Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company’s security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company’s networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection.
PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned with their susceptibility to sophisticated cyber attacks. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Our open approach ensures that PhishMe integrates easily into our customers’ existing security technology, demonstrating measurable results to help inform an organization’s security decision-making process. For additional information, please visit: www.phishme.com.
Developed by former US Air Force cybersecurity officers,Infocyte’s threat hunting technology fills a void left by today’s real-time detection solutions. By focusing on the post-compromise activity of persistent attackers and insider threats, Infocyte’s unique approach to security helps organizations defend their networks and critical information.
Infocyte is the result of years of experience hunting adversaries within some of the largest and most targeted defense networks in the world. This experience building the U.S. Military’s first malware hunting team provides us with an unmatched level of operational expertise and equips Infocyte with a highly refined perspective on how to tackle today’s security threats.
CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Co-founders George Kurtz and Dmitri Alperovitch realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware.
CROWDSTRIKE’S MISSION IS SIMPLE: TO STOP BREACHES
Founded in 2007, Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 115 million customers at more than 430 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.
RCDevs is an award winning security company specialized in next-generation multi-factor authentication and PKI. RCDevs is building its growing reputation over high-quality software and its customers’ entire satisfaction. RCDevs provides cutting-edge solutions in world-wide to customers ranging from SMEs to large corporations in the IT, financial, healthcare and government sectors.
RCDevs’ goal is to ensure that customers requiring IT security get cost-effective leading technology into their infrastructure with a professional service. We are seeking for business partners capable of serving customers with our solutions with the same objectives. RCDevs provides its partners with high-security, easy-to-implement and cost-effective solutions enabling them to become regional market leaders in mobile security solutions.
Wombat Security Technologies
Wombat Security Technologies is a company born from research at the world-renowned Carnegie Mellon University (CMU). In June 2008 the company was founded by Drs. Lorrie Cranor, Jason Hong, and Norman Sadeh, all faculty members at the CMU School of Computer Science.
While at CMU, our cofounders lead the largest national research project on combating phishing attacks. Their goal was to address the human element in cyber security and develop novel, more effective anti-phishing filtering solutions.
Today Wombat Security Technologies, headquartered in Pittsburgh, PA, provides information security awareness and training software to help organizations teach their employees secure behavior. Our Security Education Platform includes integrated knowledge assessments, a library of simulated attacks, and interactive training modules, which have been proven to reduce successful phishing attacks and malware infections by up to 90%.
Gigamon was founded in 2004 on a revolutionary idea to provide pervasive visibility into company data across the entire network. Our vision is to make it easier for companies to secure, manage and understand their data in motion, enabling stronger security and network performance. Now, over a decade later, our intelligent Gigamon Visibility Platform delivers pervasive visibility across physical and virtual, public/private/hybrid cloud and remote sites for the world’s leading organizations.
We provide pervasive visibility into physical, virtual, and cloud environments so you can see the data in motion across your entire network. Organizations use the Gigamon Visibility Platform to make it easier to manage, secure and understand all their network data, enabling stronger security and enhanced network performance.
As the volume and variety of data traversing your network grows, the best solution is to simplify and get pervasive visibility. Avoid blind spots by deploying visibility and network monitoring solutions designed to create a more secure, efficient and optimized environment.
WALLIX Group is a cybersecurity software vendor dedicated to defending and fostering organizations’ success and renown against the cyberthreats they are facing. For over a decade, WALLIX has strived to protect companies, public organizations, as well as service providers’ most critical IT and strategic assets against data breaches, making it one of the world leaders in Privileged Access Management.
As digitalization impacts companies’ IT security and data integrity worldwide, it poses an even greater challenge if the data involved is highly sensitive. The recent regulatory changes in Europe (NIS/GDPR) and in the United States (NERC CIP/Cyber Security Directorate) urge companies belonging to sensitive sectors to place cybersecurity at the heart of their activity.