Solution Providers

AbacusNext

https://www.abacusnext.com/

As the largest Technology-as-a-Service (TaaS) provider for the professional services sector, AbacusNext helps legal and accounting professionals achieve ultimate success and peace of mind through the delivery of a complete suite of compliance-ready technology solutions designed to support a secure and cloud-enabled practice at a cost they can afford. Our portfolio of turnkey solutions includes hardware, software and infrastructure on a pay as you go model; Practice Management, Client Resource Management (CRM), Payment Processing, Email, Desktop as a Service (DaaS) and Managed IT.

Headquartered in San Diego, California, and backed by private investment with Providence Equity, AbacusNext delivers products and services to over 500,000 businesses worldwide. To sign up or learn more visit AbacusNext.com.

Accenture

http://www.accenture.com/

Accenture is a global management consulting, technology services and outsourcing company, with approximately 236,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$25.5 billion for the fiscal year ended Aug. 31, 2011.

Accenture Security Solutions professionals leverage decades of experience, deep industry knowledge and business-process know-how to help protect against threats, minimize risks and enable the adoption of new technologies that promote growth.

ACORN machine

https://www.acornmachine.io

ACORN machine is a fintech platform that helps automate the way banks penetrate the bespoke SME lending market. It does this by leveraging process excellence, machine learning and technology to fuel data-driven decision making across the loan lifecycle.

This includes everything from the target identification, lead capture and qualification, to the underwriting, credit analysis, booking and proactive monitoring of the loan.

The platform collects millions of data items on SMEs across various parameters, sectors, and markets, and uses machine learning algorithms to identify data that lenders need to make more informed credit decisions. ACORN’s team of credit analysts and data scientists manage the process, training the machine learning algorithms, so that the platform continues to evolve and get smarter. The platform therefore provides its clients with significant process efficiency gains, data-driven decision making, and smarter credit analysis and capabilities.

The concept of ACORN machine was proven via OakNorth, an award-winning challenger bank founded in 2015 to address the mid-market funding gap in the UK.

To date, the bank has lent c.£1bn to UK businesses and property developers, directly helping with the creation of over 5,100 new homes and thousands of new jobs. The bank reached cash flow break even in just 11 months, had repaid all its accrued debts before it turned two years old, and had a full year of profitability in 2017.

The ACORN machine team is now embedding the platform with banking partners around the world, enabling them to replicate OakNorth’s success in the UK in their own markets.

Adallom

http://www.adallom.com/

Adallom is a SaaS security company founded in 2012 by alumni of the Israeli Intelligence Corps. We focus on evolving the way enterprises secure information in SaaS by monitoring all activity, detecting unauthorized access, and protecting users in real time. Adallom is the only SaaS security company to have defeated targeted SaaS attacks in the wild by applying advanced machine learning to real time user activity monitoring. We are members of Microsoft’s MAPP (Microsoft Active Protections Program), and would love to work with you on securing your company’s SaaS investment.

If you’re curious about our name, “Adallom” is an abbreviation of the Hebrew saying “Ad Halom” which literally means “up to here” and in game theory lingo means “the last line of defense.” In the context of SaaS we believe that pre-existing defense mechanisms are ineffective at protecting information in SaaS. So we created a solution that extends the boundaries of enterprise security into the cloud. We moved control, visibility, and detection directly into SaaS, away from devices and perimeters. In the SaaS era, security can’t be bounded. Adallom’s charter is Security Without Boundaries.

Appian

http://www.appian.com

Appian delivers an enterprise platform for digital transformation that makes it easy for organizations to move fast and revolutionize the customer experience. Powered by industry leading Business Process Management (BPM) and Case Management capabilities, Appian’s low-code approach radically accelerates the time it takes to build and deploy powerful, modern applications, on-premises or in the cloud. The world’s most innovative organizations use Appian to revolutionize their customer experiences, transform their business operations, and master global risk and compliance. For more information, visit www.appian.com.

Aspect

http://www.aspect.com

Aspect helps enterprises break down the walls between people, processes, systems and data sources, allowing organizations to unite around the customer journey. By developing fully native contact center interaction management, workforce optimization and self-service capabilities within a single customer engagement center, we enable dynamic, conversational interactions and create a truly frictionless omni-channel customer experience. Leveraging the agility of our worldwide cloud infrastructure and over 40 years of industry ingenuity, Aspect conveniently and easily connects questions to answers while helping enterprises keep service levels high and operational costs contained. For more information, visit www.aspect.com.

AT&T

http://att.com/cloud

At AT&T, we’re bringing it all together. We deliver advanced mobile services, next-generation TV, high-speed internet and smart solutions for people and businesses. That’s why we’re investing to be a global leader in the Technology, Media and Telecommunications industry.

Business is changing every day. Companies need the agility to effectively compete and win in their industries. AT&T solutions help companies adapt to change in near real time and meet the evolving needs of tomorrow. More than 3 million businesses from the largest multinational corporations to small businesses turn to AT&T. We work with companies in all major industries, including financial services, manufacturing, education, healthcare, retail, hospitality and government.

We serve nearly all of the Fortune 1000. We also serve more than 60 percent of the FTSE 100 companies, more than 90 percent of the CAC 40 companies, more than 85 percent of the DAX 30 companies and more than 60 percent of the Nikkei 225 companies.

We’ve launched some of the industry’s most innovative products and platforms through our highly secure business solutions — including security and mobility services, Internet of Things, Ethernet, VPN, cloud, AT&T NetBond® and AT&T FlexWare.

Security is at the core of what we do. AT&T security experts analyze the traffic on our network 24/7/365 to help understand and identify the latest emerging threats. With more than 180 petabytes of data crossing our network every day, our experts have unique insight into the threat landscape that helps them detect new threats before they become a problem.

athenahealth

http://www.athenahealth.com/

athenahealth is a leading provider of cloud-based practice management, EHR and patient communication services to medical groups, hospitals and health systems.

For athenahealth clients, being on a cloud-based service means benefiting from the collective clinical and payer knowledge of 29,000 providers on our growing network. This includes continuously tracking and updating payer and clinical rules, formulary requirements, and managing pay-for-performance and other quality programs to secure maximum incentives. athenahealth’s suite of integrated, cloud-based services includes:

  • athenaCollector® – a medical billing and practice management solution that reduces administrative red tape and allows medical groups to efficiently assess, plan, and improve practice performance while increasing revenue. It’s easy to use, saves time and dramatically improves the bottom line. Practices are able to track and access information on any claim, create simple, robust reports and get instant data for every business decision.
  • athenaClinicals® – a Stage 1 Meaningful Use-certified electronic health record that delivers greater clinical control and insights to medical practices while boosting efficiency and revenue potential.
  • athenaCommunicator®– automated messaging, live operator services, and a patient web portal that keeps medical groups competitive, compliant and accessible.
  • athenaCooordinator℠ – a care coordination service for order transmission, insurance pre-certification and patient registration among physicians and hospitals, surgical centers and imaging centers.

Being on a cloud-based service in the health care information technology space means we can exercise our comparative advantage to execute client work at scale, processing clinical documents, posting claims, tracking payments, and more. And it means we have constant visibility into every client’s performance, so we can monitor, benchmark and coach our clients toward peak performance.

Atlassian

https://www.atlassian.com

Atlassian unleashes the potential in every team. Our products help teams organize, discuss and complete shared work. Today Atlassian is the leading provider of collaboration software for teams at more than 51,000 companies globally, including top brands like Citigroup, eBay, Coca-Cola, Visa, BMW and NASA. We help teams at organizations of all sizes, from start-ups to large companies, and more than 75 percent of Fortune 100 companies are Atlassian customers.

Atlassian’s portfolio of products includes JIRA for team planning and project management, Confluence for team content creation and sharing, HipChat for team messaging and communications, Bitbucket for team code sharing and management and JIRA Service Desk for team services and support applications. Hundreds of third-party applications are built on top of Atlassian products and the company supports dozens of integration partners.

Atos

http://atos.net

Atos SE (Societas Europaea) is a leader in digital services with 2014 pro forma annual revenue of circa € 11 billion and 93,000 employees in 72 countries. Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Cyber-security solutions, as well as transactional services through Worldline, the European leader in the payments and transactional services industry. With its deep technology expertise and industry knowledge, the Group works with clients across different business sectors: Defense, Financial Services, Health, Manufacturing, Media, Utilities, Public sector, Retail, Telecommunications, and Transportation.

Atos is focused on business technology that powers progress and helps organizations to create their firm of the future. The Group is the Worldwide Information Technology Partner for the Olympic & Paralympic Games and is listed on the Euronext Paris market. Atos operates under the brands Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, and Worldline.

Avanan

http://avanan.com

Avanan: Any Cloud | Any Security | One Click

Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS cloud. Partnering with the industry’s most trusted security vendors, Avanan offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, compromised accounts and more. The cloud-based platform is completely out-of-band and can be deployed in one click.

Future-proof, best-of-breed cloud security and policy orchestration.

Avaya

https://www.avaya.com

Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. Avaya Breeze Platform™ enables third parties to create and customize business applications for competitive advantage. The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.

Barracuda Networks

http://www.barracuda.com/

Barracuda is a well-known leader in data security and protection. Barracuda’s cloud security solutions have been specifically engineered for Amazon Web Services, Google Cloud Platform, and Microsoft Azure. Barracuda is Azure certified, provides security competencies in AWS, and lead the market in terms of overall cloud firewall sales. Customers turn to Barracuda because they enable them to extend data security and protection in the cloud and to bridge their on-premises solutions as they continue their cloud journey. As part of the shared security responsibility models, Barracuda products complement existing public cloud services and provide simple, seamless interfaces to protect environments whether they are in-cloud, on-premises or hybrid configurations.

