Previous sponsors

Clients we've worked with include:

Agari is the only cloud-native solution that uses predictive AI to stop advanced email attacks. Winner of Best Email Security Solution by SC Magazine in 2018, the Agari Email Trust Platform™ prevents ransomware, ATO, phishing, BEC and other identity deception attacks, restoring trust to digital channels for businesses, governments, and consumers worldwide. Learn more at www.agari.com.

Digital transformation has significant implications for an enterprise’s attack surface and network and security architectures. Users, devices, applications, and data are moving outside of the enterprise perimeter and zone of control and are exposed. “Trust but verify” is no longer an option for businesses. Akamai helps businesses employ a Zero Trust security policy for users and devices by extending their perimeter to the cloud so the perimeter and security goes everywhere the users and devices go.

    

    As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale with over 240,000 servers across 130 countries, within more than 1,600 networks, giving customers superior performance and threat protection. Akamai’s portfolio of cloud security, enterprise access and threat protection, web and mobile performance, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top businesses trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter.

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments.

BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network.

Learn more at www.beyondtrust.com.

 


BT is one of the world’s leading providers of communications services and solutions, serving customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services to its customers for use at home, at work and on the move; broadband and internet products and services and converged fixed/mobile products and services. BT consists principally of four lines of business: BT Global Services, BT Retail, BT Wholesale and Openreach.

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2015 Awards.
 
For further information, please visit www.carbonblack.com/


Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, their devices, and limits access and privilege.  Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM).  Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.

www.centrify.com


Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with its new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.


Cigital is one of the world’s leading software security products and services companies. We help clients make the software they create or license from third-party vendors more secure. Our expert consultants, innovative product technologies, and effective training courses provide a comprehensive solution to reduce the risk and cost of breaches and non-compliance with a proactive approach to software security. From Architecture Risk Analysis and BSIMM Measurements to Source Code Review and Penetration Testing, Cigital is uniquely qualified to help clients find and fix the security flaws and defects that make software vulnerable to being attacked and exploited.
For more information please visit: http://www.cigital.co.uk/


Cofense™, formerly PhishMe, is the leading provider of human-driven phishing defence solutions worldwide. Our collective defence suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. Cofense enables thousands of global organisations to stop attacks in progress faster and stay ahead of breaches. Learn more at www.cofense.com.


CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.

CrowdStrike Falcon protects customers against all cyber-attack types, using sophisticated signatureless AI and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates over 100 billion security events a day from across the globe to immediately prevent and detect threats.

There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.

CrowdStrike was positioned the highest in ability to execute and furthest in completeness of vision in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP).

You can gain full access to CrowdStrike Falcon Prevent™ by starting your free trial here.

 


Cylance® uses artificial intelligence to deliver prevention-first, predictive security solutions that changes how organizations, governments, and end-users approach endpoint security. Cylance’s security solutions combine AI driven predictive prevention with dynamic threat detection and response to deliver full spectrum threat prevention and threat visibility across the enterprise.

The next generation antivirus product, CylancePROTECT®, delivers industry leading malware prevention powered by artificial intelligence, combined with application and script control, memory protection, and device policy enforcement to prevent successful cyberattacks. Without the use of signatures or the need to stream data to the cloud, CylancePROTECT combats common threats such as malware, ransomware, fileless malware, malicious scripts, weaponized docs, and many other attack vectors, no matter where the endpoint resides. With unmatched effectiveness, ease of use, and minimal system impact, CylancePROTECT is the best way to prevent both known and unknown attacks before they can execute.

Augmenting CylancePROTECT prevention, CylanceOPTICS™ is an endpoint detection and response (EDR) component that enables easy root cause analysis, threat hunting and automated threat detection and response. Unlike other EDR products that require organizations to make significant investment in on-premises infrastructure and/or stream data to the cloud continuously, and employ highly skilled security resources, CylanceOPTICS is designed to automate the threat detection and response tasks using existing resources, reducing the workload on security analysts without increasing costs.

The combination of predictive threat prevention, detection, response, and expert services allows Cylance to protect your endpoints without increasing staff workload or costs.

