity and cost of managing the array of point solutions traditionally used to protect email and its data. For customers that have migrated to cloud services like Microsoft Office 365, Mimecast mitigates single vendor exposure by strengthening security coverage, combating downtime and improving archiving.
Mimecast Email Security protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages. Mimecast Enterprise Information Archiving unifies email, file and instant messaging data to support e-discovery and give employees fast access to their personal archive via PC, Mac and mobile apps.
Learn more at www.mimecast.com/
Netskope™ is the leader in safe cloud enablement. Only the Netskope Active Platform™ enables you to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Netskope is headquartered in Los Altos, California. Follow us on twitter @Netskope. To learn more, visit www.netskope.com
Learn more at www.netskope.com
Rimini Street is the leading independent provider of enterprise software support services. Our innovative, award-winning program enables Oracle and SAP licensees to save 50 percent on their annual support fees and up to 90 percent on overall support costs over a decade. Clients can remain on their current software release without any required upgrades for fifteen years or more while receiving ultra-response premium service including support for customizations at no extra cost.
Learn more at www.riministreet.com
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc
Learn more at www.tripwire.com
Veracode’s cloud-based solutions and security services help enterprises and government agencies find vulnerabilities in internally developed software, mobile apps, web applications, and applications across the software supply chain. By working with these organizations, Veracode is securing the world’s software and creating a more secure environment for businesses and consumers. Founded in 2006, Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information about Veracode, visit www.veracode.com, follow @Veracode on Twitter or read the Veracode Blog.
Learn more at www.veracode.com
Vidder brings to market the industry’s first secure connectivity commercial solution based on software-defined perimeter technology. Our flagship solution, PrecisionAccess, “shrinks” the perimeter and creates a new layer of defense around individual applications. The trust-before-connect architecture keeps everyone outside the new perimeter, hiding application servers from all users and devices. Only trust-verified users are allowed connectivity at the application-level. The result is a significantly reduced attack surface. Combining that with transparent multi-factor authentication executed for every user and every connection, PrecisionAccess defeats credential theft, server exploitation, man-in-the-middle, and lateral movement attacks. Offered as-a-Service, PrecisionAccess delivers OpEx and CapEx savings, accelerates agility associated with cloud and business ecosystem collaboration, while reducing risk for traditional IT.
Learn more at www.vidder.com/