Bell

http://www.bell.ca/

Bell is Canada’s largest communications company, providing consumers and business customers with wireless, TV, Internet, home phone and business communications services. Bell Media is Canada’s premier multimedia company, with leading assets in television, radio, out of home and digital media. Bell is wholly owned by Montréal’s BCE Inc. (TSX, NYSE: BCE). For more information, please visit http://Bell.ca.

BH Consulting

http://bhconsulting.ie/

Founded in 2004, BH Consulting is an award-winning independent advisory firm specialising in information security consulting, cybersecurity, cloud security, risk assessment, cloud forensics, and training. BH Consulting is recognised internationally as a leader in cybersecurity by Kennedy Consulting Research & Advisory, and has won numerous awards in recognition of its excellence and professionalism.

Bitglass

http://www.bitglass.com/

Bitglass is a “cloud access security broker” and the leader in total data protection. Bitglass enables enterprises to adopt cloud-based applications without having to sacrifice the security of their data. The company’s data protection suite delivers innovative technologies that transcend the network perimeter to deliver end-to-end data protection for the enterprise – in the cloud, on mobile devices and anywhere on the Internet. As industries like Healthcare and Finance begin adopting cloud apps, companies within them must comply with strict data protection regulations. Bitglass helps enterprises remain compliant while giving their enterprise IT teams the visibility and control they need and their employees the mobility and privacy they require. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. The company is based in Silicon Valley and backed by venture capital from NEA and Norwest.

BitSight Technologies

http://www.bitsighttech.com

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company’s Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums.For more information, please visit www.bitsighttech.com or follow us on Twitter (@BitSight).

Bluedon

http://www.bluedon.com

Bluedon is a trusted provider of network security solution, enables organizations to simplify network security and make their online business reliable. Over 10,000 customers worldwide run systems on Bluedon’s high performance network security solutions, including China’s large state-owned enterprises, Fortune 500 companies, famous education and financial institutions and telecom operators. Bluedon is headquartered in Guangzhou in China, and has always been providing top-ranking network security products and best practice services, helping customers protect their data and information since founded in 1999. Bluedon’s products cover four categories, Security Gateway, Network Activity Audit, Security Management and Web Security. Specifically, IDS, UTM, BSM, Database Security Audit and Security Operation Center have been highly commended with outstanding performance by customers from different areas. With Bluedon’s cloud security solution, your organization enjoys productivity and flexibility that cloud brings to you. For more information, please visit http://www.bluedon.com.

CaixaBank

https://www.caixabank.com/

CaixaBank is a financial group, leader within the Spanish market, comprising a banking and insurance business, as well as undertaking investments in international banks and in leading service sector companies. The Group’s essence – and what sets it apart from others – is its level of implication and unswerving commitment to society. CaixaBank is committed to banking based on corporate values of quality, confidence and social commitment. CaixaBank has the largest customer base in Spain – 14 million people – and is the main bank for 1 in every 4 Spanish customers. The bank has the most extensive network in Spain, with over 5,000 branches and nearly 9,500 ATMs, complemented by a mobile and online banking service of the highest quality.

CaixaBank is also the tenth largest bank in the Eurozone in terms of market capitalisation.

Cedrus

https://cedrus.digital/cloud-security/

The Cedrus Cloud Security team has decades of experience in Enterprise Security. We understand the challenges within risk driven security programs and work with our clients to address these concerns as they manifest in the adoption of Cloud.

To help our clients, our team has created re-usable implementation patterns and use cases to specifically solve problems within the domains of Digital Identity Management Transformation and Digital Asset Protection in the Cloud through CASB.

Cendyn

http://www.cendyn.com

Cendyn is a cloud-based software and services provider that develops integrated technology platforms for driving sales and marketing performance in the travel and hospitality industry. The Cendyn Hospitality Cloud offers the most complete set of innovative software and services in the industry, covering hotel marketing, guest engagement, group sales, and event management. With offices in Boca Raton, Atlanta, Boston, San Diego, Toronto, Whistler, London and Singapore, Cendyn proudly serves more than 30,000 clients in 143 countries with enterprise spend levels in excess of $1 billion. For more information on Cendyn, visit www.cendyn.com.

Centrify

http://www.centrify.com/

Centrify is the leader in securing enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 500.

CEPREI Certification Body

http://www.ceprei.org

CEPREI HQ No.110 Dongguan Zhuang RD. Guangzhou, P.R.China Telephone: +86-20-87236606 C-STAR@ceprei.org As a leading provider of management system certification body in China and the first Executive Member of CSA in Asia, CEPREI Certification Body Provides information security related professional services such as ISO20000 & ISO27001 certification, risk assessment, IT governance, Business Continuity Management etc. Also, newly launched C-STAR assessment scheme is provided to help our client fully understand cloud security issues they’re facing and how to put the appropriate controls in place. CEPREI Certification Body with unique legal status is a registrar authorized and accredited by national department and/or accreditation bodies home and abroad, to conduct third-party certification. It grew out of Inspection Division of China Electronic Product Reliability and Environmental Research Institute (the Fifth Electronic Institute) established in 1956, which is the first scientific research organization at national level engaged in product quality and reliability research in China. As early as 1979, CEPREI Certification Body introduced the concept of Certification into China. Ever since then CEPREI has issued more than ten thousand certificates of various types to its clients. It sets foot in all administrative regions in mainland China and other countries and regions including Hongkong Special Administration Region, Taiwan, USA, German, Holland, Denmark, Australia, Japan, Korea, Malaysia, Thailand and Singapore. As one of the most authoritative accreditation bodies in the world, America National Standard Institute-Registrar Accreditation Board (ANAB) has authorized CEPREI Certification Body to issue ISO9000, ISO14000 and ISO27001 certificates with ANAB logo since 2001. The certificate will be helpful for your products and services in improving reputation and enhancing competitiveness home and abroad.

Check Point

https://www.checkpoint.com

Check Point Software Technologies Ltd. is a multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, mobile security, data security and security management.

Citrix

http://www.citrix.com/secure

Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control.

Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device.

With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.

CloudLock

http://www.cloudlock.com/

CloudLock is a leading cloud data security company that provides enterprise class solutions designed to give organizations control over their data in the public cloud, without invasive in-band technology, complicated overhead, or unanswered regulatory risk. Many of the world’s largest companies and institutions trust CloudLock’s approach of directly integrating with their SaaS applications, which makes robust security controls immediately available at a fraction of the cost and complexity of other alternatives.

CloudLock helps organizations:

  • Extend their DLP policies to SaaS applications such as Google Apps and Salesforce
  • Implement a robust discovery/classification/control security framework in the public cloud
  • Enforce the principles of people-centric security, greatly reducing their risk of data exfiltration or breach without driving users into unsanctioned (often called “shadow IT”) systems
  • Apply risk appropriate controls, including selective encryption, across their most sensitive data

For more information, please visit us at cloudlock.com

CloudPassage

http://www.cloudpassage.com/

CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company’s Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.

CNG Cyber Solutions

https://www.cngcybersolutions.com

CNG’s game changing solutions are designed to combat the ever-evolving cyber security threat environment. CNG Cyber Solutions, LLC three focus areas. Ground Zero, Federal Risk and Authorization Management Program (FedRAMP) FedRAMP Certification and Accreditation, Custom design and building of Sensitive Compartmented Information Facility.

Coalfire

http://www.coalfire.com/

Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Coalfire’s approach addresses each businesses’ specific vulnerability challenges, developing a long-term strategy to prevent security breaches and data theft. Coalfire provides advisory and assessment services for cyber security and compliance in DoD SRG, FISMA/FedRAMP, HIPAA/HITRUST, PCI DSS, PCI PA-DSS, ISO 27001, SOC and technical testing services such as penetration testing, social engineering and forensics. Coalfire has offices throughout the United States and Europe.

Cradlepoint

https://cradlepoint.com/

Branch, mobile, and IoT edge networks are undergoing dramatic change — and taking traditional enterprise WANs to their breaking point. Organizations must manage complex branch sites; data-driven vehicle fleets and mobile command centers; a vast array of IoT and M2M use cases; and everything in between. Founded in 2006, Cradlepoint has grown to become the industry leader in cloud-delivered 4G LTE network solutions for business, service providers, and government organizations, and we are committed to extending our leadership into the emerging 5G space. More than 25,000 customers worldwide in retail, financial services, healthcare, transportation, public sector, and other industries rely on Cradlepoint to keep their branch and mobile networks, and IoT devices, always connected and protected. Our Elastic Edge™ vision provides a blueprint for next-generation, software-defined edge networks built on pervasive and reliable 4G/5G wireless services, connecting people, places, and things everywhere with enterprise-class visibility, security, and control.

Cradlepoint is a privately held company headquartered in Boise, Idaho, with a development center in Silicon Valley, California, and international offices in the UK and Australia.

Crowdstrike

https://www.crowdstrike.com/

CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture. CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 27 billion events per day from millions of sensors deployed across more than 170 countries, uniquely providing crowdsourced protection for the entire customer community.

