Bitdefender is a global cybersecurity leader protecting over 500 million systems in more than 150 countries. Since 2001, Bitdefender innovation has consistently delivered award-winning security products and threat intelligence for people, homes, businesses and their devices, networks and cloud services. Today, Bitdefender is also the provider-of-choice, used in over 38% of the world’s security solutions.
From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. Bitdefender strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with its new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.
Meet the security and compliance requirements of clients and business partners with Commissum. Provide assurance to equity partners that security spend is delivering a high RoI and reducing cyber and operational risk.
We help the legal sector ensure security while leveraging the latest technology solutions and modernising IT and connectivity through our range of security testing, consulting and managed security services.
Detect and respond to cyber incidents fast with our in house developed cloud SIEM platform, alerting you to malicious activity on your networks and systems, combining up-to-the minute threat intelligence with our own SOC experts to remove the burden from overstretched IT and security staff. Our bespoke solutions can be tailored to fit your organisation, without the overheads of larger providers.
We can also provide a simple and structured roadmap to comply with and achieve global security standards like NIST, ISO 27001, and Cyber Essentials – tangible evidence to clients of your commitment to security.
You can have industry-leading security insight without having to invest in full-time staff with our outsourced CISO/ISO service, drastically reducing security spend while returning real value and reduced risk.
We provide scalable training solutions to ensure security buy-in at every level of your organisation. Lead security initiatives from the top down, involving every member of your team. After all, they are the front line of your defences.
Find out more at Commissum.com, or speak to our team on the day.
CrowdStrike, a global cybersecurity leader, is redefining security for the cloud era with an endpoint protection platform built from the ground up to stop breaches. The CrowdStrike Falcon platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints on or off the network. Powered by the proprietary CrowdStrike Threat Graph, CrowdStrike Falcon correlates over 3 trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security.
With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform.
There’s only one thing to remember about CrowdStrike: We stop breaches.
Qualifying organizations can gain full access to Falcon Prevent™ by starting a free trial.
Learn more: https://www.crowdstrike.com/
CYJAX is a technology company and leading provider of Digital Security, Threat Intelligence and Incident Response services providing data acquisition, transformation and dissemination frameworks, real-time big data monitoring and analysis for Enterprise, SME and Government sectors. CYJAX has been at the forefront of cyber threat intelligence since 2012. We have a deep understanding of both existing and emerging threat actors, as well as their rapidly changing tactics, techniques and procedures.
Threat Intelligence Services
The CYJAX Platform has been developed from the ground up, using proprietary technology designed specifically for working with cyber threat intelligence. Applying this innovative technology, combined with our team of world class analysts, the platform allows users to easily acquire, transform and disseminate data to quickly build a cyber threat intelligence looking glass. It wraps neatly around your organisation, providing contextualised views of associated risk and real-time monitoring of emerging threats to your critical assets, enabling rapid response to cyber-related events, technical or otherwise.
Our Incident Response Team has been on the frontline of the most complex breaches responding to incidents with our award winning digital intelligence technology platform and world class analysts and investigators.
Established in 1992, Doherty Associates is an award-winning, Managed Service Provider and Tier 1 Microsoft Gold Partner.
As a trusted strategic partner to our clients, Doherty have helped manage and support over 55,000 users with their migration to the Microsoft Cloud, encouraging adoption of modern workplace solutions and increasing productivity by using up to 82% of features within Office 365, compared to an industry average of 69%. We also enable organisations to use security and mobility services including SharePoint and Teams along with helping organisations embrace cloud practise management software.
Accompanying the Microsoft Cloud Consultants is a dedicated Networking team who aided the organisation in becoming Fortinet Partner of the Year 2018/19 through the delivery of their suite of network security produces. Alongside this our Security teams provide the additional services required to better enable and secure our clients with and provide essential services such as on-demand CISO and CIO and GDPR practitioners.
At the heart of Doherty Associates is our fully managed ITIL based service-desk operating 24/7/365 out of our offices in London and Kuala Lumpur where we also operate a fully 24 x 7 service for full pro-active monitoring, backup, security and patch management function.
We face unique challenges with all our clients and have built up a wealth of knowledge in both the SMB & Mid-Market for Professional Services organisations in both the Legal and Financial Services. Whilst proud to be a technically led business, we align ourselves alongside our clients in a consultative manner and focus on business, their challenges and how IT can enable their business to achieve their goals. Our technical experts take pride in making themselves relatable to clients with a broad range of technical knowledge. User enablement and security is key for us and everything we do is designed around these principles.
For more information, please visit: https://www.doherty.co.uk/
Our vision is for a connected world in which people communicate efficiently and securely. To achieve this, we provide human layer security to protect individual users and stop breaches before they happen. Our patented technologies are built using leading-edge contextual machine learning and powerful encryption that mitigate modern risks in ways that other solutions simply can’t achieve.
Today, we provide intelligent email security and collaboration solutions that prevent accidental and intentional breaches, protect sensitive data, and equip CISOs and their teams with the detailed reporting required for compliance purposes.
Egress is headquartered in London, with regional offices in the UK, the US, Canada and the Netherlands.
