Company: Arbor Networks
Company Description: Arbor Networks, the security division of NETSCOUT, deliver the most scalable and deployable network traffic security solutions to empower security teams to detect and confirm advanced threat campaigns faster and smarter than before. NETSCOUT SYSTEMS, INC. is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding networks.
Company Description: Bayshore’s breakthrough technologies enable safe and secure integration of IT and OT networks, systems, data, and infrastructure. They address the IT/OT Convergence Gap by securing the gateway between operational and business networks - offering visibility, control, and protection for Operational Technology, and transforming operational data for IT applications.
Session Title: Five Actions for Improving Operational Technology Security
Session Description: This interactive session focuses on protecting critical OT infrastructure against cyber threats. A live demonstration shows why OT uniquely requires visibility, control, and active protection to ensure safety and security when connecting physical assets to business networks. Case studies explore benefits, risks, and insightful best practices for successful IT/OT convergence.
Product Categories: Cloud Protection, Incident Response, Security Forensics, Threat Intelligence, Network Security, Endpoint Protection, SIEM, Vulnerability Assessment and Management, Security Awareness, Enterprise Risk Management, Data Loss Prevention, Encryption, Enterprise and IT Compliance
Company Description: CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage.
Session Title: Protect Your King: The Key to Maintaining Control of Your Business
Session Description: Cyber attacks targeting Domain Controllers (and Active Directory) are devastating. Once they are compromised, trust in the IT infrastructure is completely broken. Learn about increasingly common types of attacks, like Golden Ticket, and how privileged account security combining proactive protection and threat detection can thwart attackers before complete network takeover is accomplished.
Product Categories: Network Security, Endpoint Protection, Cloud Protection, Threat Intelligence, Threat Modeling
Company Description: SentinelOne was founded by a group of international defense and intelligence experts who saw the need for a dramatic new approach to endpoint protection. Today, our growing global team remains dedicated to constant innovation. SentinelOne’s breakthrough platform unifies prevention, detection, and response, driven by machine learning and intelligent automation. SentinelOne EPP is certified as an antivirus replacement, recognized by Gartner and NSS Labs for its disruption, and trusted by the world’s most forward-thinking companies to protect their business.
Company Description: WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. Through a combination of technology, over a decade of intelligence metrics, and the judgment of people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry.
Session Title: Building Vulnerability Management into your AppSec Program
Session Description:How to employ and combine technology, human intelligence, risk analysis, metrics, and prioritization into your vulnerability management program by embedding Application Security within your development lifecycle.
Product Categories: Mobile & Wireless Controls, Cloud Protection, Threat Intelligence, Pen Testing/Red Teaming/Threat Hunting, Endpoint Protection, Vulnerability Assessment & Management, Security Awareness, Enterprise Risk Management, Application Development & Testing, Data Loss Prevention, Enterprise & IT Compliance, Business Continuity
Company Description: Cisco Stealthwatch delivers in-depth visibility for detecting suspicious network behaviors. It collects and analyzes NetFlow to provide a complete view into your network traffic and users. This intelligence dramatically improves threat detection, incident response, network segmentation, and forensics. With Stealthwatch, you are better equipped to combat today’s most stealthy attackers.
Company Description: Comodo is a global innovator and developer of cybersecurity solutions, founded on the belief that every digital transaction requires a layer of trust and security. Through Comodo’s digital certificate leadership, IT management solutions and advanced endpoint security technology, enterprises rely on Comodo to authenticate, validate and secure their IT environments.
Company: Contrast Security
Company Description: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. More accurate and effective than out-moded legacy security measures, Contrast Security is a completely new approach to application security – the world's first comprehensive platform for protecting enterprise applications and APIs from within. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate analysis and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches and defeat hackers. Only Contrast secures the entire software lifecycle by exposing vulnerabilities during app development and blocking attacks during operation.
Session Title: Welcome to the Era of Self-Protecting Software
Session Description: SAST, DAST, and WAF have been around for almost 15 years — they’re almost impossible to use, can’t protect modern applications, and aren’t compatible with modern software development. Recent studies have demonstrated that these tools miss the majority of real vulnerabilities and attacks while generating staggering numbers of false positives. To compensate, these tools require huge teams of application security experts that can’t possibly keep up with the size of modern application portfolios. Fortunately, the next generation of application security technology uses dynamic software instrumentation to solve these challenges. Gartner calls these products “Interactive Application Security Testing (IAST)” and “Runtime Application Self-Protection (RASP).” In this talk, you’ll learn how IAST and RASP have revolutionized vulnerability assessment and attack prevention in a massively scalable way.
Session Product Categories:Vulnerability Assessment and Management, Application Development and Testing
Company Description: Cynet is a pioneer in advanced threat detection and response. The Cynet 360 platform simplifies security by providing one rapid, easily integrated solution for Endpoint Detection & Response, UBA, Network Analysis, File Analysis, Deception, Threat Intelligence, Forensics, Incident Response, 24/7 Monitoring and more.
