To learn more about sponsorship opportunities and if your organization has been nominated to participate, please contact our conference facilitators.
Nominated partners who elect not to sponsor may not otherwise attend the conference. Qualified partner organizations may, however, submit a request for an invitation for their CISO to attend as a conference attendee.
National Presenting Sponsors
RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle - no matter where it moves, who accesses it or how it is used. RSA offers industry-leading solutions in identity assurance & access control, data loss prevention, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated.
Learn more at www.rsa.com
Websense, Inc., a global leader in unified Web, data, and email content security, delivers the best security for modern threats at the lowest total cost of ownership, delivered as software, appliances, and Security-as-a-Service (SaaS). Websense content security helps organizations take advantage of powerful new communication, collaboration, and Web 2.0 business tools while protecting from advanced persistent threats, preventing the loss of confidential information, and enforcing Internet use and security policies. Websense is headquartered in San Diego, Calif. with offices around the world.
Learn more at www.websense.com
With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.
Learn more at www.beyondtrust.com/
Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs.
Learn more at www.secureworks.com/
IBM Security offers one of the world’s broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research and development, provides the security intelligence to help organizations holistically protect its people, infrastructure, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more, enabling organizations to effectively manage risk and implement integrated security solutions for mobile, cloud, social media and other enterprise business architectures.
The IBM approach is based on three main tenets:
Security Intelligence: Helps detect and remediate breaches via real time processing and predictive analytics of millions of security events delivered from its framework products and services — as well as third party offerings.
Integration: The integration of IBM’s comprehensive portfolio of Security Intelligence, X-Force® research and development, and core protection products and services helps “plug the holes” of competitive point product approaches.
Expertise: IBM operates one of the world's broadest security research and development and delivery organizations comprising of ten security operations centers, ten IBM Security Research centers, 15 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific.
Learn more at ibm.com/security
PhishMe.com provides organizations the ability to train their employees about the risks of spear phishing. Since its launch in 2008, PhishMe has proven that its trainings can reduce the threat of employees falling victim to phishing attacks by up to 80 percent. PhishMe.com facilitates and automates the execution of mock phishing exercises against employees, provides clear and accurate reporting on user behavior and instant, targeted training. This method of delivering training materials is recommended by SANS. PhishMe works with Federal Agencies and Fortune 1000 companies across multiple vertical market sectors. For additional information, please visit: www.phishme.com.
Learn more at www.Phishme.com
Solutionary reduces the information security and compliance burden, delivering flexible managed security services that align with client goals, enhancing organizations’ existing security program, infrastructure and personnel. The company’s services are based on experienced security professionals, data-driven and actionable threat intelligence, and the ActiveGuard service platform that provide expert security and compliance management. Solutionary works as an extension of clients’ internal teams, providing industry-leading customer service, patented technology, thought leadership, years of innovation and proprietary certifications that exceed industry standards. This client focus and dedication to customer service has enabled Solutionary to boast one of the highest client retention rates in the industry.
Solutionary provides 24/7 services to mid-market and global, enterprise clients through two security operations centers (SOCs) in the Americas, and is positioned by Gartner as a “Leader” in the MSSP Magic Quadrant. Learn more at www.solutionary.com.
Learn more at www.solutionary.com
WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company's flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.
Learn more at www.whitehatsec.com
Aveksa provides the industry’s most comprehensive, purpose-built, enterprise-class, Access Governance automation platform. Aveksa enables organizations to manage the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation. Aveksa helps IT organizations reduce access management complexity and increase operational efficiency while minimizing risk and ensuring sustainable compliance. Leading Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing rely on Aveksa to efficiently address access request, fulfillment and regulatory compliance demands.
Learn more at www.aveksa.com
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.
Learn more at www.bluecoat.com
Cisco is the worldwide leader in networking that transforms how people connect, communicate, and collaborate. Since 1984, Cisco has led in the innovation of IP-based networking technologies, including routing, switching, security, TelePresence systems, unified communications, video, and wireless. The company's responsible business practices help ensure accountability, business sustainability, and environmentally conscious operations and products.
Learn more at www.cisco.com
Learn more at www.cisco.com
FileTrek provides an innovative approach to information security and forensic investigations by using worklog data of enterprise users. The solution addresses the challenges related to advanced detection of risk and data loss by effectively tracking and maintaining control over sensitive unstructured information and intellectual property. Actionable insights obtained from the software include alerts of anomalous file activities, chain of custody reports, and analytics of relationships between data, devices and people.
Learn more at www.filetrek.com
FireEye stops the modern malware infection lifecycle that places sensitive data, intellectual property, and critical infrastructure at risk of theft, alteration, and destruction. The FireEye Malware Protection System is powered by an integrated inbound Malware-VM and outbound Malware-Callback filter that stops zero-day, targeted malware at a near-zero false positive rates and does not rely on signatures. With a unique virtual machine confirmation technology, it very accurately stops true zero-day, targeted attacks and easily deploys in a plug-and-play network appliance that can be connected into the global FireEye MAX Cloud Intelligence network. Stop the possibility of a data breach with FireEye.
