To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Presenting Sponsors
Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine technology, services, support, and training. FishNet Security solutions have enabled 4,500 clients to better manage risk, meet compliance requirements, and reduce costs while maximizing security effectiveness and operational efficiency.
Learn more at www.fishnetsecurity.com
RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.
Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.
Learn more at www.EMC.com/RSA
Since data has no natural defenses, it requires protection that’s as close to it as possible. This is precisely what Vormetric provides. Trusted by businesses and governments for over a decade, Vormetric’s data-cen¬tric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through: Access Policies and Privileged User Control - Fine-grained control to determine who can access specific data in order to block privileged users such as root as well as Advanced Persistent Threats (APTs). Data Encryption and Centralized Key Management - Lock down data using strong industry approved algorithms coupled with a security appliance for key and policy management. Security Intelligence - Compliance reports and continuous monitoring provide visibility and sophisticated analytics on access to sensitive data.
Learn more at www.vormetric.com
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.
Learn more at www.bluecoat.com
Damballa is the pioneer in the fight against advanced malware, botnets and other persistent threats. Damballa detects malicious malware and their command-and-control communications that criminals use to steal intellectual information, conduct espionage and perform fraudulent transactions. Patent-pending solutions from Damballa are platform and system-agnostic and protect any type of network or device. Damballa customers include Fortune 1000 companies, Internet and telecommunications service providers, government agencies and educational organizations.
Learn more at www.damballa.com
PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Learn more at www.Phishme.com
CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies — including 40 of the Fortune 100 — to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Learn more at www.cyberark.com
Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs.
Learn more at www.secureworks.com/
FireEye® has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,000 customers including over one-third of the Fortune 100.
Learn more at www.fireeye.com
Okta is the market leading on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web based applications, both in the cloud and behind the firewall. Okta delivers a complete solution addressing the needs of IT, end users, and business leaders; no customization required.
With a catalog of pre-integrated applications and deep integration with Active Directory, Okta provides IT centralized user provisioning, access management, and reporting. Every end user gets a personalized, single sign-on home page for all of their applications, and business leaders get the insight they need to maximize ROI and track compliance.
Learn more at www.okta.com
Solutionary is the leading pure-play managed security service provider (MSSP), focused on delivering managed security services and global threat intelligence. Comprehensive Solutionary security monitoring and security device management services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Solutionary clients are able to optimize current security programs, make informed security decisions, achieve regulatory compliance and reduce costs. The patented, cloud-based ActiveGuard® service platform uses multiple detection technologies and advanced analytics to protect against advanced threats. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extension of clients’ internal teams, providing industry-leading client service to global enterprise and mid-market clients in a wide range of industries, including financial services, healthcare, retail and government. Services are delivered 24/7 through multiple, state-of-the-art Security Operations Centers (SOCs) in North America.
Learn more at www.solutionary.com
Tripwire, Inc. is the world leader in Change Auditing solutions that enable enterprises to reduce operational risk and gain control over IT systems. With Tripwire software, you ensure the security of your systems, instill accountability for change, gain visibility across your enterprise and increase the availability of critical IT infrastructure.
Tripwire Change Auditing solutions go beyond basic change and configuration management tools to provide independent detective controls. They also deliver the objective reporting you need to close the loop on change. And gain the proof you need for satisfying compliance and security requirements.
Learn more at www.tripwire.com
Arbor Networks is the leading provider of network security and management solutions for enterprise and service provider networks. Arbor Networks protects enterprises from distributed denial of service attacks and advanced malware using Arbor’s global network intelligence. Arbor's proven solutions help grow and protect customer networks, businesses and brands.
Learn more at www.arbornetworks.com/
Delivering complete and connected solutions Dell Software empowers organizations of all sizes to experience Dell’s “power to do more” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results.
Learn more at www.dellsoftware.com
Dropbox simplifies the work and personal lives of millions of people by letting them bring their documents, photos, and videos anywhere and share them easily. The service has more than 200 million users and is used in over 4 million businesses, with 1 billion files saved per day. Dropbox for Business allows employees to securely share and collaborate, and is used by companies like BCBG, Eventbrite, Kayak, National Geographic, Rockstar Energy, and Sur La Table.
Learn more at www.dropbox.com/business
Fortinet delivers unified threat management and specialized security solutions that block today’s sophisticated threats. Our consolidated architecture enables our customers to deploy fully integrated security technologies in a single device, delivering increased performance, improved protection, and reduced costs. Purpose-built hardware and software provide the high performance and complete content protection our customers need to stay abreast of a constantly evolving threat landscape. Our customers rely on Fortinet to protect their constantly evolving networks in every industry and region in the world. They deploy a robust defense-in-depth strategy that improves their security posture, simplifies their security infrastructure, and reduces their overall cost of ownership.