Cylance’s Consulting Services provide pre-attack penetration and vulnerability testing, compromise assessments, and postattack incident response. Cylance specializes in securing critical infrastructure and key resources for education, energy, financial services, government, healthcare, heavy industry, oil, gas, retail, technology, and other industries.


Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface.


eSentire® is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organisations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Centre (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than £3 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire


Die Exclusive Networks Group verbindet neue und wachsende globale Technologie-Anbieter für den paneuropäischen Markt durch ihr Modell des „Super Value Add Distributors“. Das Unternehmen ist spezialisiert auf Sicherheits-, Netzwerk-, Infrastruktur- und Storage-Lösungen für das 'Smarter Social Enterprise'. Bekannt als Early Adopter und Technikexperten vertreiben wir Produkte führender und aufstrebender Hersteller aus Europa, USA und Fernost ausschließlich über den indirekten Kanal.
 
Mit unserer integrierten Lösungsplattform CARM (Cyber Attack Remediation and Mitigation) befinden wir uns an vorderster Front der ‘Post-Breach’-Security, also einer nach entstandenen Lücken einsetzenden Sicherheit. Diese einzigartige Plattform bringt Anbietertechnologien nahtlos in einer umfassenden, vollständig nachweisbaren End-to-End-Lösung zusammen und ermöglicht so Unternehmen, die Auswirkungen von Sicherheitslücken zu identifizieren, einzudämmen, auf sie zu reagieren, sie zu beseitigen und einzuschränken.
Die Frage ist nicht ‘ob’, sondern ‘wann’ eine Lücke entsteht. Und wenn sie entsteht, müssen Sie die richtigen Anbieter für integrierte Sicherheit zur Hand haben, die entsprechend agieren können – Zeitpunkt und Ort der Lücke identifizieren und entscheiden, was als nächstes getan werden soll. Die Cyber Attack Remediation & Response Plattform (kurz CARM) von Exclusive Networks sorgt dafür, dass Sie vorbereitet sind, wenn das Unvermeidbare geschieht!

Fuer weitere Informationen, besuchen Sie uns auf: www.exclusive-networks.com


FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 103 countries, including more than 50 percent of the Forbes Global 2000. 


Flashpoint delivers converged intelligence and risk solutions to private and public sector organizations worldwide. As the global leader in Business Risk Intelligence (BRI), Flashpoint provides meaningful intelligence to assist organizations in combating threats and adversaries. Through sophisticated technology, advanced data collections, and human-powered analysis, Flashpoint is the only intelligence firm that can help multiple teams across an organization bolster cybersecurity, confront fraud, detect insider threats, enhance corporate and physical security, improve executive protection, address third-party risk, and support due diligence efforts.

For more information, visit https://www.flashpoint-intel.com/ or follow us on Twitter at @FlashpointIntel.


Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.


From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure.

We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.

Our flagship enterprise firewall platform, FortiGate, is available in a wide range of sizes and form factors to fit any environment, and provides a broad array of next generation security and networking functions. Complementary products can be deployed with a FortiGate to enable a simplified, end-to-end security infrastructure covering:

  • Network security
  • Multi-Cloud security
  • Web Application Security
  • Email security
  • Advanced Threat Protection
  • Secure Unified Access
  • Endpoint security
  • Management and Analytics

Fortinet ranks #1 in the most security appliances shipped worldwide and more than 350,000 customers trust Fortinet to protect their businesses. Our market position and solution effectiveness have been widely validated by industry analysts, independent testing labs, business organizations, and media outlets worldwide. We are proud to count the majority of Fortune 500 companies among our satisfied customers.

Fortinet is headquartered in Sunnyvale, California, with offices around the globe. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong management team with deep experience in networking and security.


Global cybersecurity leader Fox-IT creates cybersecurity solutions for a more secure society. We are dedicated to our clients, our values, and our integrity. It is Fox-IT's mission to create solutions that ensure a more secure society. We develop advanced cybersecurity and cyberdefense products and solutions for our clients around the world. We have a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.
 
In the fight against eCrime, Fox-IT has developed two solutions securing on-line channels around the world. InTELL provides global visibility into on-line threats. Our customers value the unique context and actor attribution we provide. It allows them to understand threats and get the most out of their defenses. DetACT delivers real-time web and mobile event analytics to detect attacks and anomalies to on-line channels. It is the only solution to detect and stop Dyre, Dridex, KINS, Tinba, and phishing in real-time. Powered by cyber intelligence, it provides 100% visibility, and allows companies to  be in full control of external channel threats.
 