Exabeam is the Smarter SIEM™ company. We empower enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarter. Security organizations no longer have to live with excessive logging fees, missed distributed attacks and unknown threats, or manual investigations and remediation. With the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident response, both on-premises or in the cloud. Exabeam Smart Timelines™, sequences of user and device behavior created using machine learning, further reduce the time and specialization required to detect attacker tactics, techniques and procedures.
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 400,000 customers trust Fortinet to protect their businesses. Learn more at http://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs.
Through its innovative, ground-breaking security technology, Glasswall Solutions provides organisations with total protection against sophisticated and unknown file and document-based malware threats. Unparalleled in its ability to defeat malware, Glasswall also provides customers with threat intelligence with unique insights into targeted attacks.
The Glasswall FileTrust™ suite of products features d-FIRST™, a unique, patented methodology which reverses legacy methodologies of blocking ‘known bad’ by ensuring all files and documents are regenerated into a safe and secure standard of ‘known good’. By automatically remediating deviations from the manufacturers specification and allowing customers to set granular policies to mitigate risks posed by features such as Macros or Embedded Files, Glasswall provides total protection against all types file-based malware. Glasswall FileTrust™ supports all major file types, including Microsoft Office, PDF, image files and many others to ensure protection against the broad spectrum of file-based threats.
Glasswall FileTrust™ for Email is commercially available as a cloud hosted email security managed service or software that easily integrates and scales within existing security architectures. For our expanding group of Technology Partners, Glasswall FileTrust™ SDK enables integration across platforms, products or infrastructure.
With endorsement by US and UK government and defence agencies, the Glasswall FileTrust™ SDK has been integrated into strategic government and military defence systems on platforms such as Data Diodes and Guards. Integration into wider security architectures by major third-party systems integrators proves that Glasswall FileTrust™ technology adapts to any environment, providing total file security at scale.
Menlo Security protects organizations from cyberattacks by seeking to eliminate the threat of malware from the web, documents, and email. Our cloud-based Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions.
Netwrix is a software company that empowers information security and governance professionals to reclaim control over sensitive, regulated and business-critical data, regardless of where it resides.
Over 10,000 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers.
For more information about Netwrix, visit www.netwrix.com.
OneTrust is the #1 most widely used privacy, security and trust platform used by more than 5,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange and OneTrust GRC integrated risk management software.
OneTrust is co-headquartered in Atlanta and in London, and has additional offices in Bangalore, San Francisco, Melbourne, New York, São Paulo, Munich, Hong Kong and Bangkok. Our fast-growing team surpasses 1,500 employees worldwide. To learn more, visit OneTrust.com.
In early 2019, SecureData, the largest independent managed security service provider in the UK, was acquired by the Orange Group to become part of Orange Cyberdefense, the Group’s expert cybersecurity business unit. Today, Orange Cyberdefense is Europe’s go to market, threat detection and threat intelligence services provider.
For more information, please visit
Preempt delivers a modern approach to authentication and securing identity in the Enterprise. Using patented technology for Conditional Access, Preempt helps Enterprises optimize Identity hygiene and stop attackers and insider threats in real-time before they impact business. Preempt continuously detects and preempts threats based on identity, behavior and risk across all cloud and on-premises authentication & access platforms. This low friction and more prescriptive approach empowers security teams more visibility & control over accounts and privileged access, achieve compliance and auto-resolve incidents. Learn more: www.preempt.com.
Partnering with Silver Peak, who combine high-performance SD-WAN, WAN optimisation, routing and a stateful firewall in a fully integrated solution, we empower firms to securely connect users to applications and turn the WAN into a business advantage.
We help some of the world’s largest law firms to architect technology in a way that results in it being a client differentiator, enabling our customers to:
- Improve client experience, ensuring client-facing services perform as expected
- Realise remote working and better internal collaboration, providing secure and smooth access to mobile collaborative apps and video conferencing/telepresence
- Adopt hybrid cloud services, removing IT cost, complexity and risk
- Move legal software further into the cloud, without compromising security or performance
- Gain visibility into end to end network and security infrastructure, from endpoint to cloud and across sanctioned and unsanctioned apps such as Skype, reducing data breach vulnerabilities and improving end user experience
- Deliver AI and Big Data initiatives, driving new product innovation
Learn more: www.teneo.net
Wandera, a cloud security company, protects modern enterprises beyond the traditional perimeter. When remote users access applications from their smartphones or laptops, anywhere in the world, Wandera’s unified security cloud provides real-time threat protection, content filtering and zero-trust network access. Wandera regularly shares the latest findings from its industry-leading threat intelligence which applies machine learning across 425 million sensors worldwide. Founded in 2012 by a team of cloud security veterans, and recognized as a leader by analyst firms including Gartner and IDC, the company is headquartered in San Francisco and London. To learn more, please visit www.wandera.com, or follow on LinkedIn and Twitter.
XQ believes that cyber security should be less complex and better value. We’re on a mission to make our customers’ digital lives better by helping them to mitigate technology risk, to innovate faster and to thrive in the information age.
To that end we created CyberScore™, an easily affordable security testing and rating service that converts vulnerability data into get well plans and risk management reports for businesses and their supply chains.
CyberScore™ gathers data about your organisation and interprets it to present a view of your security posture. It’s simple: you download the CyberScore™ software, allow it to scan your network and produce your very own, peer-rated security score, along with a Get Well Plan and a CyberScore™ certificate.