Previous sponsors

Clients we've worked with include:

Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends, and deters costly advanced email attacks including business email compromise, spear phishing, and account takeover. Winner of the 2018 Best Email Security Solution by SC Magazine, Agari restores trust to the inbox for government agencies, businesses, and consumers worldwide.

www.agari.com

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn.



BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect identities, stop threats, and deliver dynamic access. We offer the only platform with both intelligent identity threat detection and a privilege control plane that delivers zero-trust based least privilege to shrink your attack surface and eliminate security blind spots.  


BeyondTrust protects identities, access, and endpoints across your organization, while creating a superior customer experience and operational efficiencies.  We are leading the charge in innovating identity-first security and are trusted by 20,000 customers, including 75 of the Fortune 100, plus a global ecosystem of partners. Learn more at www.beyondtrust.com. 
 

 


BT is one of the world’s leading providers of communications services and solutions, serving customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services to its customers for use at home, at work and on the move; broadband and internet products and services and converged fixed/mobile products and services. BT consists principally of four lines of business: BT Global Services, BT Retail, BT Wholesale and Openreach.

Carbon Black is a leader in cloud-native endpoint protection dedicated to keeping the world safe from cyberattacks. The Carbon Black Cloud consolidates endpoint protection and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight, and enables businesses of all sizes to simplify operations. By analysing billions of security events per day across the globe, Carbon Black has key insights into attackers’ behaviours, enabling customers to detect, respond to, and stop emerging attacks. More than 6,000 global customers, including approximately one-third of the Fortune 100, trust Carbon Black to protect their organizations from cyberattacks. The company’s partner ecosystem features more than 500 MSSPs, VARs, distributors, and technology integrations, and many of the world’s leading IR firms, who use Carbon Black’s technology in more than 500 breach investigations per year.
 


Centrify delivers modern privileged access management (PAM) solutions based on Zero Trust principles to enable digital transformation at scale. Centrify provides modern least privilege access for human and machine identities based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify centralizes and orchestrates fragmented identities, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise. Over half of the Fortune 100 trust Centrify, including the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies. Human or machine, in the cloud or on-premises, privileged access is secure with Centrify.


Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point Infinity´s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.


Clearswift is trusted by organisations across the globe for advanced content threat protection; the highest level of defence against cyber-attacks and data leaks through today’s digital communication channels, allowing teams the freedom to securely collaborate whilst providing information security personnel with visibility and control of information flow.

Over 70% of Clearswift clients operate within critical national infrastructure, including Defence organizations, Government agencies and financial institutions, all of which demand the most advanced cyber threat prevention and information security solutions. Working closely with these clients over two decades has enabled Clearswift to gain a clear to understanding of the cyber challenges they face, keep abreast of their evolving threatscape, and support compliance with the complex regulatory environment within which they operate.

Our united approach to working with clients has ultimately driven the specialised development of the multi-award winning Clearswift product portfolio which is backed up with a superior 24/7 customer and partner support service, and an extensive channel partner network across the globe.

 


Millions of Ransomware, Business Email Compromise and Credential Harvesting attacks bypass expensive email security solutions every year. They are in your users’ inboxes right now.

Cofense is the only company that combines a global network of 30 million people reporting phish with advanced AI-based automation to stop phishing attacks fast. That’s why over half of the Fortune 500 trust us.

We’re Cofense. We Stop Phish.

Our Phishing Detection and Response platform catches the phishing emails that your secure email gateway inevitably misses. We deliver the technology and insight needed to detect, analyze, and stop phishing attacks.

Cofense® is the leading provider of phishing detection and response solutions. Designed for enterprise organizations, the Cofense Phishing Detection and Response (PDR) platform leverages a global network of nearly 30 million people actively reporting suspected phish, combined with advanced automation to stop phishing attacks faster and stay ahead of breaches. When deploying the full suite of Cofense solutions, organizations can educate employees on how to identify and report phish, detect phish in their environment and respond quickly to remediate threats. With seamless integration into most major TIPs, SIEMs, and SOARs, Cofense solutions easily align with existing security ecosystems. Across a broad set of Global 1000 enterprise customers, including defense, energy, financial services, healthcare and manufacturing sectors, Cofense understands how to improve security, aid incident response and reduce the risk of compromise. For additional information, please visit www.cofense.com or connect with us on Twitter and LinkedIn.