Cyxtera

https://www.cyxtera.com/

Cyxtera Technologies combines a worldwide footprint of 50+ best-in-class data centers with a portfolio of modern, cloud- and hybrid-ready security and analytics offerings – providing more than 3,500 enterprises, government agencies and service providers an integrated, secure and cyber-resilient infrastructure platform for critical applications and systems. For more information about Cyxtera visit http://www.cyxtera.com/.

DAS SEE

http://www.das-see.com

SN Registrars (Holdings) Ltd is the UKAS Accredited certification body operating under the trading names SNR Certification, DAS Certification and QEC Certification. For more information and locations of our international offices please visit www.snregistrars.com or www.dascertification.com

As regional representatives of DAS Certification, The DAS SEE office combines many years of experience in ISO 27001 and ISO 20000-1 certification within the ICT sector and is the designated program leader for the STAR Certification scheme with contact details below: DAS SEE, agent of SN Registrars (Holdings) Ltd office@das-see.com www.das-see.com

DBAPPSecurity

http://www.dbappsecurity.com.cn

2007 in Fremont of California, the company now has many branches with its national sales networks in many cities, such as Hongkong and Shanghai, Beijing in China. We provide products and services to 1000 customers across all industries, including many Fortune 500, large and middle-sized organizations. Since 2009, the DBAPPSecurity Ltd., a Leading company focusing on Web Application security and database security technologies. Founded in company’s revenue has being grown more than 50% per year.

DBAPPSecurity focuses its efforts on research and development and has a professional team with years of experience in developing and implementing data security and web application security solutions. The company owns some of the world leading technology patterns, and is dedicated to offer web application security and database security solutions. DBAPPsecurity’s customers include government organizations as well as leading companies from various industries such as finance, energy, education, medical and e-commerce industry.

Digital Asset Custody Company, Inc

https://www.digitalassetcustody.com/

DACC provides institutional quality crypto currency asset custody to institutional investors, HNW individuals, and family offices. DACC’s goal is to custody any crypto asset, including those deemed to be securities by the SEC. Currently, DACC can technologically custody 60+ crypto assets with industry-leading egress times from our network of secure, cold storage (“air-gapped”) facilities. These facilities are built to align with best practices found in the most secure government and private security organizations offering security, redundancy and, most importantly for institutional investors, custody.

DACC’s leadership team is comprised of individuals with careers spent within the most sophisticated financial services firms. This experience provides a unique vantage point and drives the customer service ethos expected by sophisticated crypto currency investors.

The DACC provides:

  • Institutional quality crypto asset custody
  • Segregated asset storage for every customer
  • Emphasis on process transparency, reporting, and service
  • Enterprise cyber security and physical security controls
  • Audited operational procedures

DACC has applied for membership to the Financial Industry Regulatory Authority (FINRA) and upon approval will be a Securities and Exchange Commission (SEC) registered broker-dealer.

Digiware S.A

http://www.digiware.net/

Digiware S.A. is the expert provider of comprehensive strategies generation in information security for America. With 20 years of experience, it protects organizations against security risks involved technological growth; in turn, aware of the enormous challenge facing the areas of information security today rests on the definition, implementation and maintenance of strategic programs for information security, that integrate with business objectives.

Proactive protection Digiware S.A., under the model of Resources of Security Intelligence – RIS, provides the visibility needed to boards, governing bodies, personal risk, operational, technological and security, to deal with the risks of dynamic information.

Dimension Data

http://cloud.dimensiondata.com/

Dimension Data accelerates the ambitions of its clients by delivering exceptional value through its great people. As an organization we’re inspired by teamwork, innovation, diversity, and integrity. We’re driven by professional excellence and always place our clients at the centre of everything we do. As a global leader in the provision and management of specialist IT infrastructure solutions and services, let us bring your ambitious ideas to life and accelerate your success.

Dome9

https://dome9.com

Dome9, the public cloud security company, delivers security and compliance automation to enterprises as they scale in any cloud. With Dome9, organizations gain full visibility and control of their security posture, allowing them to minimize their attack surface and protect against vulnerabilities, identity compromise, and data loss in the cloud. Dome9’s agentless SaaS solution provides operational efficiency for faster time-to-protection on Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Dome9 Arc is the most comprehensive cloud security solution in the market, going beyond just monitoring and alerting to deliver active cloud security. Enterprises around the world have chosen Dome9 as their key partner to provide the active protection necessary throughout their cloud journey.

Dropbox

https://www.dropbox.com/

Millions of people trust Dropbox to easily and reliably store, sync, and share their documents, photos, and videos across devices and platforms. Dropbox for Business helps organizations around the world collaborate effectively and increase productivity. And it brings IT admins the functionality, controls, and visibility they need to ensure the safety of their company data. Dropbox has been designed to keep users’ data safe, employing a sophisticated infrastructure, enterprise-grade security, layers of encryption, and detailed security, privacy, and compliance policies and procedures. To learn more about Dropbox for Business, www.dropbox.com/business.

Druva

http://www.druva.com

Druva is the leader in cloud data protection and information management, leveraging the public cloud to offer a single pane of glass to protect, preserve and discover information – dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva’s award-winning solutions intelligently collect data, and unify backup, disaster recovery, archival and governance capabilities onto a single, optimized data set. As the industry’s fastest growing data protection provider, Druva is trusted by over 4,000 global organizations and protects over 25 PB of data. Learn more at www.druva.com and join the conversation at www.twitter.com/druvainc.

DTCC

http://www.dtcc.com/

With more than 40 years of experience, DTCC is the premier post-trade market infrastructure for the global financial services industry. From operating facilities, data centers and offices in 16 countries, DTCC, through its subsidiaries, automates, centralizes and standardizes the processing of financial transactions, mitigating risk, increasing transparency and driving efficiency for thousands of broker/dealers, custodian banks and asset managers. Industry owned and governed, the firm simplifies the complexities of clearing, settlement, asset servicing, data management and information services across asset classes, bringing increased security and soundness to the financial markets. In 2016, DTCC’s subsidiaries processed securities transactions valued at more than U.S. $1.5 quadrillion. Its depository provides custody and asset servicing for securities issues from over 130 countries and territories valued at U.S. $49.2 trillion. DTCC’s Global Trade Repository maintains approximately 40 million open OTC positions per week and processes over one billion messages per month. To learn more, visit us at www.dtcc.com or connect with us on LinkedIn, Twitter, YouTube and Facebook.

Duo Security

https://www.duo.com

Duo Security is a cloud-based trusted access provider protecting the world’s fastest-growing companies and thousands of organizations worldwide, including Dresser-Rand Group, Etsy, NASA, Facebook, K-Swiss, The Men’s Wearhouse, Paramount Pictures, Random House, SuddenLink, Toyota, Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at www.duo.com.

Engility

http://www.engilitycorp.com/

Engility launched Cloud ASCEND™, an end-to-end solution for enterprise cloud architecture, migration and optimization. Developed for the unique requirements of highly secure government enterprises, particularly within the Department of Defense and Intelligence Community, Cloud ASCEND brings a data-driven approach to customers that helps realize the benefits of cloud computing and enterprise modernization.

  • Cloud ASCEND™ is Engility’s mission-driven solution for enterprise cloud architecture, migration and optimization for the national security community.
  • More than migration – it’s engineered digital transformation and governance.
  • The tool designs scalable, secure and resilient cloud and hybrid enterprise architectures.
  • It also migrates and operates in the cloud with automated optimization to ensure mission performance and maximum return on investment.

For more information, please visit: https://www.engilitycorp.com/cloudascend/

Entel

http://www.entel.cl/

Entel is a leader in telecommunications in Chile and has the most modern infrastructure in the industry. It offers a complete range of services including mobile and fixed communications, IT outsourcing and a contact center, delivering a different connectivity experience to individuals, companies and corporations.

The Corporate Division provides services to around 600 conglomerates with operations in Chile with specific requirements for individual solutions using specialized technology and services that are key to supporting the strategic processes of their operations.

The growth of the Corporate Segment is focused on Information Technology and, fundamentally, on the digital business.

Entel_SecureCloud corresponds to the portfolio of Cloud Computing solutions on which the digital business strategy is built.

Entel_SecureCloud is based on the principles of security and hybrid Cloud.

Entrust Datacard Corporation

http://www.entrustdatacard.com

Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit .

Equinix

https://www.equinix.com/

Equinix connects the world’s leading businesses to their customers, employees and partners inside the world’s most connected data centers in 44 markets across five continents. In the United States, Equinix operates data centers in Atlanta, Boston, Chicago, Dallas, Denver, Los Angeles, Miami, New York, Philadelphia, Seattle, Silicon Valley and Washington D.C.

Evident.io

http://evident.io/

Evident.io delivers a Security-as-a-Service platform to simplify the management of risk, compliance, and threat-detection in cloud-computing environments. We democratize the security capabilities of the billion-dollar cloud companies, and make them accessible to the cloud adopters of every size and industry. The Evident platform continuously evaluates your cloud resources to detect changes in risk, compliance, and security posture — delivering the transparency and control you need to defend against today’s pervasive security threats. Our customers range from the very early startup with no dedicated security staff, all the way up to the Fortune 500 businesses with multi-million dollar security budgets. One message has been consistent: cloud security needs a continuous solution — and that solution is Evident.

