Lieberman Software proactively mitigates cyber-attacks that bypass conventional enterprise defenses and penetrate the network perimeter. By delivering an adaptive identity threat response in real-time, the company continuously secures your environment, countering malicious attacks from the outside, and within. Customers who use the Lieberman Software Adaptive Privilege Management Platform to continuously change privileged credentials and SSH keys are no longer exposed to unbounded business risk caused by sophisticated attacks. That’s why the largest companies and governments across the globe trust Lieberman Software to secure their assets, protect their finances, and guard their reputation. For more information, visit us at: www.liebsoft.com/erpm
Malwarebytes protects businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. For more information, visit www.malwarebytes.com
Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Darktrace is a world-leading cyber-threat defense company. Its Enterprise Immune System technology automatically detects and responds to threats, powered by machine learning and mathematics developed by specialists.
iboss has created the first and only Distributed Gateway Platform specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, iboss leverages an elastic, node-based architecture that provides advanced security for today’s decentralized organizations and scales to meet the ever-increasing bandwidth needs of tomorrow.
It is Javelin’s mission to educate the industry and other security personnel about Active Directory exposure and, in the process, protect every machine connected to the corporate domain.
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. KnowBe4 was created to help organizations manage the problem of social engineering tactics through new school security awareness training. Thousands of organizations use KnowBe4, including highly regulated fields such as finance, healthcare, energy, and government.
LogRhythm is the pioneer in Threat Lifecycle ManagementTM (TLM) technology, empowering organizations on six continents to rapidly detect, respond to and neutralize damaging cyberthreats. LogRhythm’s TLM platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments.
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including four of the five largest U.S. financial instituti stop targeted cyberattacks.
Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,200 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand.
Bomgar’s Secure Access solutions enable customers to easily support people, access and protect endpoints, and defend privileged credentials, in order to fight cyber threats and speed business performance. More than 12,000 organizations around the globe use Bomgar to deliver superior support services and reduce threats to valuable data and systems. Bomgar clients include some of the world’s leading IT outsourcers, systems integrators, software vendors, healthcare organizations, government agencies, universities, financial institutions, and retailers.
For over three decades, the Software Engineering Institute (SEI) has been helping government and industry organizations to acquire, develop, operate, and sustain software systems that are innovative, affordable, enduring, and trustworthy. We serve the nation as a Federally Funded Research and Development Center (FFRDC) sponsored by the U.S. Department of Defense (DoD) and are based at Carnegie Mellon University, a global research university annually rated among the best for its programs in computer science and engineering.
Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications.
CorreLog, Inc. is the leading ISV for cross-platform IT security log management and event log correlation. Our solutions provide best-in-class, real-time event log collection across both distributed and mainframe systems. Event logs generated from CorreLog Agents are ready-format for the CorreLog SIEM Correlation Server or any SIEM correlation engine.
DG Technology believes the foundation for success is through partnerships. There is no single entity that can be everything to every company. As a network we can bring the right skills to the right situation at the right time at the right price. DG Technology is uniquely positioned to provide solutions to our clients through partnerships. These solutions are backed and supported by a network of the best of breed technologies and the most talented technologists.
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
At Duo, we combine security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools for the modern era. It’s so simple and effective, you get the freedom to focus on your mission and leave protection to us.
eSentire® provides managed detection and response services to mid-sized organizations, keeping them safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. Delivering an unmatched, premium-level service, eSentire protects more than $3.2 trillion in Assets under Management (AuM) and is the award-winning choice for security decision-makers.
Hitachi ID Systems delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. To learn more about Hitachi ID Systems, call 1.403.233.0740 or follow @Hitachi_ID on Twitter.
InfoArmor offers industry-leading cyber intelligence services that help our clients fight emerging fraud and advanced cyber threats. We combine an unparalleled global research network with big data analysis, actionable intelligence and customized service to meet clients’ dynamic security needs with our award-winning VigilanteATI® advanced threat intelligence platform. For more information, visit InfoArmor.com.
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget. ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford. From network and device management to security and service desk software, we're bringing IT together for an integrated, overarching approach to optimize your IT.
We live in a net-centric world where new information technologies arrive at lightning speed, allowing us to share information across town or around the world faster than ever before. The National Security Agency's Information Assurance Mission is dedicated to providing information assurance solutions that will keep our information systems secure.
Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. SecureONE takes a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access. Nothing else makes PAM this easy. With no agents to install or password vault to manage, SecureONE is the “easy” button for PAM.
In 2005, we set out to create a new type of company – one that promised to provide innovative solutions to business problems and an exciting, collaborative work environment for identity rock stars. Together, we’re redefining identity’s place in the security ecosystem. SailPoint loves taking on new challenges that seem daunting to others. We hold ourselves to the highest standards, and deliver upon our promises to our customers. We bring out the best in each other, and we’re having a lot of fun along the way.
Your mission is to unleash your creativity, productivity and success. Ours is to ensure that a hostile cyber environment can’t stop you. Secure Channels’ innovative platforms build security into endpoints, applications, and networks from the inside out, securing access to your critical resources while protecting your data from breach, theft and misuse.
Signal Sciences' web protection platform enables companies to find and stop attackers from breaching critical customer data via vulnerabilities in their code. Our technology focuses on democratizing attack information beyond just security experts. We enable entire technology teams, including both dev and ops, to find and stop attacks as they happen.
Headquartered in Cleveland, Ohio, TrustedSec is an IT Security Consulting company, made up of researchers, hackers, advisors, who all share a passion for Security. Information Security does not need to be complex. Our mission: to help organizations defend against threats of all kind and change the security industry for the better. Simple and challenging. Behind closed doors you will find us researching, developing new tools, conducting training classes, keynoting and presenting at conferences throughout the world.
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, up to 90%.
Association & Media Sponsors
The (ISC)2 Central Florida Chapter is a professional association created by (ISC)² members for (ISC)² members & IT / Information Security professionals in the community. Our mission is to provide members and other security professionals the opportunity to share knowledge, grow professionally, raise security awareness and advance information to those in the Community. This is accomplished by delivering material that educates, connects, inspires and helps our members secure their environments and our community. While many of our members have a (ISC)² credential, having a (ISC)² credential is not required to become a member of our chapter. Please visit our site to learn about upcoming events where we can secure, educate, connect, and inspire you!
Code Like A Girl Inc. is an online publication whose goal it is to change the perceptions of Women In Technology by Amplifying their voices. Our mission is to inspire girls and women to choose a career in tech and support them once they are there.
The Security Weekly mission is to provide free content within the subject matter of IT security news, vulnerabilities, hacking, and research. We strive to use new technologies to reach a wider audience across the globe to teach people how to grow, learn, and be security professionals.
Security Weekly is the 6-time winner of the RSA Social Security Awards Best Security Podcast. For the past 12 years, we have successfully distributed security information through our blog, social media, lead generating webcasts, podcasts, and Internet TV.