For more information please visit https://www.comforte.com/


For more information, please visit: www.contrastsecurity.com


Corero Network Security is the leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers, on-line gaming companies and digital enterprises rely on Corero’s award winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, coupled with complete network visibility, analytics and reporting. This industry leading technology provides cost effective, scalable protection capabilities against DDoS attacks in the most complex environments, while enabling a more cost effective economic model than previously available. For more information, visit: www.corero.com/


CrowdStrike, a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
We stop Breaches.
 


CyberArk, the #1 provider of privileged access security, provides a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organisations, including more than 50% of the Fortune 100, to protect against external attackers and malicious insiders, and address audit and compliance requirements. CyberArk is the only public company 100% focused on privileged access security, delivering innovative solutions to stay one step ahead of attackers.

 


Cylance® develops artificial intelligence to deliver prevention-first, predictive security products and smart, simple, secure solutions that change how organizations approach endpoint security. Cylance provides full-spectrum predictive threat prevention and visibility across the enterprise to combat the most notorious and advanced cybersecurity attacks, fortifying endpoints to promote security hygiene in the security operations center, throughout global networks, and even on employees’ home networks. With AI-based malware prevention, threat hunting, automated detection and response, and expert security services, Cylance protects the endpoint without increasing staff workload or costs. We call it the Science of Safe. Learn more at www.cylance.com.


Darktrace (DARK.L), a global leader in cyber security artificial intelligence, is on a mission to free the world of cyber disruption. Breakthrough innovations in our Cyber AI Research Centre in Cambridge, UK have resulted in over 100 patents filed and research published to contribute to the cyber security community. Rather than study attacks, our technology continuously learns and updates its knowledge of ‘you’ and applies that understanding to optimize your state of optimal cyber security. We are delivering the first ever Cyber AI Loop, fuelling a continuous end-to-end security capability that can autonomously spot and respond to novel in-progress threats within seconds. Darktrace employs over 2,000 people around the world and protects over 7,400 customers globally from advanced cyber threats. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ in 2021. To learn more, visit https://darktrace.com.


Deep Secure has pioneered a unique and highly disruptive technology that delivers completely threat-free digital content.  The efficacy of the technology is unsurpassed, addressing a significant gap in the market, by defeating all content threats – known, unknown (zero-day), and the undetectable – without the need to examine or isolate traffic.  Deep Secure’s 'Content Threat Removal' has universal relevance in protecting information systems, enabling organisations - to Click, Share, and Transact in perfect safety.  Deep Secure is a UK based cybersecurity company, with an established track record of successful technology delivery into Government, Defence and Intelligence agencies globally.


Digital Element, is the industry-leading geolocation and IP data services provider. Our solutions offer accurate and time-relevant information about online entities such as location, proxy/VPN, ISP, time zone, and more. Our accurate data allows real-time intelligence about inbound/outbound network traffic, provides location/connection type, identifies potential threats, and is critical to instantly identifying and evaluating suspicious transactions.

Our solutions help to: balance risk management, shore up fraud controls, and strengthen digital profiles; Identifying: suspect traffic, real-time global location data and mobile network information. 

Customers such as JP Morgan Chase, BBC, AWS, Experian, Criteo, Oracle, Codewise, AppsFlyer, eTrade, DoubleVerify, SourceFire, eBay, LogRhythm, and more utilize our solutions.

 

Digital Shadows makes threat intelligence work for organizations of all sizes. Companies no longer need to invest a disproportionate amount of resource to get real value out of threat intelligence. Our industry-leading SearchLight service delivers relevant threat information that allows organizations to quickly understand and act on their external exposure minimizing their risk without hiring additional headcount. Get started today and see how SearchLight can protect your digital risk, visit https://www.digitalshadows.com/fr/


eSentire, is the Authority in Managed Detection and Response. The company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining XDR technology and 24/7 Threat Hunting, eSentire mitigates business risk, and enables security at scale. eSentire provides Managed Risk, MDR and IR services.