 

At Guidance, we exist to turn chaos and the unknown into order and the known–so that companies and their customers can go about their daily lives as usual without worry or disruption, knowing their most valuable information is safe and secure.
 
Makers of EnCase®, the gold standard in digital investigations and endpoint data security, Guidance provides a mission-critical foundation of applications that have been deployed on an estimated 34 million endpoints and work in concert with other leading enterprise technologies from companies such as Cisco, Intel, Box, Dropbox, Blue Coat Systems, and LogRhythm.
 
Our field-tested and court-proven solutions are used with confidence by 78 of the Fortune 100 and hundreds of agencies worldwide.


Help AG provides leading enterprise businesses and government organizations across the Middle East with tailored Cyber Security Assurance services and solutions that addresses the most diverse and complex requirements. Founded in Germany in 1995, we have been present in the Middle East since 2004 and have firmly established ourselves as the region’s leading cyber security advisor.

Our Cyber Security Analysis Division offers essential security services which are imperative to uncovering security vulnerabilities that would otherwise go unnoticed. We offer extensive technical expertise in delivering Penetration Test, Detailed Web Assessment, Mobile Application Hacking, Social Engineering, and Source Code Review services, to guide our customers’ security investments so that they can best secure their information, data, and assets.

Help AG’s offering for Information Security Governance and Compliance is based on our unique Governance & Assurance Framework, which ensures that information security follows a risk based and information centric approach, to meet an organization’s specific needs and compliance requirements.

Our Cyber Security Operations Centre (CSOC) which is staffed by top-level security analysts; offers monitoring, analysis and interpretation of security events occurring within your infrastructure 24 hours a day and 7 days a week. Help AG Managed Security Services (MSS) is designed to detect, analyze and respond about security threats, malicious, abnormal and unauthorized behavior as well as anomalies and deviations in trends and baselines specific to your organization.

Help AG’s Incident Response service allows you to recognize an incident, evaluate the associated risks, and determine the most effective approach to remediate the incident. Our approach to incident response enables you to position your organization a step ahead of any incident.

We value our customers’ privacy and although local data collection is a must, we handle this in the most secure way possible by our unique service offering which ensures that data does not leave the customer’s environment.

Hewlett Packard Enterprise helps you to protect your organisation and business-critical digital assets by building security into the fabric of your enterprise, proactively detecting and responding to advanced threats, and safeguarding continuity and compliance to effectively mitigate risk and support your organization’s innovation initiatives.
 
Hewlett Packard Enterprise advocates an integrated approach to security, one that starts with a single, comprehensive view of risk across the enterprise, and driven by your enterprise priorities and goals. By focusing on your business-critical digital assets and the interactions between them, you can implement a more proactive and effective pan-enterprise approach to security and risk management that balances regulatory requirements, threats, asset protection, and recovery.


Our gateway offers industry leading, global payment processing services and advanced fraud management solutions - for merchants, industry partners and acquiring banks. We recognise that the digital commerce market represents a key area of growth for our customers. As such, it's a key focus for us at Mastercard. We have aggressively invested in payment gateway assets, by both acquisition and development of proprietary technology, to provide a superior gateway offering that can assist our customers meet their business objectives.
 
As a global partner to some of the world's most recognisable brands, Mastercard Payment Gateway combines smart thinking and an end-to-end solution to help its customers transcend the complexities and expense associated with payment processing.

For further information, please visit www.mastercard.com/gateway/index.html
Menlo Security protects organizations against cyber attacks from the Web, email and other critical threat vectors.  The company's patented Isolation Platform isolates all content and eliminates malware in the cloud, providing users with a completely transparent and safe experience without the need to deploy and update software to their endpoints. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. The company was founded by security industry veterans, in collaboration with acclaimed researchers from the University of California, Berkeley. For more information, please visit https://www.menlosecurity.com or @menlosecurity.

Micro Focus is a global software company with 40 years of experience in delivering and supporting enterprise software solutions that help customers innovate faster with lower risk. Our portfolio enables our 20,000 customers to build, operate, and secure the applications and IT systems that meet the challenges of change. We are a global software company, committed to enabling customers to both embrace the latest technologies and maximize the value of their existing IT investments.