EY CertifyPoint

http://www.ey.com/certifypoint

EY CertifyPoint HQ
Antonio Vivaldistraat 150 1083 HP  Amsterdam The Netherlands certifypoint@nl.ey.comhttp://www.ey.com/certifypoint

International offices
Founded in 2002, EY CertifyPoint is an accredited independent and impartial certification institute with experienced auditors all over the world certifying some of the top international organizations. Being related to the global EY organization, EY CertifyPoint is able to provide you with a local contact person in nearly every country world-wide. For more information, please visit http://www.ey.com/certifypoint.

F5

https://www.f5.com

F5 makes apps go faster, smarter, safer for the world’s largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control. For more information, go to f5.com and follow us on twitter @F5Networks.

Fischer International

http://www.fischerinternational.com/

With a nearly 30 year heritage in shaping the enterprise security industry, Fischer continues its history of technology leadership and innovation by bringing to market a cloud-based Identity Services Platform that truly simplifies Identity Management, scales seamlessly from the SMB to the largest enterprise, and can be implemented either as a traditional software-as-a product deployment or via any outsourced delivery model. Fischer’s solutions provide organizations of all sizes with greater choice in how they derive the benefits of Identity Management, but without risk or compromise. For more information, please visit: www.fischerinternational.com

Fishtech Labs

http://fishtechlabs.com

Fishtech Labs is a technology accelerator focused on finding and creating solutions for our clients that deliver operational efficiencies and improved security posture. So you don’t have to be, we are immersed in the changing security and emerging technology landscape specific to Cloud, IoT, SDN, and Virtualization. We identify gaps and appropriate solutions for our clients’ maximum advantage. As innovation experts, our team takes a consultative approach to evaluate each client’s objectives, benefits, and risks that may be mitigated with next-generation solutions. For more information, visit us at http://fishtechlabs.com or contact us by email at info@fishtechlabs.com

Five9

http://www.five9.com/

Five9, a provider of cloud contact center software, brings the power of the cloud to thousands of customers worldwide and facilitates more than three billion customer interactions annually. Since 2001, Five9 has helped organizations of every size transition from premise-based software to the cloud. With extensive expertise, technology, and an ecosystem of partners, Five9 helps businesses take advantage of their secure, reliable, scalable cloud contact center software to create exceptional customer experiences, increase agent productivity and deliver tangible business results. The purpose-built, highly scalable and secure Five9 Virtual Contact Center cloud platform delivers a comprehensive suite of easy-to-use applications that enable the breadth of contact center-related customer service, sales and marketing functions. For more information, visit www.five9.com.

Forcepoint

https://www.Forcepoint.com

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec

FTI Technology

http://www.ftitechnology.com/

FTI Technology helps clients manage the risk and cost of e-discovery with confidence. From forensic data collection to fully managed document review services, we collaborate with our clients to deliver strategic solutions tailored to their unique legal requirements. With keen focus on the productivity and defensibility of document review, our clients rely on us to cost-effectively handle matters ranging from internal investigations to large-scale litigation with global e-discovery requirements.

Best known for its market-leading scalability and performance, Ringtail® software equips legal teams with powerful review and analysis capabilities, the ability to search across millions of documents in seconds, and the most flexible production capabilities available. And Ringtail is the only document review platform featuring both linear and visual review tools to dramatically improve the speed and consistency of review teams. Ringtail SaaS is built to deliver the promised efficiency and savings of cloud computing while meeting the unique legal requirements of e-discovery transforming the way e-discovery projects are managed.

Our electronic discovery professionals understand the technical intricacies and legal implications of data preservation and collection as well as the international protection and privacy issues that apply to electronic documents in these contexts. We can help design and implement defensible strategies to preserve, collect and analyze electronically stored information (ESI) regardless of format, language or location.

For more information visit www.FTITechnology.com/saas

Fujitsu

http://www.fujitsu.com

As the world’s third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents.

For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu’s IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu’s White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security.

As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/

Gemalto

http://www.gemalto.com

Gemalto is the global leader in digital security, with 2016 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world. Our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things. For more information, please visit: http://www.gemalto.com

GitHub

https://github.com

GitHub is how people build software. Millions of individuals and organizations around the world use GitHub to discover, share, and contribute to software—from games and experiments to popular frameworks and leading applications.

GitHub is a Web-based Git version control repository hosting service. Primarily used for computer code, GitHub offers all of the distributed version control and source code management functionality of Git, as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project.

Whether you work for a small startup, a university, or a Fortune 500 company, GitHub enables powerful, collaborative workflows. You can use GitHub.com in the cloud or GitHub Enterprise on your server, then integrate your favorite apps and services to customize how you build software.

GitHub offers both plans for private and free repositories on the same account which are commonly used to host open-source software projects.

Playing host to almost 29 million users and 80+ million repositories, GitHub.com is the largest host of source code in the world.

GohighSec

http://www.gohigh.com.cn

Datang Gohigh Security (Zhejiang) Information Technology Co., Ltd. (hereinafter referred to as ” GohighSec “) was established in 2015 with registered capital of 10 million RMB Yuan. Is engaged in trusted computing, trusted cloud computing and information security technology and product research and development, production and sales of professional firms. The main products are universal trusted x86 servers, trusted storage, trusted network equipment, trusted cloud platform software and trusted industry solutions. GohighSec with independent intellectual property rights of trusted computing server and trusted cloud computing technology as the foundation, integration of trusted computing industry chain, leading to provide end-to-end product and solution, in order to realize information security escort.

Gohigh Data Networks Technology Co., Ltd (hereinafter referred to as Gohigh) is a high-tech enterprise which has integrated data industry-related technologies, products and resources from Datang Telecom Technology & Industry Group. Gohigh has been listed on Shenzhen Stock Market in 2003 (Stock Code SZ. 000851), and it is one of the two listed domestic companies of Datang Group.

GohighSec is a subsidiary of Gohigh. With research and development base in Beijing and Yiwu city, Zhejiang province. In Beijing, Shanghai, Nanjing, Jinan, Guangzhou, Chengdu have branch offices and service agencies.

Google

http://www.google.com/apps/intl/en/business/infrastructure_security.html

Google’s cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements.

For more information, please visit http://www.google.com/apps/intl/en/business/index.html

Gronau IT

https://www.gronau-it-cloud-computing.de

Our core competences include IT security consulting, data protection, IT infrastructure architecture, quality assurance and managed services. We work in an interdisciplinary, proactive and expedient way. You can expect autonomy, rock-solid reliability and the ability to think outside the box from us.

Our mission is a reduced workload and business process optimization, so that you, as our client, cut costs, stress and attain your business objectives faster.

Any time you require rapid and competent help with an IT project, we should have a chat. We would be happy to show you how you can gain the maximum benefit from our work and increase your productivity.

HackerOne

https://www.hackerone.com/

HackerOne is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security partner. Organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google, Twitter, GitHub, Nintendo, Lufthansa, Goldman Sachs, Qualcomm, Starbucks, Dropbox, Intel, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before they can be criminally exploited. HackerOne customers have resolved over 72,000 vulnerabilities and have awarded over $30M in bounty rewards. HackerOne is headquartered in San Francisco with offices in London, New York, and the Netherlands.

HERE Technologies

https://here.com

HERE Technologies enables people, enterprises and cities around the world to harness the power of location and create innovative solutions that make our lives safer and more efficient. We transform information from devices, vehicles, infrastructure and other sources into real-time location services that play a key role in how we move, live and interact with one another.

Herjavec Group

http://www.herjavecgroup.com/

Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity solutions and services to enterprise organizations. Herjavec Group delivers SOC 2 Type 2 certified managed security services globally supported by a state-of-the-art, PCI compliant, Security Operations Centre (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with leadership positions across a wide range of functions including consulting, professional services & incident response. Herjavec Group has offices globally including head offices in Toronto (Canada), New York City (USA), Reading (United Kingdom) and Sydney (Australia).

Herjavec Group’s Managed Security Services practice defends enterprise level organizations globally from increasingly sophisticated, targeted cybercrime threats. Core managed services include: Security Information and Event Management, Intrusion Prevention and Detection, Application Security, Next Generation Firewall Management, Endpoint Protection, Data Loss Prevention, Web Proxy and URL Filtering and Vulnerability Management. Herjavec Group’s managed security service practice relies on two custom built technology pillars:

Herjavec Group Threat Framework – The Threat Framework allows dynamic and evolving threat modelling to be applied within any organizational environment. Herjavec Group focuses on meaningful security use cases to proactively identify attacks by applying the Framework to onboarded technologies & threat intelligence products in the customer’s environment. The Threat Framework covers key attack categories including Authentication, Targeted Attacks, Malware, DDOS and Traffic Anomalies.

Herjavec Group’s Analytics Platform – Herjavec Group’s Analytics Platform filters threat intelligence and customer data into actionable, relevant alerts. Alerts enriched using Herjavec Group’s Threat Framework are processed through the Platform, which automatically performs additional enriching functions including IP reputation look up, geo mapping, alert trending & deduplication, prior to preparing a readable output for Herjavec Group’s security analysts to review and action accordingly.

For more additional information or to engage a security specialist please visit www.herjavecgroup.com

Hewlett Packard Enterprise

https://www.hpe.com/

HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible. HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits. With 90+ learning centers worldwide, numerous partner facilities and customer’s onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements. Visit HP: www.hp.com/learn Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video

HEXCloud

http://www.hexcloud.cn/

HEXCloud is a professional catering chain system consulting service and related industry software product research and development company. With the long-term accumulation of rich industry management experience and the spirit of innovation, we will create solutions with international management concepts and local user management practices. Company always adhere to the “innovative ideas, innovative architecture” development concept and “with partners and customers win-win” service tenet, and partners for clients to provide professional HEX system implementation and customer service.

