QuickMobile QuickMobile is the pioneer of feature-rich mobile event apps for meetings, conferences, and exhibitions. Our apps delight audiences by enhancing the way they network, schedule activities, engage with content, and access information. Since 2006, QuickMobile has created thousands of mobile solutions for clients in 34 countries. All our event apps are built on a highly secure, enterprise-grade platform that aligns with any corporate mobile strategy, and have the flexibility and scalability to fit any kind of event, regardless of size. We work with event and meeting professionals to develop fully branded event apps that are available across all mobile platforms and serve as powerful communications channels that keep conversations and attendee participation going long after the closing remarks. QuickMobile's mobile event apps connect attendees, distribute and manage multi-lingual content, promote your brand, integrate with all social platforms, and gather real-time audience and participation data – all in one simple mobile solution. For more information, visit http://www.quickmobile.com/.
Entrust Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems. Government agencies, financial institutions, and other enterprises rely on Entrust solutions to strengthen trust and reduce complexity for consumers, citizens, and employees. Now, as part of Datacard Group, Entrust offers an expanded portfolio of solutions across more than 150 countries. Together, Datacard Group and Entrust issue more than 10 million secure identities every day, manage billions of secure transactions annually, and issue a majority of the world's financial cards. For more information about Entrust solutions, call 888-690-2424, email email@example.com, or visit entrust.com.
eSentire eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. eSentire's flagship offering, Network Interceptor, challenges legacy security approaches, combining behavior-based analytics, immediate mitigation and actionable intelligence on a 24x7x365 basis. The company's dedicated team of security experts continuously monitors customer networks to detect and block cyber attacks in real-time. Protecting more than $1.3 trillion in combined assets, eSentire is the trusted choice for security decision-makers in financial services, healthcare, mining, energy, engineering and construction, legal services, and technology companies. In late 2013, eSentire was named to the Deloitte Technology Fast 50 Companies to Watch and cited as a Canadian Innovation Exchange CIX Top 20 most innovative Canadian company. For more information visit www.esentire.com and follow @esentire.
Table Top Sponsors
F5 Networks F5 Networks (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software-defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world's largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. Learn more at www.f5.com. You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technology.
Cigital Cigital is one of the world's leading software security services and products companies. We help clients launch and mature software security initiatives, as well as design, build, and test secure software through a combination of expert consultants, security testing as-a-service offerings, and effective training built on over twenty years of cutting-edge research and successful client engagements. From Architecture Risk Analysis and Mobile App Security Assessments to Source Code Review and Penetration Testing, Cigital is uniquely qualified to help clients find and fix the security flaws and defects that make software vulnerable to being attacked and exploited. To learn more about our services and products, visit us at www.cigital.com.
Bit9 + Carbon Black Bit9 + Carbon Black offers the most complete solution against the advanced threats that target your endpoints and servers, making it easier for you to see—and immediately stop—those threats.
Carbon Black's lightweight endpoint sensor, which enables detection and response in seconds, combined with Bit9's industry-leading prevention technology, delivers:
Continuous, real-time visibility into what's happening on every computer
Real-time threat detection, without relying on signatures
Instant response by seeing the full attack "kill chain"
Proactive, customizable prevention
Thousands of organizations use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading MSSPs and IR companies have made Bit9 + Carbon Black a core component of their detection and response services. With Bit9 + Carbon Black, you can arm your endpoints against advanced threats.
GMO GlobalSign GlobalSign has been a trust service provider since 1996. Its focus has been, and always will be, on providing convenient and highly productive PKI solutions for organizations of all sizes. Its core Digital Certificate solutions allow its thousands of authenticated customers to conduct SSL secured transactions, data transfer, distribution of tamper-proof code, and protection of online identities for secure email and access control. Vision and commitment to innovation led to GlobalSign being recognized by Frost & Sullivan for the 2011 Product Line Strategy Award. The company has local offices in the US, Europe and throughout Asia. For the latest news on GlobalSign visit www.globalsign.com or follow GlobalSign on Twitter (@globalsign).
Sophos Sophos makes IT security simple with complete solutions that protect networks, servers and devices, wherever they are located. Today, more than 100 million users in 150 countries and a global network of channel partners rely on Sophos for trusted solutions to complex security challenges. Focused on innovation and backed by a global network of SophosLabs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain and manage, enabling organizations to focus on performance and growth. Sophos – Security made Simple. Learn more at www.sophos.com.
DomainTools DomainTools cyber threat intelligence solutions give organizations the ability to create a forensic map of criminal activity, assess threats and prevent future attacks. DomainTools' web-based application enables users to pivot through 12 years historical records of Whois, hosting, DNS information and screenshots, the industry's broadest source of domain profiles including all ccTLDs, and IP address, hosting data, mail server records and more in order to investigate suspicious activity. Customers and partners can also integrate this rich dataset into their existing solutions through an API. Fortune 500 companies, global government agencies, and many security and online fraud investigation vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Visit the website at http://www.domaintools.com.
Guidance Software Guidance Software is recognized worldwide as the industry leader in endpoint investigation solutions for security incident response and forensic analysis. Its EnCase® Enterprise platform, deployed on an estimated 20 million endpoints, is used by more than 70 percent of the Fortune 100 and more than 45 percent of the Fortune 500, and numerous government agencies, to conduct digital investigations of servers, laptops, desktops and mobile devices. Built on the EnCase Enterprise platform are market-leading cyber security and electronic discovery solutions, EnCase® Cybersecurity, EnCase® Analytics, and EnCase® eDiscovery. They empower organizations to conduct speedy and thorough security incident response, reveal previously hidden advanced persistent threats or malicious insider activity, perform sensitive data discovery for compliance purposes, and respond to litigation discovery requests. For more information about Guidance Software, visit www.encase.com.
IBM Security IBM's security portfolio provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world's broadest security research and development, and delivery organizations. IBM monitors 15 billion security events per day in more than 130 countries and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence at www.securityintelligence.com.
Kaspersky Lab Kaspersky Lab is one of the fastest growing IT security vendors in the world. Firmly positioned as one of the top four vendors of security solutions for endpoint users, operating in almost 200 countries and territories worldwide, Kaspersky products and technologies provide protection for over 350 million users. Kaspersky Lab provides a wide range of products and solutions for different types of clients, with a special focus on large enterprises, and small and medium-sized businesses. For more information about Kaspersky Lab, visit www.encase.com.
BAE Systems At BAE Systems, we serve the needs of our customers by delivering a wide range of advanced defense, aerospace and security solutions that provide a performance edge. We work together with local partners to develop, engineer, manufacture and support the innovations that increase defense sovereignty, sustain economies and safeguard commercial interests. BAE Systems Applied Intelligence is a business division of BAE Systems that delivers solutions that help clients to protect and enhance their critical assets in the intelligence age. Leading enterprises and government departments use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, corporate information, reputation and customer relationships, competitive advantage, and financial success. For more information, visit http://www.baesystems.com.
LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company's patented and award-winning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect and respond to breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide. LogRhythm is headquartered in Boulder, Colorado with operations in North and South America, Europe and the Asia Pacific region. For more information, visit http://logrhythm.com/.
SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.
FierceCIO provides CIOs with IT best practices, business intelligence, and forward-looking IT strategies. Join 25,000+ industry insiders who get FierceCIO daily via email and save time. Sign up for the newsletter when you register for Rock Stars of Cybersecurity.
IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
IT Professional magazine offers solid information about today's strategic technology issues. To meet the challenges of running reliable, flexible enterprises, IT managers and technical leads rely on IT Pro for state-of-the-art solutions.