Session Title: Simple Security is Effective Security
Session Description: Your team requires a comprehensive set of tools, capabilities and expertise to protect the organization from threats. Traditionally these are provided by disparate technologies and services from various providers which don’t integrate and make the job more complex. Cynet 360 is a comprehensive platform which provides, prevention, detection, forensics, response, UBA and deception all in one comprehensive integrated system. Engineered to simplify. Deployed for precise detection and response.
Product Categories: Incident Response, Security Forenics, Threat Intelligence, Threat Hunting, Deception, Endpoint Security, SIEM, Vulnerability Assessment and Management, Enterprise Risk Management, Data Loss Prevention, Business Continuity, Enterprise & IT Compliance
Company Description:Lumeta platforms provides critical cyber situational awareness that helps security and network teams prevent breaches by offering unmatched discovery of known, unknown and rogue network infrastructure, real-time network and endpoint monitoring and segmentation analytics for dynamic network elements, endpoints, virtual machines, and cloud-based infrastructure.
Session Title: Endpoint Vendor Blind spots and Network Visibility Gaps in Preventing Breaches.
Session Description: The vendor landscape is overly focused on KNOWN “network connected” endpoints, the perfect opportunity for attackers to exploit. Lumeta can show you how to find and monitor the large percentage of physical and virtual endpoints and networks in real-time that are often “in the shadows”...unknown, unmanaged and often unprotected.
Product Categories: Network Security, Vulnerability Assessment, Endpoint Protection, Security Forensics, Cloud Protection
Company Description: Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise. With PrecisionAccess™, enterprises can continue to evolve their business ecosystem through major IT trends like cloud migration and outsourcing with assurance that their most valuable applications are safe.
Session Title: Enhance Security While Reducing Cost and Complexity
Session Description: Vidder turns open networks into trusted systems by reducing complexity and cost while enhancing protection. Combing Software Defined Perimeter technology with deep trust assessment, visibility and control, the Company’s PrecisionAccess™ re-invents access control for uses cases which include network access control, remote/fieldworker access, segmentation and cloud isolation.
Product Categories: Cloud Protection, threat Intelligence, Network Security, Endpoint Protection, Identity and Access Management, Security Awareness, Enterprise Risk Management, Data Loss Prevention, Encryption, enterprise and IT Compliance
Company: Positive Technologies
Company Description: Positive Technologies is a leading global provider of enterprise security solutions with a primary focus on application security. In order to ensure a continuous cycle of application security at the highest levels without any business disruption, we’ve combined our products and services into a comprehensive application security solution.
Company Description: Headquartered in Sunnyvale, CA, SafeBreach is a pioneer in the emerging category of continuous security validation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture to quantify risks and validate security controls. SafeBreach is funded by Sequoia Capital, Deutsche Telekom Capital, HPE and investor Shlomo Kramer.
Session Title: Shall We Play a Hacker? Simulating the Adversary for Better Security
Session Description: The biggest problem of the security industry today is that despite $80B in annual cybersecurity spend, we still don’t know whether our defenses can stand up to a breach. How can we work smarter by putting ourselves in our adversary’s footsteps? How can we proactively identify critical gaps in security defenses? In this session, we will present a new technology that “simulates” hacker breach methods to continuously quantify risks, validate security controls and challenge your SOC teams. Join us to explore insights from real world deployments and the Hacker’s Playbook to better secure your organization.
Product Categories: Cloud Protection, Incident Response, Threat Intelligence, Pen Testin / Red Teaming / Threat Hunting, Network Security, Endpoint Protection, SIEM, Security Awareness, Enterprise Risk Management, Data Loss Prevention, Enterprise and IT Compliance, Threat Modeling
Company Description: SECDO is the first preemptive incident response solution, slashing incident response time to seconds. Gain unmatched historical thread-level endpoint visibility, automatically investigate any alert and visualize the forensic timeline and attack chain back to the root cause. Then, rapidly and surgically respond and remediate on any endpoint or server without impacting business productivity.
Session Title: Preemptive Incident Response – the End of Alert Triage
Session Description: Every day, thousands of alerts pour over cyber defense ramparts. False positives attract return fire, misdirecting the critical response-work of analysts. SOC teams must resort to inefficient triage just to cope with the alert volumes and cannot focus effective response on real threats. SECDO arms security teams with a new, effective methodology, Preemptive Incident Response, in the war against cyberattacks. It automatically validates alerts, accurately deflects false positives and empowers SOCs to address all real incidents, quickly resolving them with new, powerful investigation and response tools. In this session, you will learn how SECDO multiplies SOC effectiveness, enabling analysts to properly address every alert every day.
Product Categories: Incident Response, Security Forensics
Company Description: Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state, and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of efficiency in IT operations.
Two Center Plaza, Suite 500
Boston, MA 02108
© Copyright 2016 IANS.
All rights reserved.
Download our Mobile App for access to:
Build a Custom Agenda