Learn more at www.fortinet.com
GuruCul is the leading provider of security and business intelligence solutions. GuruCul products will improve risk, threat, and compliance postures by applying a unique identity centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed industry’s most advanced patent pending algorithms for risk profiling and analyzing trends, to detect threats and anomalous behavior. GuruCul’s intelligent risk platform will help your organization efficiently protect intellectual property and effectively manage risk.
GuruCul Risk Analytics Capabilities
• 360 degree view of user Identity, Access, and Activity Profile Information
• Advanced Identity, Access, and Activity Analytics
• Insider and Advanced Persistent Threat Detection
• Risk Based Access Controls
• Privileged & Shared Account Monitoring
• Identity and Access Intelligence
• Risk Based Compliance
• Activity Self Audit Statements
• Forensic / Investigation Assistance
• Intelligent Roles Based Access
Learn more at www.gurucul.com
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of insidious attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and dramatically reduces enterprise risk. Lancope’s anomaly detection capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs security research team.
Learn more at www.lancope.com
Lumeta’s network situational awareness solutions identify and map every IP connected device on a network and discover inbound and outbound leak paths, giving IT management a clear, comprehensive assessment of network vulnerabilities, cyber-threat risks and policy violations from network edge to core. Lumeta provides foundational intelligence required to make decisions impacting security, compliance and availability. Lumeta’s products deliver an efficient and cost-effective process to streamline network consolidation (M&A) projects, as well as addresses today’s security initiatives associated with BYOD, Mobility, Cloud, Outsourcing, SDN, Access Control and Big Data which increase the complexity of a network and compromise traditional security defenses. Lumeta optimizes other network and security product investments with accurate and fact-based network intelligence.
Learn more at www.lumeta.com
McAfee, Inc., headquartered in Santa Clara, California, is the world's largest dedicated security technology company. It delivers proactive and proven solutions and services that secure systems and networks around the world, allowing users to browse and shop the Web securely. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector and service providers by enabling them to comply with regulations, protect data, prevent disruptions, identify vulnerabilities and continuously monitor and improve their security.
Learn more at www.mcafee.com
The leader in Mobile Device Management software, MobileIron has been chosen by thousands of organizations that are transforming their businesses through Mobile IT. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls.
Learn more at www.mobileiron.com
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, steadfast commitment to innovation and game-changing next-generation security platform, more than 13,500 customers have chosen Palo Alto Networks and this number grows every day. Our platform natively brings together all key network security functions, including firewall, URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy products. As a result, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives like cloud, SDN and mobility, and protect the organization from the most basic to multi-faceted and complicated cyber attacks — known and unknown.
Learn more at www.paloaltonetworks.com
PwC helps organizations and individuals create the value they’re looking for. We’re a network of firms in 158 countries with more than 180,000 people who are committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com.
PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.
Learn more at www.pwc.com
Splunk Enables Operational Intelligence
Splunk is software used to monitor, report and analyze machine data. This data is generated by all applications, systems and infrastructure - located on-premise or in the cloud. Machine data is massive in scale, unstructured and contains a definitive record of transactions, systems, applications and user activity. It’s also largely unused, trapped in rigid, silo-based systems. Only Splunk lets you capture and analyze real-time and historical machine data in one place, so you can unlock its value.
Learn more at www.splunk.com
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Trend Micro Incorporated, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. Our innovative security solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe.
Learn more at www.trendmicro.com
Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 23,000 employees, Unisys serves commercial organizations and government agencies throughout the world.
Learn more at www.unisys.com
Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise's spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise's financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. As of December 31, 2013, Varonis had approximately 2,400 customers, spanning leading firms in the financial services, public, healthcare, energy & utilities, industrial, technology, consumer and retail, education and media & entertainment sectors.
Learn more at www.varonis.com/
Veracode’s cloud-based service is a simpler and more scalable approach to reduce application-layer risk across your entire global software infrastructure -- including web, mobile and third-party applications -- without hiring more consultants or installing more servers and tools. With Veracode's smart approach to application security, you can drive your innovations to market faster -- without sacrificing security in the process.
Learn more at www.veracode.com
WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company's flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.
Learn more at www.whitehatsec.com