HID Global

https://www.hidglobal.com/

HID Global® is the leading provider for innovative products, solutions and services that help organizations create, manage and use secure identities. Trusted by millions of customers around the world, HID Global provides comprehensive solutions to secure facilities, assets, networks and cloud resources.

HID Global will be the market leader for trusted identity solutions by providing seamless access and IP at the door solutions complemented by our Cloud Services. HID Global is dedicated to ensuring that when customers purchase Genuine HID products and solutions, they are purchasing absolute confidence in performance, value and service. HID Global is an ASSA ABLOY Group brand.

HKBN Enterprise Solutions Limited

http://hkbnes.net

Who We Are

HKBN is Hong Kong’s largest provider of residential high-speed fibre broadband service (symmetrical 100Mbps to 1000Mbps) by number of subscriptions, and a rapidly growing enterprise solutions provider. We offer a diverse portfolio of premier telecom solutions to personal and enterprise markets, including broadband, mobile, entertainment, voice communications, cloud solutions, data facilities and system integration.

We built and own one of the most extensive fibre optic networks in Hong Kong, which covers over 2.2 million residential homes passed, representing approximately 81% of Hong Kong’s total residential units, and more than 2,200 commercial buildings. In 2004, we successfully built the largest Metro Ethernet network in the world. In 2005, we became the first Internet Service Provider in Hong Kong to offer 1,000Mbps residential Fibre-to-the-Home service. In 2013, we completed our acquisition of Y5ZONE Limited and further extended our Wi-Fi business development. In 2016, we further strengthened our Enterprise Solutions business with the acquisition of New World Telephone Holdings Limited’s telecommunications and online marketing solutions business. For more information, please visit http://hkbnes.net.

Huawei

http://www.huawei.com/en/

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world’s population. Huawei’s vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.

Hyland

https://www.hyland.com/

For more than 20 years, Hyland has been dedicated to meeting organizations’ needs for document and process management with OnBase, an enterprise content management (ECM) solution. As OnBase has evolved through consistent product innovation, it remains focused on automating business processes that depend on documents, content and people to operate more effectively. OnBase is the pioneer of ECM in the cloud. Since 2000, the OnBase Cloud has been empowering more than 600 organizations around the world to better manage the content that surrounds their processes. The OnBase Cloud connects people to the content, data and processes they need to make more informed decisions – without additional infrastructure needs. Employee productivity increases as they spend less time searching for paper and dedicate more time to providing quality service to customers. For more information about OnBase cloud-based and hosted solutions, please visit https://www.onbase.com/

IBM

http://www.ibm.com/security

IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM’s capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: – understand threats and vulnerabilities in terms of business impact – respond to security events with security controls that optimize business results – prioritize and balance your security investments. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today’s business climate. IBM’s cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.

ID Quantique (IDQ)

http://www.idquantique.com/

ID Quantique (IDQ) is the world leader in quantum-safe crypto solutions designed to protect data for the long-term future. The company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution solutions and services to the financial industry, enterprises and government organisations globally. IDQ also commercializes a quantum random number generator, which is the reference in the gaming and lottery industries. Additionally, IDQ is a leading provider of optical instrumentation products; most notably photon counters and related electronics. The company’s innovative photonic solutions are used in both commercial and research applications.

IdRamp

https://www.idramp.com

IdRamp is a decentralized identity fabric. We simplify integration across multiple identity providers, cloud, mobile, and legacy applications.

InConcert

https://www.inconcertcc.com

We develop technology that incorporates profound contact center business and operation knowledge gathered during more than 15 years of successful implementations. We also provide consulting and professional services adhering to the best practices in the industry.

This allows us to deliver highly customized solutions, hosted either in your own datacenter or cloud-based, which are specially designed to reduce costs, improve service processes and provide a superior experience to your customers.

Informatica

https://www.informatica.com/

Informatica is a leading independent software provider focused on delivering transformative innovation for the future of all things data. Organizations around the world rely on Informatica to realize their information potential and drive top business imperatives. The Informatica Platform is an intelligent data platform, which includes data integration, data quality, master data management, data archiving and data security capabilities, to empower customers to transform raw, possibly unsafe, data into great data for more accurate insights and more effective decisions. More than 5,800 enterprises depend on Informatica to fully leverage their information assets residing on-premise, in the Cloud and on the internet, including social networks. For more information, call +1 650-385-5000 (1-800-653-3871 in the U.S.), or connect with Informatica at LinkedIn, @Informatica on Twitter and Facebook.

Infosys

http://www.infosys.com/

Infosys is a global leader in consulting, technology and outsourcing solutions with US$8.25 billion in annual revenues and 160,000+ employees. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. Infosys has a dedicated Enterprise Security & Risk Management (ESRM) unit with strong credentials in Security consulting and implementation services using majority of the industry’s leading products. Infosys’ security services spans across all aspects of Information Security & Compliance for enterprises including Governance, Risk Compliance (SOX/BASEL2/ HIPAA, PCI etc.), Identity & Access Management, Infrastructure security (Endpoint security, Network, Ethical hacking, Penetration testing etc.) and Application and Data security. Infosys has 1000+ consultants in Enterprise Security space. Infosys Cloud Security service offerings consists of a broad range of services tailored to suit the specific client context. It enable clients adopt Cloud and leverage the benefits of Cloud in a secure manner. Our Cloud Security services caters to private, public or hybrid cloud platforms and provides defense in depth security posture by applying relevant security controls across perimeter, internal network, endpoint devices, applications and data layers. Infosys also offers Managed Security Services through a highly flexible and customizable Security Operations Center (SOC) for managing and monitoring Cloud security. For further details you can contact savitrim@infosys.com

Inspur

http://en.inspur.com/

As a leading total solution and service provider of cloud computing, Inspur is capable of providing total solution at IaaS, PaaS and SaaS levels. With high-end servers, mass storages, and cloud operating system and information security technology, Inspur offers advanced cloud computing infrastructure platform for its customers. Based on Inspur’s information softwares for government, enterprise and industry, as well as terminal products and solutions, this platform provides comprehensive support to the construction of smart government, and enterprise cloud and vertical industry cloud.

Intel Security

http://www.intel.com/content/www/us/en/cloud-for-all/cloud-for-all.html

Intel Security is comprised of a portfolio of client & data center cloud security products that use API Management at the cloud edge and trusted execution technology within the datacenter to provide a secure client to cloud connection. Learn more about Intel’s cloud security products at www.intel.com/content/www/us/en/cloud-for-all/cloud-for-all.html.

Intility

https://www.intility.no/en/

Intility is a complete, cloud-based platform for Workplace-as-a-Service and digitization. The Intility platform is an enabler for companies to utilize information technology more efficiently, increasing their productivity and reaching their business goals.

The Intility platform is continually upgraded with new functionality and supports an increasing number of integrated cloud services such as Microsoft Azure, Office 365, Amazon Web Services and Salesforce.

Intility is currently utilized by more than 500 companies.

IronOrbit

https://www.ironorbit.com

IronOrbit is a leading cloud provider headquartered in Southern California. We currently support a rapidly-growing user base of SMBs, enterprises, and government organizations in over 50 industries and 20+ nations.

We specialize in providing custom-built, fully-integrated cloud solutions that make moving to the cloud easier and more beneficial to your business.

Our flagship product is cloud.ONE, a fully-integrated, all-inclusive cloud infrastructure, with compute, storage, security, management, and support, for just a flat monthly fee.

We also offer cloud-based desktops, servers, and applications, plus a wide range of other fully-customizable cloud solutions and services.

To learn more, visit www.ironorbit.com.

Ivanti

https://www.ivanti.com/

Ivanti is leading the unification of Cloud Service Management (CSM). We empower IT, HR, Facilities, Customer Service and other enterprise functions to simplify and automate their business processes to improve service quality, while managing and securing endpoints to proactively detect and protect against threats to business continuity. Ivanti delivers the world’s most powerful fusion of truly flexible, scalable, secure CSM and UEM solutions.

Since 2011, HEAT Software USA, Inc. (Ivanti), now Ivanti, has provided a Cloud Service Management platform to small and medium sized businesses around the world. With Ivanti, customers can deploy solutions around their internal processes that align with the Information Technology Infrastructure Library (ITIL) framework to streamline and automate their internal and external customer operations.

Kaspersky Lab

http://www.kaspersky.com

Kaspersky Lab is a global cybersecurity company, which has been operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

KPMG

http://www.kpmg.com

KPMG LLP is an audit, tax and advisory services firm that specializes in delivering business, technical, regulatory/tax, assurance, security, and management guidance to clients considering the cloud.

Lacework

https://www.lacework.com

Lacework is the industry’s first solution to bring automation, speed, and scale to cloud security enabling enterprises to safely innovate fast in the cloud. Unlike conventional security tools built for static datacenters, the Lacework solution is designed to self-adapt to the cloud ever-changing configuration and workloads.

The Lacework Cloud Security Platform monitors all components deployed in the cloud: applications, processes, workloads, VMs, containers, machines, users, accounts and more. By ingesting and processing far more data than other solutions, Lacework leaves no space for hackers to hide. Just like DevOps automates code deployment, Lacework automates cloud security, empowering IT to continuously keep cloud environments secure and compliant.