NetClean is a world leader in technical solutions which prevent the spread of child sexual abuse content. The products are developed in cooperation with police authorities, and NetClean's proactive solutions are employed by millions of users.

The company's client portfolio includes, among others, small to multi-national companies, government agencies, internet providers and police authorities. NetClean collaborates with the non-profit organisations, World Childhood Foundation, ECPAT and Internet Watch Foundation (IWF). NetClean products in a computer ensure that it cannot be used to commit child abuse offences; they protect employees, strengthen the company's trademark and demonstrate social responsibility.

NetClean ProActive identifies and blocks child sexual abuse images and videos through comparison with material classified by the police. NetClean ProActive's various installations identify and block illegal content on it entering a computer via the Internet, a USB device, or CD-ROM. Moreover, the solution provides the organisation with important information that facilitates investigation into an incident.

NetClean WhiteBox is a router based solution for blocking access to URLs containing child sexual abuse content in high performance, backbone networks at an ISP (Internet Service Provider). Normal traffic is not affected.

NetClean Analyze is designed for police authorities that investigate child sexual abuse content. The solution improves quality and minimises work input by enabling effective categorisation and identification of child sexual abuse images and videos, at the same time as providing the prosecutor with sound evidence.

www.netclean.com/eng


NTT Security is the specialised security company and the centre of excellence in security for NTT Group.  With embedded security we enable NTT Group companies (Dimension Data, NTT Communications and NTT DATA) to deliver resilient business solutions for clients’ digital transformation needs.  NTT Security has 10 SOCs, seven R&D centres, over 1,500 security experts and handles hundreds of thousands of security incidents annually across six continents.

NTT Security ensures that resources are used effectively by delivering the right mix of Managed Security Services, Security Consulting Services and Security Technology for NTT Group companies – making best use of local resources and leveraging our global capabilities.  NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest ICT companies in the world. 

For more information, please visit: www.nttsecurity.com


Nuix (www.nuix.com) understands the DNA of data at enormous scale. Our software pinpoints the critical information organisations need to anticipate, detect and act on cybersecurity, risk and compliance threats. 
Our intuitive platform identifies hidden connections between people, objects, locations and events – providing real-time clarity, control and efficiency to uncover the key facts and their context. 
Nuix and our partners deliver solutions that incorporate our global expertise in cybersecurity, law enforcement, digital forensics, investigation, intelligence, legal discovery and information governance. We continually innovate to solve the complex challenges our customers face today and build their capacity to anticipate what’s next.


Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets.

Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.

Proofpoint is a next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks.

Your people do business well beyond the bounds of traditional network perimeters and connected endpoints. Email, social media, mobile devices and saas-applications are the new tools of the trade -and for cyber criminals, the new tools of attack.

Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.

Proofpoint Phishing Simulation and Security Awareness Trainings help to educate your employees and reduce risk with advanced threat phishing simulations and security awareness training.

Our solutions stop 99% of attachment-based attacks. And every day, we detect and block advanced threats and compliance risks in more than 600 million emails, more than 7 million mobile apps, and hundreds of thousands of social-media accounts.  We also help customers share large files securely and protect sensitive information as it’s sent, stored, and archived.

Our solutions are built on an advanced cloud platform that blends speed and innovation. They deploy, adapt and update faster than on-premises tools to keep you ahead of the latest threats. For example, a 360,000-user organization recently deployed our solutions in just 48 hours.

No other cybersecurity vendor has a global intelligence platform that spans email, social and mobile. We collect and analyze more than 100 billion data points a day from more than 100 million email boxes, 200 million social-media accounts, and 7 million mobile apps.

This data-informed intelligence gives you critical visibility to understand the context and scale of an attack—and the actionable insight you need to resolve it quickly and effectively.

Many companies claim to put customers first. We back it up with a sustained customer satisfaction rate of more than 95% and yearly renewal rate of more than 90%.