The Exclusive Networks Group connects new and growing global technology providers for the pan-European market through their "Super Value Add Distributor" model. The company specializes in security, networking, infrastructure, and storage solutions for the "Smarter Social Enterprise." Known as early adopters and technology experts, they distribute products from leading and emerging manufacturers from Europe, the USA, and the Far East exclusively through the indirect channel.

With their integrated solution platform, CARM (Cyber Attack Remediation and Mitigation), they are at the forefront of post-breach security, which involves security measures after security breaches have occurred. This unique platform seamlessly integrates provider technologies into a comprehensive, fully traceable end-to-end solution, enabling companies to identify, contain, respond to, eliminate, and restrict the impact of security breaches.

The question is not "if" but "when" a security breach will occur. And when it does, you need the right providers for integrated security who can act accordingly, identifying the time and place of the breach and deciding what to do next. The Cyber Attack Remediation & Response Platform (CARM) from Exclusive Networks ensures that you are prepared when the inevitable happens!

For more information please visit: www.exclusive-networks.com


Forcepoint is the global leader for data-first cybersecurity. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a cloud-native SASE security platform that protects users, devices, and networks as people access the web and cloud. Forcepoint solutions prevent the theft or loss of sensitive data and intellectual property no matter where people are working, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries. www.forcepoint.com


Forescout delivers automated cybersecurity across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, IoT, OT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout customers gain data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.


Global cybersecurity leader Fox-IT creates cybersecurity solutions for a more secure society. We are dedicated to our clients, our values, and our integrity. It is Fox-IT's mission to create solutions that ensure a more secure society. We develop advanced cybersecurity and cyberdefense products and solutions for our clients around the world. We have a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity.
 
In the fight against eCrime, Fox-IT has developed two solutions securing on-line channels around the world. InTELL provides global visibility into on-line threats. Our customers value the unique context and actor attribution we provide. It allows them to understand threats and get the most out of their defenses. DetACT delivers real-time web and mobile event analytics to detect attacks and anomalies to on-line channels. It is the only solution to detect and stop Dyre, Dridex, KINS, Tinba, and phishing in real-time. Powered by cyber intelligence, it provides 100% visibility, and allows companies to  be in full control of external channel threats.
 
 

The Gigamon Visibility and Analytics Fabric enables you to stay competitive and secure by optimising your security tools providing visibility, availability and security solutions that power the highest levels of consumer experience and innovation.

Gigamon is the first company to deliver complete network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructure. We aggregate, transform and analyse network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organisation to drive digital innovation.

In short, we enable you to run fast, stay secure and innovate.

Gigamon has been awarded over 75 technology patents and enjoys industry-leading customer satisfaction with more than 3,000 organisations, including 80 percent of the Fortune 100.  

Seven of the top 10 global banks rely on Gigamon as well as hundreds of other banks, insurers, credit unions, and regulatory authorities.

Headquartered in Silicon Valley, Gigamon operates globally. For the full story on how Gigamon can help you, please visit www.gigamon.com 

 

 


Zerto, a Hewlett Packard Enterprise company, empowers customers to run an always-on business by simplifying the protection, recovery, and mobility of on-premises and cloud applications. Zerto’s cloud data management and protection platform eliminates the risks and complexity of modernization and cloud adoption across private, public, and hybrid deployments. The simple, software-only platform uses continuous data protection at scale to converge disaster recovery, backup, and data mobility. Zerto is trusted by over 9,500 customers globally and is powering offerings for Microsoft Azure, IBM Cloud, AWS, Google Cloud, Oracle Cloud, and more than 350 managed service providers.  

 


Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.

The Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-valueassets and compromised systems to proactively or reactively stop the spread of a breach.

ZTS is proven to help organizations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects.

Assume breach. Minimize impact. Increase resilience.


Kaspersky is a global cybersecurity company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialised security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help over 270,000 corporate clients protect what matters most to them.

For more information please visit www.kaspersky.com

 


Kenna Security is the enterprise leader in risk-based vulnerability management (RBVM). Using the Kenna Security Platform, organizations can work cross-functionally to determine and remediate cyber risks. Kenna leverages machine learning and data science to track and predict real-world exploitations so security teams can focus on what matters most. Kenna serves nearly every major industry and counts CVS, KPMG, and many other Fortune 100 companies among its customers.