Leadsec

http://www.leadsec.com.cn

Since LeadSec was engaged in the information security industry in 1999, it has grown as a leading enterprise engaged in China’s information security industry by taking “building China’s new Great Wall of information security” as our own responsibility under the wholehearted support from the LeadSec family and kind help from mass users. We own numerous core techniques in the information security area and have successively applied for over 50 patents. We own 10 categories of over 370 models of full series firewalls, VPN, UTM, IDS, IPS, anti-virus gateways, security isolation gatekeepers, security management systems, etc in total and are the enterprise with the fullest information security product lines in China. As a core technical supporting unit responsible for the national information security notification, we have been involved in preparation of Guidance to the implementation of E-government information security classified protection, the Guide on implementation of classified security protection of information systems, the Risk assessment guidelines for information security, etc, and have undertaken multiple major pilot test projects related with national security. As a representative of the nation’s information security enterprises, we have always been taking the head in China’s information security industry.

Legendsec

http://www.360.net/

LEGENDSEC is the sub-company of 360 Enterprise Security Group, 360 Enterprise Security Group is a network security company that focuses on providing enterprise-level network security technologies, products and services to the government, military, enterprises, educational and financial institutions and organizations. The Group now owns more than 4,000 network security technology, product and service personnel. Up to now, the Group has provided network security products and services to 90% of ministries and commissions, 72% of central enterprises, 100% large banks, as well as millions of small medium enterprises.

Facing the new era, 360 Enterprise Security Group takes “providing a securer network to create a better world” as the mission and data as the innovation driving force, aiming to build network security subversive and asymmetric capability and striving to become the global first network security company.

LockPath

https://www.lockpath.com/

LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC) and information security (InfoSec) software. The company’s flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. LockPath serves a client base of global organizations ranging from small and midsize companies to Fortune 10 enterprises in more than 15 industries. The company is headquartered in Overland Park, Kansas. For more information on LockPath and the Keylight platform, visit lockpath.com. Follow LockPath on LinkedIn and on Twitter at @LockPath and @KeylightGRC for the latest in industry, company and product news.

LoginRadius

https://www.loginradius.com

LoginRadius is a leading provider of cloud-based Customer Identity and Access Management solutions for mid-to-large sized companies. LoginRadius’ solution serves over 3,000 businesses with a monthly reach of 650 million users worldwide. The company has been named as an industry leader in the cIAM space by Gartner, Kuppingercole, and Computer Weekly.

LoginRadius’ platform helps companies deliver a connected customer experience, creates an integrated marketing ecosystem, and centralized customer data to define a unified profile and better manage their customer identities. Some of the key products include customer registration services, profile management, single sign on (SSO), integration with third party marketing applications, user management, customer insights, and more.

The company is headquartered in Vancouver, Canada, with additional offices in the USA, UK, Australia, and India.

Lundin & Co.

https://lundin.net/

Lundin & Co. provides consulting and assurance services to help organizations proactively and effectively manage cybersecurity, cloud, crypto and compliance.

McAfee

http://www.mcafee.com

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies’ products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection, and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

Merrill Corporation

https://www.merrillcorp.com/

Merrill Corporation provides innovative, technology-enabled platforms for content sharing, regulated communications and compliance services, combined with deep subject expertise. We help clients successfully navigate the secure sharing of highly sensitive content, perfect and distribute critical financial and regulatory disclosures, and create customized communications across stakeholders. We are here when your need to manage complex content intersects with the need to collaborate securely around the globe.

Merrill DataSite, our premium virtual data room technology, allows you to close deals quickly and securely. Streamline collaboration, accelerate due diligence, create critical document repositories and manage intellectual property and assets with this award-winning VDR. With nearly two billion pages processed and more than a billion pages secured, only Merrill offers exceptional deal support around the clock and around the world.

MetricStream

http://www.metricstream.com/

MetricStream is a market leader in enterprise-wide Governance, Risk, Compliance (GRC) and Quality Management Solutions. MetricStream solutions are used by leading global corporations in diverse industries such as Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-tech and Manufacturing to manage their risk management programs, quality management processes, regulatory and industry-mandated compliance and other corporate governance initiatives. MetricStream’s customers include Procter & Gamble, UBS, Societe Generale, Pfizer, Philips, Cummins, Kellogg’s, Mondelez International, SanDisk, and NetApp. MetricStream also owns and operates www.ComplianceOnline.com portal – the largest GRC advisory network and one of the largest GRC communities. MetricStream is headquartered in Palo Alto, California, USA (www.metricstream.com).

Microsoft

http://www.microsoft.com/cloud

Microsoft provides the most comprehensive approach to cloud computing, so that you can harness the full power of the cloud on your terms. Whether in your datacenter, with a service provider, or from a Microsoft’ datacenter and whether in a private cloud using HyperV™, a public cloud with Windows Azure™, or software as a service environment with Office365 Microsoft provides the flexibility and control to consume IT as a service in a way that best meets your unique business needs. Visit www.microsoft.com/cloud to find out more.

NetApp

http://www.netapp.com/

NetApp creates innovative storage and data management solutions that accelerate business breakthroughs and deliver outstanding cost efficiency. Our dedication to principles of simplicity, innovation, and customer success has made us one of the fastest-growing storage and data management providers today. Customers around the world choose us for our “go beyond” approach and broad portfolio of solutions for server-to-storage virtualization, business applications, data protection, and more. Our solutions provide nonstop availability of critical business data and simplify business processes so companies can deploy new capabilities with confidence and get to revenue faster than ever before. Discover our passion for helping companies around the world go further, faster at www.netapp.com.

Netskope

http://www.netskope.com/

Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.

Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.

NetWitness

http://www.netwitness.com/

NetWitness helps organizations in over 160 countries dramatically improve their ability to defend against advanced threats. NetWitness NextGen is the only network monitoring product on the market today that allows users to: analyze and model hundreds of terabytes of live network traffic in real-time; generate automated, comprehensive analyses that can be easily understood by both cyber analysts and non-technical personnel, and integrate third party threat feeds and create actionable network intelligence. Based upon a dedicated and extensible full packet capture and session analysis infrastructure that can be used within enterprise cloud and virtual environments, NextGen performs both rules-based and interactive session analysis across the entire network protocol stack, up to the application layer. NetWitness NextGen is designed for organizations to address concurrent problems of insider threat management, data leakage protection, network forensics and incident response, compliance verification, network e-discovery, designer malware and zero-day threat detection. NetWitness customers include Defense, National Law Enforcement and Intelligence Agencies, Top US and European Banks, Critical Infrastructure, and Global 1000 organizations. NetWitness has offices in the U.S. and the U.K., and partners throughout North and South America Europe, the Middle East, and Asia. Download a freeware version of NetWitness and see what you’ve been missing on your network: http://download.netwitness.com.

New Relic

http://newrelic.com/

New Relic is a software analytics company that makes sense of billions of metrics about millions of applications in real time. New Relic’s comprehensive SaaS-based solution provides one powerful interface for web and native mobile applications and consolidates the performance monitoring data for any chosen technology in an environment. There are thousands of active customer accounts using New Relic’s cloud solution every day to optimize more than 200 billion metrics for 3 million applications. New Relic is pioneering a new category called Software Analytics.

Nixu

http://www.nixu.com/

Nixu Corporation is a cybersecurity company. We work to improve our clients’ cybersecurity in solution areas of Corporate IT, Digital Business and Industrial Internet. Our clients trust Nixu in projects where developing, implementing or assessing of information security is a must. We ensure the confidentiality of our clients’ data, business continuity and ease-of-access to digital services through planning and mitigation of cybersecurity risks.

CONTACT INFORMATION:
Phone number: +358 9 478 1011
E-mail: nixu.sales@nixu.com

Blog: http://www.nixu.com/blog
Twitter: @nixutigerteam

NSFOCUS

http://www.nsfocus.com/

NSFOCUS is a leading provider of vulnerability assessment, Web Application Firewall (WAF), Network Intrusion Prevention System (NIPS), Anti-DoS, content security gateway, and etc. Powered by its 10+ years of security vulnerability research, NSFOCUS has been the major contributor of security vulnerability research at the industry by freely sharing and resolving over tens vulnerabilities from critical applications.In conjunction with security hardware appliances and software, NSFOCUS has been delivering security services through Security As A Service (SaaS), including web reputation service, vulnerability assessment, Anti-DDoS and etc. Its customers come from government, finance, telco operators, ISP, power providers, etc.

NTT I³

http://www.ntti3.com/

NTT Innovation Institute Inc. (NTT I³, pronounced NTT I Cube) is a new R&D center of NTT Group, the global leader of information and communication technology (ICT) services. NTT I³ aims to accelerate the global development of the NTT Group, through open innovation, by leveraging its Silicon Valley location and tapping into the rich talent pool of the valley. Our best practices in North America will be formulated into modular intellectual properties and rolled out globally, to NTT’s Global marketplace.

Currently, NTT I³ focuses on “Global Cloud Services” as the cornerstone of NTT’s business operations. NTT I³ is developing modularized intellectual properties based on a deep understanding and analysis of the latest market needs in the areas of security and cloud computing. These intellectual properties are designed to best satisfy various, ever-evolving market needs in a globally scalable and cost competitive manner.

Carrying on the world renown NTT R&D heritage, NTT I³ strives to set a new global standard of agility, quality, and value creation in pursuit of open service innovation.