Recommind is the leader in predictive information management software, delivering search-powered business applications that transform the way enterprises, government entities and law firms conduct eDiscovery, enterprise search and information governance. Recommind’s solutions are all built on the CORE (Context Optimized Relevancy Engine) platform, which automatically accesses, organizes and analyzes large volumes of information in context from myriad sources. With greater control over and more accurate access to information, organizations can lower risk, heighten productivity, increase the value of information assets and improve competitiveness and profitability.

Recommind delivers a comprehensive eDiscovery solution for:

  • Information Management
  • Early Case Assessment (ECA), Preservation and Collection
  • Predictive Analytics and Predictive Coding

Recommind customers include AstraZeneca, BMW, Cisco, Clifford Chance, Marathon Oil, Morgan Lewis, US Department of Energy (DOE), White & Case and Wilmer Hale. Recommind is headquartered in San Francisco and has offices in Boston, London, Sydney and Bonn, Germany. For more information go to www.recommind.com.


Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future.

www.recordedfuture.com/ 


RiskIQ provides organizations the visibility and intelligence they need to secure their known and unknown Enterprise Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of documented and undocumented web assets, and scans them for copycat mobile apps, drive-by malware and malvertisements. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect their web assets and users from security threats and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com
SABSA, the world’s leading free-use and open-source Security Architecture development, management method and framework is changing the Enterprise Architecture landscape. With SABSA Chartered Security Architects in over 50 countries around the world, SABSA is transforming Information Security, Risk Management, and even Compliance & Audit, into ‘Centres of Business Enablement’.
 
SABSA does not start with technical matters but focuses on the creation of models and frameworks to enable business opportunities while remaining within the risk appetite of real stakeholders, establishing real traceability from business requirements to solutions.
 
SABSAcourses are the foremost global provider of Accredited SABSA Training, with training locations
spanning Europe, The Middle East, Africa, North America and India. Our diverse range of training and
consulting options allow for an Enterprise Security Architecture solution for organisations of all sizes
and levels of maturity.
 
www.sabsacourses.com/

Secgate is a specialist security advisory and technology innovation group made up of experienced and award winning tier 1 professionals who deliver intelligent protection solutions that both strengthen and empower IT security and resilience.
 
Secgate’s groundbreaking solution, VisDa, is a revolutionary complete track and trace tool that visualizes and analyses data transfers to understand what, how and where information is moving in an organization to achieve regulatory compliance. Secgate will also bring to market Forest Tree, their flagship product which launches in Q3 2017, a patented advanced defense-grade Cyber Security solution that allows organizations to monitor and understand the content and context of each electronic communication channel.
 
Secgate’s combination of consultants and technologists allows them to deliver unique and innovative solutions that provide real tangible value.

Seculert is the first cloud-based solution that provides immediate protection from advanced malware and APTs. From the moment of activation, Seculert identifies existing infections, and continues to detect unknown malware both inside and outside your internal network – including remote sites, employees and even on personal mobile devices. Using patented Botnet Interception technology, Elastic Sandbox technology and Big Data analytics, Seculert fully leverages the power of the cloud to combat today’s advanced threats. It enables organizations to simply and cost-effectively transform their existing security defenses into a complete solution for detecting, stopping and remediating malware attacks. For more information, visit www.seculert.com.


TRUSTED CYBERSECURITY SOLUTIONS AND SERVICE PROVIDER
 
SecureData is one of Europe’s largest independent security service providers, with a 25 year track record of delivering managed services to some of the largest companies in the world. We look beyond point technologies to address cybersecurity as a whole, providing a range of integrated solutions that assess risks, detect threats, protect our customer’s IT assets and respond to security incidents.
 
SensePost, our elite consulting arm, is renowned for its innovation on the frontiers of cybersecurity. Through SensePost, we have a deep understanding of the cybercriminal mindset and access to some of the world’s most preeminent security experts - ensuring we can keep customers as secure as they possibly can be.


SecureLink is the market leading provider of cyber security in Europe.
 
‘Our philosophy is very simple, we empower organisations to protect themselves in an increasingly online world so that they can maintain trust and confidence. Put simply, we safely enable business.’
 
Marco Barkmeijer, CEO SecureLink
 
With over 15 years of experience, we are trusted by some of the world’s largest brands.
We are experts at designing, delivering, managing and supporting leading cyber security solutions.