Kenna Risk Scores, another pioneering RBVM innovation, give Security, IT, executives, board members, and other stakeholders a simple and effective way to assess the relative risk of a specific vulnerability, asset class, workgroup, and organizations as a whole.

Recently acquired by Cisco, Kenna Security’s acclaimed risk-based vulnerability management will be combined with SecureX, the platform that connects the industry’s broadest and most integrated security portfolio, providing global organizations the ability to hunt down and assess threats, identify the vulnerabilities most likely to pose a risk, and give remediation teams clear guidance about what to fix first.

Cisco SecureX will layer in additional capabilities by integrating enterprise security management solutions into one centralized location, giving teams a comprehensive way to break down silos, extend detection and response capabilities, and orchestrate and remediate with confidence.

By integrating Kenna Security into SecureX, companies will solve a notoriously difficult piece of the security puzzle and deliver Kenna’s pioneering RBVM platform to more than 7,000 customers using Cisco SecureX today.

All of this reflects Cisco’s determination to streamline and simplify security management through a highly integrated, open platform that brings together threat and vulnerability management. For more information, please check out the latest news and visit kennasecurity.com.


Our gateway offers industry leading, global payment processing services and advanced fraud management solutions - for merchants, industry partners and acquiring banks. We recognise that the digital commerce market represents a key area of growth for our customers. As such, it's a key focus for us at Mastercard. We have aggressively invested in payment gateway assets, by both acquisition and development of proprietary technology, to provide a superior gateway offering that can assist our customers meet their business objectives.
 
As a global partner to some of the world's most recognisable brands, Mastercard Payment Gateway combines smart thinking and an end-to-end solution to help its customers transcend the complexities and expense associated with payment processing.

For further information, please visit www.mastercard.com/gateway/index.html

Menlo Security protects organizations from cyberattacks by seeking to eliminate the threat of malware from the web, documents, and email. Our cloud-based Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions.


Micro Focus is a global software company with 40 years of experience in delivering and supporting enterprise software solutions that help customers innovate faster with lower risk. Our portfolio enables our 20,000 customers to build, operate, and secure the applications and IT systems that meet the challenges of change. We are a global software company, committed to enabling customers to both embrace the latest technologies and maximize the value of their existing IT investments.


Since 2003, Mimecast has stopped bad things from happening to good organizations by enabling them to work protected. We empower over 40,000 customers to mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide proactive threat detection, brand protection, awareness training, and data retention capabilities evolving workplaces need today. Mimecast transforms email and collaboration security into the eyes and ears of organizations worldwide.
 


Noble was founded “to help free society from the burden of cyber crime"; this is our vision and core belief. Our powerful combination of human insight and deep learning technology arms your business with forensic anomaly detection which reliably identifies previously unknown threats. Our product Noble Vision provides security analysts with a clear view into network activity, using deep learning to intelligently classify and red flag suspicious behaviour.

Our company was founded in London in 2016 to develop innovative network cyber security applications using advanced AI-based technology. We have research, development, marketing and sales hubs in London, Graz (Austria) and Rosenheim (Germany). We are a mid-stage start-up with 46 highly engaged and motivated employees who believe passionately in our Vision.

You can visit our website www.noblecss.io for more information.

 


Nominet has been at the heart of the internet for over 20 years running the .UK internet infrastructure, keeping it safe and secure. In providing registry services for top level domains, it has a wealth of experience in running and protecting the Domain Name System (DNS) as well as analysing threats within the DNS traffic.

This expertise underpins its cyber security solutions that protect governments and global enterprises from constant attack. NTX uses machine learning to reduce risk on your network and eliminates threats before they cause harm. It analyses DNS traffic for known and unknown bad in real time to predict, detect and block cyber threats.

Providing your security teams with visibility and protection against critical threats such as malware, phishing, data theft and DNS hijacking, NTX narrows the window of compromise by identifying malicious domains, on average, one week faster than other network security solutions.

NTX is an easy-to-deploy solution used by commercial clients worldwide, as well as the UK Government and over 400 of its public bodies as part of the Protective DNS service we provide.


