Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
Fortnet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Fortinet unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance. Fortinet`s Next Gen.
RUCKUS Networks (formerly known as Ruckus Wireless) is a brand of wired and wireless networking equipment and software owned by CommScope. Ruckus offers Switches, Wi-Fi access points, CBRS access points, Controllers, Management systems, Cloud management, AAA/BYOD software, AI and ML analytics software, location software and IoT controller software products to mobile carriers, broadband service providers, and corporate enterprises.
Sysdig secures and accelerates cloud innovation. Powered by Runtime Insights, our platform stops threats in real time and reduces vulnerabilities by up to 95%. Our roots are in runtime as the creators of Falco, the open standard for cloud threat detection. We apply Runtime Insights across the software lifecycle to prioritize vulnerabilities and instantly detect attacks. From shift left to shield right, customers rely on Sysdig to prevent, detect, and respond at cloud speed.
Trend Micro Inc. is an American-Japanese multinational cyber security software company with global headquarters in Tokyo, Japan and Irving, Texas, United States, with regional headquarters and R&D centers in Asia, Europe, and North America. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.
Rapid7 is a provider analytics for security and information technology (IT) operations that enable organizations to implement an analytics-driven approach to cyber security and IT operations. It offers threat exposure management solutions, including Nexpose; Metasploit, a penetration testing software solution; and AppSpider, an application security testing solution. The company also provides incident detection and response solutions, such as InsightIDR for SIEM and UEBA.
Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. Radware’s solutions empower more than 12,500 enterprise and carrier customers worldwide. Radware is the Leading DDoS and WAF Solution provider in the world.
Tenable® is the Exposure Management company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.
Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. Its core products are a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security.
VMware, Inc. is an American cloud computing and virtualization technology company with headquarters in Palo Alto, California. VMware was the first commercially successful company to virtualize the x86 architecture. VMware's desktop software runs on Microsoft Windows, Linux, and macOS.
Synopsys, Inc. provides software, intellectual property (IP) and services. It offers products and services in different categories: core EDA; IP, Systems and Software Integrity; Manufacturing Solutions, and Professional Services etc. It is also a leading provider of software tools that developers use to develop and test software code in a range of industries, including electronics, financial services, energy, and industrial. Coverity and Blackduck are two leading application security testing solutions from Synopsys.
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. This Colorado, USA based company has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for eight consecutive years. LogRhythm provides one stop security operation center (SOC) enablement solution.
AlgoSec is a the leading provider of software for network security policy management, also known as firewall policy management. AlgoSec solutions automate the management and enforcement of security policies across firewalls, routers, virtual private networks (VPNs), and related security devices. Enterprises use AlgoSec's products to manage the configuration of their security systems, identify vulnerabilities, test the systems against their security policies, reduce administrative costs, and ensure compliance to regulations such as PCI-DSS.
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Sunnyvale, California. It provides endpoint security, threat intelligence, and cyberattack response services.
Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. DG also offers industry's leading Endpoint Detection and Response (EDR) solution.
iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets. iZOOlogic headquarters are based in the UK, with operations in the US and Australia.
The iZOOlogic platform is an integrated suite of solutions allowing real time intelligence into the online threat landscape and provides a seamless 24 x 7 x 365 Global Incident Response.
Acunetix provides a full featured web security scanner, crawler, report analysis tool, as well as web security explanations, and an extensive database of security checks for all leading web server platforms. This all-in-one web security software lets the user scan for SANS Top 20 and OWASP Top 10 2013 vulnerabilities.
Portswigger Provides world renowned Web Application Security Solution named "BurpSuite". Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.
Netsparker, the web application security solution that automatically verifies identified vulnerabilities, was first released on the market in 2009. The secret behind Netsparker’s dead accuracy is its proprietary Proof-Based Scanning Technology. Netsparker scanners are trusted and used by world renowned companies such as Samsung, Ernst & Young, Skype, NASA, ISACA and ING Bank.
Darktrace is the world’s leading AI company for cyber defense. With thousands of customers worldwide, the Enterprise Immune System is relied on to detect and fight back against cyber-attacks in real time. The self-learning AI protects the cloud, SaaS, corporate networks, IoT and industrial systems against cyber-threats and vulnerabilities, from insider threats and ransomware, to stealthy and silent attacks.