Secureworks is a leading global cybersecurity company that keeps organisations safe in a digitally connected world. We combine visibility from thousands of clients, artificial intelligence and automation from our industry-leading Secureworks Counter Threat Platform™, and actionable insights from our team of elite researchers and analysts to create a powerful network effect that provides increasingly strong protection for our clients. By aggregating and analysing data from any source, anywhere, we prevent security breaches, detect malicious activity in real time, respond rapidly, and predict emerging threats. We offer our clients a cyber-defense that is Collectively Smarter. Exponentially Safer.™ www.secureworks.com  


Sophos is a leader in next-generation endpoint and network security. As the pioneer of synchronized security Sophos develops its innovative portfolio of endpoint, network, encryption, web, email and mobile security solutions to work better together. More than 100 million users in 150 countries rely on Sophos solutions as the best protection against sophisticated threats and data loss. Sophos products are exclusively available through a global channel of more than 34,000 registered partners. Sophos is headquartered in Oxford, UK and is publicly traded on the London Stock Exchange under the symbol "SOPH." More information is available at www.sophos.com


Symantec Corporation (NASDAQ:SYMC) is the global leader in cyber security. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

Tenable delivers comprehensive security solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. 
 
Transform security with Tenable, the creators of Nessus and pioneers of continuous monitoring.

Thales eSecurity is a leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored. We ensure that company and government data is secure and trusted in any environment – on premise, in the cloud, in data centres and in big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices.

Thales eSecurity provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged user control and meeting the highest standards of certification for high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales eSecurity is part of Thales Group.

www.thalesesecurity.com

 


LexisNexis® Risk Solutions leverages comprehensive digital and physical identity intelligence, machine learning and advanced big data analytics to accelerate risk management decisions and fortify fraud defenses for global businesses in over 100 countries. Our solutions combine innovative technology and intuitive analytics with more than 78 billion data records augmented by the digital identity coverage of the ThreatMetrix® Digital Identity Network to deliver a concise 360-degree view of risk at any point in the customer lifecycle. By correlating and consolidating the complex and ever-changing attributes that make up a consumer or business identity, LexisNexis Risk Solutions provides robust, actionable risk insights enabling secure and seamless transactions while limiting friction intelligently across every channel via a multi-layered approach. For more information, please visit www.risk.lexisnexis.com.

TITUS solutions enable organisations to discover, classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the cloud.
 
www.TITUS.com

Veracode, the leading pure-play application security vendor in the Gartner Magic Quadrant, delivers the application security solutions and services today’s user- and software-centric world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can fully realise the benefits of the applications they build, buy and deploy as well as the components they integrate into their environments. 
 
With its powerful combination of automation, process and speed, Veracode seamlessly integrates application security into software development, effectively eliminating vulnerabilities during the lowest-cost point in the development/deployment chain. Without the need for additional staff or equipment, Veracode customers ramp up quickly, see results and prove value on day one, and consistently see improvement over time.

For the latest application security research and commentary visit the Veracode blog today at www.veracode.com/blog


As organizations embrace new technologies and applications become more distributed across on-premise and cloud environments, they face new and evolving security and availability challenges. While conventional methods used to detect and mitigate threats are no longer viable in many of these environments, Verisign’s Security Services offer cloud-based DDoS protection and DNS solutions to protect your brand, revenue and online services from today’s attacks.
Having maintained 100 percent operational accuracy and stability of its DNS infrastructure for .com and .net for more than 20 years, Verisign has unmatched experience in protecting critical internet infrastructure, and is entrusted by leading organizations to help secure and protect their businesses.

To find out more
Call – +44 (0) 203 865 7710
Email – VSSEMEAsales@verisign.com
Web – www.verisign.com/security



Zscaler ensures that more than 15 million users across more than 5,000 of the world’s leading organisations worldwide are protected against cyber-attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Cloud Security Platform processes over 20 billion transactions a day, blocking over 100 million threats each day across more than 200 countries.

Operating in more than 100 data centers around the world, Zscaler delivers unified, carrier grade Web security, advanced persistent threat (APT) protection, data loss prevention cloud firewall, cloud sandbox, traffic shaping, policy management and SSL inspection –all without the need for on-premise hardware, appliances or software.

Read more under Zscaler.com or follow us on Twitter @Zscaler_DACH.