NTT Security is the specialised security company and the centre of excellence in security for NTT Group.  With embedded security we enable NTT Group companies (Dimension Data, NTT Communications and NTT DATA) to deliver resilient business solutions for clients’ digital transformation needs.  NTT Security has 10 SOCs, seven R&D centres, over 1,500 security experts and handles hundreds of thousands of security incidents annually across six continents.

NTT Security ensures that resources are used effectively by delivering the right mix of Managed Security Services, Security Consulting Services and Security Technology for NTT Group companies – making best use of local resources and leveraging our global capabilities.  NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest ICT companies in the world. 

For more information, please visit: www.nttsecurity.com


Nuix (www.nuix.com) understands the DNA of data at enormous scale. Our software pinpoints the critical information organisations need to anticipate, detect and act on cybersecurity, risk and compliance threats. 
Our intuitive platform identifies hidden connections between people, objects, locations and events – providing real-time clarity, control and efficiency to uncover the key facts and their context. 
Nuix and our partners deliver solutions that incorporate our global expertise in cybersecurity, law enforcement, digital forensics, investigation, intelligence, legal discovery and information governance. We continually innovate to solve the complex challenges our customers face today and build their capacity to anticipate what’s next.


Onapsis protects the mission-critical applications that run the global economy, from the core to the cloud. The Onapsis Platform uniquely delivers actionable insight, secure change, automated governance and continuous monitoring for critical systems — ERP, CRM, PLM, HCM, SCM and BI applications — from leading vendors such as SAP, Oracle, Salesforce and others.

Onapsis is headquartered in Boston, MA, with offices in Heidelberg, Germany and Buenos Aires, Argentina. We proudly serve more than 300 of the world’s leading brands, including 20% of the Fortune 100, 6 of the top 10 automotive companies, 5 of the top 10 chemical companies, 4 of the top 10 technology companies and 3 of the top 10 oil and gas companies.

The Onapsis Platform is powered by the Onapsis Research Labs, the team responsible for the discovery and mitigation of more than 800 zero-day vulnerabilities in mission-critical applications. The reach of our threat research and platform is broadened through leading consulting and audit firms such as Accenture, Deloitte, IBM, PwC and Verizon — making Onapsis solutions the de-facto standard in helping organizations protect their cloud, hybrid and on-premises mission-critical information and processes.

For more information, connect with us on Twitter or LinkedIn, or visit us at https://www.onapsis.com.

Onapsis and Onapsis Research Labs are registered trademarks of Onapsis Inc. All other company or product names may be the registered trademarks of their respective owners.


Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice. For more information, visit www.paloaltonetworks.com.
 


Phoenix Datacom and Spectracom combine to provide customers with the high performance NTP servers (Network Time Protocol) and IEEE-1588 PTP (Precision Time Protocol) Grandmaster Clocks they need in order to apply precision timing to their critical applications.
 
For PCI DSS 10.4, this means the provision of correct and consistent time across critical systems, the protection of time data and that the time settings are received from a time source accepted by industry.
 
Learn more about us here: www.phoenixdatacom.com/spectracom

Pindrop is the trusted voice anti-fraud and authentication provider of choice for the largest organisations across the globe. Our customers include global Fortune 500 enterprises, who have partnered with us to provide the safest voice ecosystem for consumers. Whether voice engagements occur through the call centre or the next generation of voice assistants, Pindrop is committed to securing every voice interaction.

With over $14B in annual fraud loss attributed to the phone channel, and over $8B wasted on ineffective authentication, it’s clear that voice is natively insecure. Pindrop® Panorama was developed as a single platform for passive, multi-factor authentication and fraud detection to reestablish confidence in the voice channel. Today, Panorama applies authentication and fraud intelligence to over 650M calls per year. Pindrop’s unique architecture allows the platform to analyse customer calls before they reach a call centre, and continues to identify legitimate and fraudulent engagements throughout the entire lifecycle of the call, including the IVR and agent.

Pindrop’s authentication solutions, runs in the background of every call, combining patented PhoneprintingTM technology, voice biometrics, and behavioural analytics to determine if a caller has the right device, voice, behaviour, and CLI to access an account.

Pindrop’s anti-fraud solution, Pindrop® Protect, analyses thousands of indicators of anomalous behaviour across the fraud event lifecycle — from CLI spoofing and account mining in the IVR to social engineering attacks against agents.