Learn more at www.fireeye.com
FireMon provides enterprises with security management software that gives them deeper visibility and tighter control over their network security infrastructure. Its integrated solution set—including Security Manager, Policy Planner, Risk Analyzer and BackBox—enables customers to identify network risk, proactively eliminate those vulnerabilities and strengthen security throughout the organization, and reduce the cost of security operations. The insight and control delivered by the solution set enable IT and security teams to take an educated and coordinated approach to network planning and protection. Most importantly, FireMon helps companies automatically find and fix potential problem areas before they impact the network.
Learn more at www.firemon.com
Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine technology, services, support, and training. FishNet Security solutions have enabled 4,500 clients to better manage risk, meet compliance requirements, and reduce costs while maximizing security effectiveness and operational efficiency.
Learn more at www.fishnetsecurity.com
Fortinet delivers unified threat management and specialized security solutions that block today’s sophisticated threats. Our consolidated architecture enables our customers to deploy fully integrated security technologies in a single device, delivering increased performance, improved protection, and reduced costs. Purpose-built hardware and software provide the high performance and complete content protection our customers need to stay abreast of a constantly evolving threat landscape. Our customers rely on Fortinet to protect their constantly evolving networks in every industry and region in the world. They deploy a robust defense-in-depth strategy that improves their security posture, simplifies their security infrastructure, and reduces their overall cost of ownership.
Learn more at www.fortinet.com
GuruCul is the leading provider of security and business intelligence solutions. GuruCul products will improve risk, threat, and compliance postures by applying a unique identity centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed industry’s most advanced patent pending algorithms for risk profiling and analyzing trends, to detect threats and anomalous behavior. GuruCul’s intelligent risk platform will help your organization efficiently protect intellectual property and effectively manage risk.
GuruCul Risk Analytics Capabilities
• 360 degree view of user Identity, Access, and Activity Profile Information
• Advanced Identity, Access, and Activity Analytics
• Insider and Advanced Persistent Threat Detection
• Risk Based Access Controls
• Privileged & Shared Account Monitoring
• Identity and Access Intelligence
• Risk Based Compliance
• Activity Self Audit Statements
• Forensic / Investigation Assistance
• Intelligent Roles Based Access
Learn more at www.gurucul.com
McAfee, Inc., headquartered in Santa Clara, California, is the world's largest dedicated security technology company. It delivers proactive and proven solutions and services that secure systems and networks around the world, allowing users to browse and shop the Web securely. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector and service providers by enabling them to comply with regulations, protect data, prevent disruptions, identify vulnerabilities and continuously monitor and improve their security.
Learn more at www.mcafee.com
The leader in Mobile Device Management software, MobileIron has been chosen by thousands of organizations that are transforming their businesses through Mobile IT. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls.
Learn more at www.mobileiron.com
PwC helps organizations and individuals create the value they’re looking for. We’re a network of firms in 158 countries with more than 180,000 people who are committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com.
PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.
Learn more at www.pwc.com
Splunk Enables Operational Intelligence
Splunk is software used to monitor, report and analyze machine data. This data is generated by all applications, systems and infrastructure - located on-premise or in the cloud. Machine data is massive in scale, unstructured and contains a definitive record of transactions, systems, applications and user activity. It’s also largely unused, trapped in rigid, silo-based systems. Only Splunk lets you capture and analyze real-time and historical machine data in one place, so you can unlock its value.
Learn more at www.splunk.com
Tevora is the nation’s premier management consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world's leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations
Learn more at www.tevora.com
Tripwire, Inc. is the world leader in Change Auditing solutions that enable enterprises to reduce operational risk and gain control over IT systems. With Tripwire software, you ensure the security of your systems, instill accountability for change, gain visibility across your enterprise and increase the availability of critical IT infrastructure.
Tripwire Change Auditing solutions go beyond basic change and configuration management tools to provide independent detective controls. They also deliver the objective reporting you need to close the loop on change. And gain the proof you need for satisfying compliance and security requirements.
Learn more at www.tripwire.com
Boston-based Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect businesses against advanced threats and prevent data breach. Hundreds of organizations and millions of end users rely on Trusteer to protect critical endpoint applications on computers and mobile devices from advanced malware and spear-phishing attacks. Trusteer’s Cybercrime Prevention Architecture combines multi-layer security software with real-time threat intelligence to stop emerging threats that are invisible to legacy security solutions.
Learn more at www.trusteer.com
Veracode defends the software fueling the world's most innovative companies. We enable Security and IT professionals to stay vigilant in identifying and mitigating security risks of all business-critical applications including internally developed, externally procured, web, non-web and mobile applications. Our security expertise and unwavering support help you combat the common to cutting-edge attacks that put your company and customers at risk. By efficiently managing compliance within the organization and with outside software suppliers, we honor your mission to minimize risk while accelerating growth.
Learn more at www.veracode.com