Solutions Arrow to Content

Sponsor Services / Products

Illumio, the leader in micro-segmentation, prevents the spread of breaches inside data center and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers.

Illumio

Juniper Networks

Juniper Networks brings simplicity to networking with products, solutions and services that connect the world. Through engineering innovation, we remove the constraints and complexities of networking in the cloud era to solve the toughest challenges our customers and partners face daily. At Juniper Networks, we believe that the network is a resource for sharing knowledge and human advancement that changes the world. We are committed to imagining groundbreaking ways to deliver automated, scalable and secure networks to move at the speed of business.
Juniper Networks

Tanium

Tanium provides organizations with a single point of visibility and control to secure and manage endpoints at massive scale enterprise-wide. The Tanium platform enables Business Resilience to ensure the technology powering businesses today can adapt to disruption. Many of the world’s largest and most sophisticated enterprises including half of the Fortune 100, most of the top retailers and financial institutions, and the United States Armed Forces rely on Tanium for Business Resilience. Tanium recently ranked 4th on the Forbes list of “Top 100 Private Companies In Cloud Computing For 2018” and 55th on FORTUNE’s list of the “100 Best Medium Workplaces”
Tanium

Haystack Associates Logo

Haystack Associates provides information governance and privacy compliance program guidance and solutions.

Haystack Associates

Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience.

Mimecast

 Cybereason gives the advantage back to the defender through a completely new approach to cybersecurity: the Cybereason Defense Platform. Cybereason offers managed, as-a-service, and on-premise prevention, detection and response solutions. Cybereason technology delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Cybereason is privately held and is headquartered in Boston, MA with offices around the globe.

Cybereason

Zscaler secures thousands of cloud-first organizations in their IT transformation journeys.  Zscaler delivers the entire security stack as a service, continuously applying policies and threat intelligence for comprehensive protection.

Zscaler

  VeriClouds provides credential verification services that help organizations detect compromised credentials before hackers do. VeriClouds uses the same data attackers do, proactively monitoring the dark web and systematically reducing user-centric risk. VeriClouds provides the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen passwords.

VeriClouds

  Netskope is the leader in cloud security. Trusted by the world’s largest companies, Netskope’s cloud-scale security platform enables security professionals to understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work. Netskope — security evolved.

Netskope

Security Colony

Access expert advice and resources that will reduce the time and cost of solving information security problems.

Security Colony

Vendor | Topic Downloads (PDF)
CyberReason|
2020 CyberReasons Security Predictions
PDF
CyberReasons|
Ransomware Decoded
PDF
CyberReasons|
The Seven Struggles of Detection and Response
PDF
Illumio|
Best Practice Guide to Secure Your Crown Jewel Applications
PDF
Illumio|
CXO – What We Do
PDF
Zscaler |
Securing Cloud Enabled Organizations
PDF
Zscaler |
Enabling the Secure Transformation to the Cloud
PDF
Zscaler |
Office 365 Network Readiness
PDF
Haystack Associates |
The California Consumer Protection Act
PDF
Page Dividing Line