Pindrop's multi-factor solutions use every facet of a call — audio, voice, and metadata — to provide risk scores and unique prints using Deep Voice™ biometrics along with Phoneprinting™ and Toneprinting™ technologies. These technologies, used in concert with machine learning and a consortium of 650 million phone calls per year, allows Pindrop solutions to provide highly accurate and unrivaled results.


Pluralsight is the technology learning platform for organizations that need to enhance the expertise of their technologists to keep up with the pace of technological change and deliver key innovations on time, on budget and securely. With Pluralsight, you can evaluate the technical abilities of your teams, align learning to key business objectives, and close skills gaps in critical areas like cloud, mobile, security, and data. With the largest network of expert technologists in the world, over 6,500 courses and the ability to quantify impact and performance, Pluralsight is helping enterprise technology leaders succeed in the digital age.


Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,700 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.


RiskIQ is the global leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organisation’s digital presence. With more than 75% of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social, and mobile exposures. Trusted by thousands of security analysts, security teams, and CISOs, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action. Its software protects businesses, brands, and customers.

Based in San Francisco with a European HQ in London, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures.

 


SecureLink is the market leading provider of cyber security in Europe.
 
‘Our philosophy is very simple, we empower organisations to protect themselves in an increasingly online world so that they can maintain trust and confidence. Put simply, we safely enable business.’
 
Marco Barkmeijer, CEO SecureLink
 
With over 15 years of experience, we are trusted by some of the world’s largest brands.
We are experts at designing, delivering, managing and supporting leading cyber security solutions.

Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress with Secureworks® Taegis™, a cloud-native security operations and analytics platform built on 20+ years of real-world threat intelligence and research, improving customers' ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.


SecurityHQ is a Global Managed Security Service Provider (MSSP) that detects and responds to threats instantly. As your security partner, we alert and act on threats for you. Gain access to an army of analysts that work with you, as an extension of your team, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people and process capabilities to accelerate business and reduce risk and overall security costs.

 

For more information please visit https://www.securityhq.com/


SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks at faster speed, greater scale, and higher accuracy than human-powered technology alone. The Singularity Platform empowers enterprises to achieve greater visibility of their dynamic attack surfaces, including endpoints, cloud workloads, containers, identity, and mobile & network-connected devices, and take action in real time with AI-powered automation and cross-platform correlation. Over 10,000 customers, including half of the Fortune 10, hundreds of the Global 2000, prominent governments, healthcare providers, and educational institutions, trust SentinelOne to bring their defenses into the future, gaining more capability with less complexity.


Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.


Spire Solutions is the region’s leading distributor of information security solutions and services. The company has exclusive distribution agreements with the world’s best-known security vendors. The key to Spire’s success is in bringing niche solutions to the market that do not create one problem while solving others. The company works with a selective range of technology partners, while leveraging its channel partnerships to help organisations build and maintain a secure, compliant and more confident operation.
 
Spire further provides an array of services that include governance, risk and compliance, malware audits, threat hunting, breach readiness assessment, vulnerability assessment, penetration testing, web application security testing, security design and architecture review, and security operational support. Additionally, Spire provides training and education on the use of its hardware and software solutions.
Spire’s strategic focus is to continue to anticipate and identify the challenges faced by organisations, and proactively provide effective solutions to help to improve security while optimising resource utilisation.

www.spiresolutions.com


For more information please visit https://www.sumologic.com/


Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium unifies teams and workflows and protects every endpoint from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for eight consecutive years and ranks on Fortune’s list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere. That’s the power of certainty. Visit www.tanium.com and follow us on LinkedIn and Twitter.


In today’s digital landscape, organizations rely on Thales to protect what matters most - applications, data, identities, and software. Trusted globally, Thales safeguards organizations against cyber threats and secures sensitive information and all paths to it — in the cloud, data centers, and across networks. Thales offers platforms that reduce the risks and complexities of protecting applications, data, identities and software, all aimed at empowering organizations to operate securely in the digital landscape. By leveraging Thales's solutions, businesses can transition to the cloud with confidence, meet compliance requirements, optimize software usage, and deliver exceptional digital experiences to their users worldwide.


ThreatConnect, Inc. provides cybersecurity software that reduces complexity for everyone, makes decision making easy by turning intelligence into action, and integrates processes and technologies to continually strengthen defenses and drive down risk. Designed by analysts but built for the entire team (security leadership, risk, security operations, threat intelligence, and incident response), ThreatConnect’s decision and operational support platform is the only solution available today with cyber risk quantification, intelligence, automation, analytics, and workflows in one. To learn more about our Cyber Risk Quantification, Threat Intelligence Platform (TIP) or Security Orchestration, Automation, and Response (SOAR) solutions, visit www.ThreatConnect.com.


Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints.As a leader in cloud and enterprise cybersecurity, our platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. Trend Micro’s global threat research team delivers unparalleled intelligence and insights that power our cybersecurity platform and help protect organizations around the world from 100s of millions of threats daily. We have 7,000 employees across 65 countries, singularly focused on security and passionate about making the world a safer and better place.Trend Micro enables organizations to simplify and secure their connected world. TrendMicro.com


Tripwire is the trusted leader for establishing a strong cybersecurity foundation. Partnering with Fortune 500 enterprises, industrial organizations and government agencies, Tripwire protects the integrity of mission-critical systems spanning physical, virtual, cloud and DevOps environments. Tripwire’s award-winning portfolio delivers top critical security controls, including asset discovery, secure configuration management, vulnerability management and log management. As the pioneers of file integrity monitoring (FIM), Tripwire’s expertise is built on a 20+ year history of innovation helping organizations discover, minimize and monitor their attack surfaces.

We provide solutions for IT and Industrial and have both SaaS and Managed Service options.

  • From cloud storage to SaaS applications, we can assess cloud instances for secure configuration and suspicious change and helps ensure data is not inadvertently being exposed.
  • Our industrial solutions enable visibility to and protection from events that threaten safety, quality, and productivity for mission-critical systems.
  • We enable organizations to identify system vulnerabilities through advanced intelligence that prioritizes the most critical issues and how to fix them.

To support your organization’s cyber integrity and alignment with wide-ranging industry-standard frameworks and regulations, our solutions portfolio includes the following capabilities:

» File integrity monitoring » Security configuration management » Analytics and dashboards » Malware detection » Log management » Change detection

» Configuration assessment » Policy management » Vulnerability management » Asset discovery » Network device and SCADA security » Factory automation system security

 

 


Trustwave is a leading cybersecurity and managed security services provider that helps businesses fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, security testing, consulting, technology solutions and cybersecurity education, Trustwave helps businesses embrace digital transformation securely.

Trustwave is a Singtel company and the global security arm of Singtel, Optus and NCS, with customers in 96 countries.

For more information about Trustwave visit https://www.trustwave.com.

 


Vectra® is a leader in threat detection and response for hybrid and multi-cloud enterprises. The Vectra platform uses AI to detect threats at speed across public cloud, identity, SaaS applications, and data centers. Only Vectra optimizes AI to detect attacker methods—the TTPs at the heart of all attacks—rather than simplistically alerting on “different”. The resulting high-fidelity threat signal and clear context enables security teams to respond to threats sooner and to stop attacks in progress faster. Organizations worldwide rely on Vectra for resilience in the face of dangerous cyber threats and to prevent ransomware, supply chain compromise, identity takeovers, and other cyberattacks from impacting their businesses. For more information, visit vectra.ai.


As organizations embrace new technologies and applications become more distributed across on-premise and cloud environments, they face new and evolving security and availability challenges. While conventional methods used to detect and mitigate threats are no longer viable in many of these environments, Verisign’s Security Services offer cloud-based DDoS protection and DNS solutions to protect your brand, revenue and online services from today’s attacks.
Having maintained 100 percent operational accuracy and stability of its DNS infrastructure for .com and .net for more than 20 years, Verisign has unmatched experience in protecting critical internet infrastructure, and is entrusted by leading organizations to help secure and protect their businesses.

To find out more
Call – +44 (0) 203 865 7710
Email – VSSEMEAsales@verisign.com
Web – www.verisign.com/security


Zscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange™ platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SSE-based Zero Trust Exchange™ is the world’s largest in-line cloud security platform.