NTT Security

https://www.nttsecurity.com

NTT Security is the specialized security company of NTT Group. With embedded security we enable Group companies (Dimension Data, NTT Communications and NTT Data) to deliver resilient business solutions for clients’ digital transformation needs. NTT Security has 10 SOCs, seven R&D centers, over 1,500 security experts and handles hundreds of thousands of security incidents annually across six continents.

NTT Security ensures that resources are used effectively by delivering the right mix of consulting and managed services for NTT Group companies – making best use of local resources and leveraging our global capabilities. NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest ICT companies in the world. Visit nttsecurity.com to learn more.

Okta

http://www.okta.com/

Okta is an enterprise grade identity management service that is built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta enterprises can simply and securely manage access to cloud, mobile and on premises applications across employees, partners and customers.

Accessible via an intuitive, consumer Web interface or a broad set of RESTful web services, Okta provides directory services, single sign-on, strong authentication, provisioning, workflow, and analytics as a complete, integrated solution. Okta offers identity management from the cloud on a secure, reliable, SOC2 Type II audited platform that covers all of the applications, directories, identity systems, devices, organizations and people that are a part of today’s IT reality. Whether it is in the cloud, on a mobile device, or behind your firewall Okta’s got it covered.

Enterprises everywhere including Activision, Allergan, BMC Software, Comcast, Colorox, Groupon, Informatica, LinkedIn, Purolator, Shortel and SAP are using Okta to increase security, improve user productivity, reduce IT costs, and ensure compliance.

The Okta team has built and deployed many of the world’s leading on-demand and enterprise software solutions from companies including Salesforce.com, PeopleSoft, Microsoft, BMC, Arcsight, Sun, and HP. Okta is backed by premiere venture investors Andreessen Horowitz, Greylock Partners, and Khosla Ventures.

Onapsis

https://www.onapsis.com/

Onapsis is the pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.

Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, Deloitte, E&Y, IBM, KPMG and PwC, as well as cloud providers including Amazon Web Services and Virtustream.

OneTrust

https://onetrust.com

OneTrust’s privacy management software is used by more than 2,000 organisations to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and ePrivacy (Cookie Law).

The multi-lingual software is deployed in an EU cloud or on-premise, and is based on a combination of intelligent scanning, regulator guidance-based questionnaires, and automated workflows used together to automatically generate the record keeping required for an organization to demonstrate compliance to regulators and auditors.

OneTrust helps organizations implement GDPR requirements, including: Data Protection by Design (PbD), Data Protection Impact Assessments (PIA / DPIA), Vendor Risk Management, Incident and Breach Management, Records of Processing (Data Mapping), Universal Consent and Preference Management, ePrivacy Cookie Consent, Data Subject Access, Portability, and Right to Be Forgotten.

Optiv

https://www.optiv.com/solutions/cloud-security

We are at the beginning of a perfect storm. Three main factors are converging. The world wants to be more connected. There is a massive explosion and churn of infrastructure, application and data. And, threat volume and sophistication are continuing to grow exponentially each and every day.

The world needs us today more than ever. We are an enabler, delivering a path forward rather than focusing purely on defense. We help organizations manage risk, compliance and security. But, we also help them to balance ideal with realities and maturity. We are unique. We deliver security programs that combine products and services, people, processes, strategies and tactics.

Our premier relationships and know-how allow us to bring together Optiv offerings with those from the vendor community. We are focused on assembling the right solution for each client’s specific needs and applying it to their business priorities.

We are a trusted partner. We understand it all. We do it all and can help clients execute. We focus on our clients’ success without an agenda.

Oracle Cloud

https://cloud.oracle.com/home

Oracle Cloud is not only the lowest cost and most automated, but it’s the industry’s broadest and most integrated cloud, with deployment options ranging from the public cloud to your data center. Oracle Cloud offers best-in-class services across Software as a Service (SaaS), Data as a Service (DaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Oracle Cloud helps organizations drive innovation and business transformation by increasing agility and reducing IT complexity.

Oradian

https://oradian.com/

Oradian is a financial inclusion company serving financial institutions in remote, hard-to-reach communities. Using insights from our community of customers, we build a cloud-based core banking system that financial institutions plug into to access best practice and efficiency.

The Oradian vision is a world where all financial institutions have the tools that they need to serve their communities and provide access to financial services. Our mission is to boost financial inclusion by enabling financial institutions to grow and serve more clients. Oradian’s award winning technology has been specifically developed for financial inclusion – and each feature and module we develop is geared towards building efficiencies, enabling informed business decision-making, and growing to serve more clients.

Our global community of financial institutions is made up of over 65 visionary customers –rural banks, MFBs, MFIs, Saccos and Cooperative Societies–, in-market financial inclusion specialists and third-party fintech providers. Our in-market teams work closely with financial institutions to implement global best practice. Oradian’s cloud-based toolset has been developed to integrate with third-party solutions, which continuously enhances our service functionality.

OutSystems

https://www.outsystems.com

Thousands of customers worldwide trust OutSystems, the number one low-code platform for rapid application development. Engineers with an obsessive attention to detail crafted every aspect of the OutSystems platform to help organizations build enterprise-grade apps and transform their business faster. With OutSystems, you visually develop your entire application, easily integrate with existing systems, and add your own custom code when you need it. Visit us at www.outsystems.com, or follow us on Twitter @OutSystems or LinkedIn at www.linkedin.com/company/outsystems.

Palerra

https://www.palerra.com/

Palerra designed LORIC to provide continuous compliance, threat visibility, and incident response for an organization’s entire cloud footprint (SaaS, PaaS, and IaaS) in a single platform. It automates all steps of the security lifecycle to enable organizations to keep pace with the rapidly increasing volume of cloud usage as well as the velocity of change in the threat landscape. LORIC does so without any hardware or software, and does not impact the native user experience for cloud usage. Palerra is a privately held company funded by Norwest Venture Partners and Wing Venture Partners. It is headquartered in Santa Clara, CA. Learn more at https://www.palerra.com/ and continue the conversation on Twitter at @palerrainc

Palo Alto Networks

http://www.paloaltonetworks.com/

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.

PeopleDoc

http://www.people-doc.com

PeopleDoc is on a mission to make the difficult job of HR easier. The PeopleDoc HR Service Delivery platform helps HR teams more easily answer employee requests on demand, automate employee processes, and manage compliance across multiple locations. PeopleDoc cloud solutions include case management, process automation and employee file management.

100% software as a service, PeopleDoc solutions integrate with existing HR systems, can be implemented in 8-12 weeks, and are designed for agile ongoing use by HR teams serving diverse workforces. PeopleDoc serves more than 500 clients with employees in 165 countries in nine languages with a 100% customer retention rate. More information is available at www.people-doc.com.

Perspecsys

http://www.perspecsys.com/

The Perspecsys Cloud Data Protection Gateway allows organizations to protect their sensitive business data when using popular cloud applications such as Oracle CRM On Demand and salesforce.com. Any information that leaves an enterprise’s environment and enters the cloud can be tokenized or encrypted (using strong FIPS 140-2 encryption modules), ensuring that data remains undecipherable when it is being processed or stored in the cloud. Companies use Perspecsys to ensure compliance with Data Residency regulations or to satisfy requirements associated with sector specific regulations such as PCI DSS, HIPAA, SARBOX, and GLBA. A key benefit of the solution is its ability to preserve end-user functionality, such as the ability to Search or Sort, on data-fields that have been tokenized or encrypted (even when using FIPS 140-2 cloud encryption).

Perspecsys’ solution integrates easily into an enterprise SaaS implementation. Installed inside of an organization or at its IaaS provider (such as Fujitsu or Amazon AWS), Perspecsys’ software resides transparently between the application and its users, intercepting critical data before it is passed to the application in the cloud, and replacing it with a random token or encrypted value that is meaningless when viewed outside the Perspecsys Cloud Data Protection Gateway.

Find out today how Perspecsys can make your organization more secure. Click here to schedule a demo.

PrecisionLender

https://precisionlender.com/

PrecisionLender is a pricing management platform used by thousands of relationship managers at banks ranging in size from less than $1 billion to greater than $1 trillion. Andi®, PrecisionLender’s virtual pricing analyst, uses artificial intelligence to glean insights from the thousands of deals priced daily in the platform. Delivering the right information at the right time helps bankers create a better experience for their customers. For more information, visit www.PrecisionLender.com.

PRO Unlimited

http://www.prounlimited.com

PRO Unlimited, through its purely vendor-neutral Managed Services Program (MSP) and Vendor Management Software (VMS) solutions, helps organizations address the costs, risks, and quality issues associated with managing a contingent workforce. A pioneer and innovator in the VMS and MSP space, PRO offers solutions for e-procurement and management of contingent labor, 1099/co-employment risk management, and third-party payroll for client-sourced contract talent.

For further information, visit PRO at http://www.prounlimited.com, and follow us on Twitter @ProUnlimited.

Qihoo 360

http://www.360.cn

Qihoo 360 Technology Co. Ltd. (Qihoo 360) is a leading Internet company in China as measured by its active user base.  Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users.  With friendly and interactive user experience and leading cloud-based Internet security technologies, Qihoo 360’s products are trusted by massive and loyal users who enjoy Qihoo 360’s real-time protection for their daily online activities.   Recognizing security as a fundamental need of all Internet and mobile users, Qihoo 360 has built the large user base by offering comprehensive, effective and user-friendly Internet and mobile security products and services to protect users’ computers and mobile devices against malware and malicious websites.  Qihoo 360’s products and services are supported by the cloud-based security technology, which Qihoo 360 believes is one of the most advanced and robust technologies in the Internet security industry. Qihoo 360 also provides users with two very important secure access points to Internet: web browsers and app store.  Qihoo 360 currently monetizes the massive user base primarily through offering online advertising and Internet value-added services.    Founded in September 2005, Qihoo 360 is now a big family with more than 4,500 employees. On March 30th 2011, Qihoo 360 was listed on NYSE under the ticker “QIHU” as the first Chinese security company. Today Qihoo 360’s market cap reaches approximately $10 billion. All these incredible achievements have been reached by Qihoo 360’s hard-working and creative team only within 8 years.

Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users in China.

QSCert

https://www.qscert.com

QSCert, spol. s r.o.
E. P. Voljanského 1, 960 01 Zvolen
https://maps.google.com/?q=E.+P.+Voljansk%C3%A9ho+1,+960+01+Zvolen&entry=gmail&source=g
Tel: 045 – 54 00 717
Tel/Fax: 045 – 54 00 718
Phone number: 0905 – 977 200
E-mail: [email protected]

QSCert® is an international Certification Body based in Prague (Czech Republic). Its core business is certification of management systems according to several international standards. QSCert® has established the net of branch offices all over the world. QSCert® is accredited by the Czech Accreditation Institute. QSCert® differs from other certification bodies mainly by pragmatic approach to an audit without emphasis on bureaucracy. A quality management system which QSCert® requires from its clients is established also in QSCert®. QSCert® audit gives added value to the client not only by examining the compliance with the standard requirements but also by suggesting opportunities for improvement of the management system. QSCert auditors are people who worked as quality managers or consultants in the past – they are able to understand certification audits from the auditee point of view. It enables them to conduct audits in correct and pragmatic way.

Qualys

http://www.qualys.com/

Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions ­ delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.

QuantumCTek

http://www.quantum-info.com/en.php/

QuantumCTek Co., Ltd. is the first and biggest provider of multi-protocol network security products and services based on quantum technology, in China. The company produces state-of-the-art quantum communication systems and series of innovative opt-electronic units with the commercial applications for the financial industry, government organizations and other enterprises, as well as the research applications for the scientific societies.

Initially founded by the Chinese leading quantum physics research group from Hefei National Laboratory for Physical Science at Micro-scale (HFNL), University of Science and Technology of China (USTC), the company is continually transferring cutting-edge scientific and technical achievements into mature commercial products, making great efforts to promote wide-range applications of quantum technology and forming the Chinese quantum industry.

Quintessence Labs

https://www.quintessencelabs.com

QuintessenceLabs is a global leader in quantum security, with offices located in Australia and the United States and a growing UK presence. At the forefront of the commercial development of quantum security solutions, we deliver unique high-value cybersecurity and information assurance capabilities.

These include:     

  • the world’s fastest true random number generator
  • advanced, interoperable, key and policy manager
  • integrated encryption solutions for on premise or in-cloud implementations

Our Security Products integrate seamlessly into existing systems, while building a strong foundation for future data security systems. By centralizing the management and control of data-security policy and harnessing quantum science properties to strengthen data security solutions, QuintessenceLabs solutions uniquely maximize security, increase ROI from existing assets and reduce data-security complexities.

Quzara

https://www.quzara.com

Quzara.com is a high-growth cyber security start-up geographically situated within the technical corridor of the DC metropolitan area in Reston, Virginia. Quzara’s focus areas are on Cloud Security, Enterprise Security and FedRAMP Certification. Additional services range from performing technical assessments for application migration to cloud managed services for vulnerability assessments.

Rackspace

http://www.rackspace.com/

The Rackspace Cloud provides on-demand and scalable website, application and storage hosting backed by Fanatical Support®. Through an integrated suite of cloud solutions – Cloud Sites™, Cloud Files™ and Cloud Servers™ – The Rackspace Cloud enables astute developers and IT managers to trade the hassles, upfront investments and high costs for a hosting environment that scales easily when traffic fluctuates.

For more information about The Rackspace Cloud, visit www.rackspacecloud.com or call 1-877-934-0409.

Rapid7

http://www.rapid7.com/

Rapid7 (NASDAQ:RPD) is trusted by IT and security professionals around the world to manage risk, simplify modern IT complexity, and drive innovation. Rapid7 analytics transform today’s vast amounts of security and IT data into the answers needed to securely develop and operate sophisticated IT networks and applications. Rapid7 research, technology, and services drive vulnerability management, penetration testing, application security, incident detection and response, and log management for more than 6,300 organizations across more than 120 countries, including 39% of the Fortune 1000. To learn more about Rapid7 or join our threat research, visit www.rapid7.com.

Raytheon

http://www.raytheon.com/

Raytheon Company, with 2011 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. With a history of innovation spanning 90 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services. With headquarters in Waltham, Mass., Raytheon employs 71,000 people worldwide. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter at @raytheon.

Ribose

http://www.ribose.com

Ribose helps individuals and organizations worldwide work together effectively and securely through its social collaboration platform. By focusing on the “whole of collaboration”, Ribose has taken online social collaboration to a new level. Whether planning simple events or running complex projects, you will find that Ribose makes it easy, effective and genuinely fun. Ribose is free to use: http://www.ribose.com.

Rising

http://www.rising.com.cn

Founded in 1991, Beijing Rising Information Technology Co., Ltd. has been focusing on information security and adhering to independent research and development. Rising owns complete independent IPs and helps governments, enterprises and individuals to effectively tackle information security threats. Main business of the Company includes enterprise services and personal services.

Rising Company is a high-tech enterprise with accreditations and qualifications, and has assumed the construction of the first virtualization anti-virus national lab in China and undertaken the information security construction work for China’s first virtualization cloud storage project, and has strong technical strength. In addition, by virtue of the on-going product innovation and project experience accumulation for more than a decade, Rising has won good reputation and word of mouth on domestic information security market.

RiskVision

https://www.riskvisioninc.com/

RiskVision, formerly Agiliance, founded in late 2005, is the leading independent provider of Security and Operational Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. RiskVision ™ enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, RiskVision customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by RiskVision’s configurable platform and applications, with a broad library of technology integrations, and GRC content. RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. RiskVision’s Cloud Risk Management Service implements the CSA GRC Stack and Threat Matrix in RiskVision to provide an assessment and risk management toolkit for enterprises, cloud providers, security solution providers and IT auditors. At the heart of this service is RiskVision’s Common Control Framework (CCF) which maps the CSA Cloud Controls Matrix to NIST, ISO, and COBIT frameworks along with PCI and HiTech/HIPAA regulations, to output SAS 70 II and SSAE 16 reports.Customers have a broad set of product delivery options and a comprehensive set of managed and implementation services to address all phases of deployment. Customers can also access the RiskVision Cloud on Demand to provide beta product feedback, test new patches and upgrades, run proof of concepts (POCs), and provide community contributions such as workflows and reports, as well as attend half-yearly RiskVision advisory councils.

Saba

http://www.saba.com/

Saba delivers a cloud-based intelligent talent management solution used by leading organizations worldwide to hire, develop, engage and inspire their people. With machine learning at its core, Saba Cloud offers proactive, personalized recommendations on candidates, connections and content to help employees and businesses lead and succeed. It is purpose-built on a highly scalable platform that exceeds industry security and reliability standards. Saba has more than 31 million users and 2,200 customers across 195 countries and 37 languages. Learn more about intelligent talent management at www.saba.com.

Safe-T

http://www.safe-t.com

Safe-T® (www.safe-t.com), a wholly owned subsidiary of Safe-T Group Ltd. (TASE: SAFE), is a leading provider of software-defined access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data. Safe-T solves the data access challenge by masking data at the perimeter, keeping information assets safe and limiting access only to authorized and intended entities in hybrid cloud environments.

Safe-T enhances operational productivity, efficiency, security, and compliance by protecting organizations from data exfiltration, leakage, malware, ransomware, and fraud. With Safe-T’s patented, multi-layer software-defined access, financial services, healthcare, utility companies and governments are able to secure their data, services, and networks from internal and external data threats.

Safe-T operates in North America, APAC, Africa, Europe, and Israel.

Salesforce

http://www.salesforce.com/

Salesforce is the world’s #1 customer relationship management (CRM) platform. Our cloud-based applications for sales, service, marketing, and more don’t require IT experts to set up or manage — simply log in and start connecting to customers in a whole new way.

Sangfor Technologies

http://www.sangfor.com/

Sangfor Technologies, a manufacturer of Cloud Computing and network security solutions including Third Generation HCI (Hyper Converge Infrastructure), Complete VDI solution, IAM (Internet Access Management), WAN optimization, converged Security Solution(NGAF), SD-WAN and Application delivery controller(application layer load balance) solution, sells its products mainly to midsize enterprises.

Established in 2000, Sangfor Technologies has over 60,000 clients and over 4000 employees worldwide (2017). Sangfor has 68 branches, including branches in the US, UK, UAE, Italy, Pakistan, South Africa, Germany, Malaysia, Thailand, Indonesia, Singapore, Philippines, Vietnam, Myanmar, South Korea, Hong Kong and Chin

Sansec

http://www.sansec.com.cn

Beijing Sansec Technology Development Co.,Ltd. is a company focusing on encryption based information security solutions. Sansec is a member of the National Cryptography Standardization Technical Committee, and has participated the formulation of more than 10 standards. Sansec’s cryptographic products, such as PCI-E attached HSM(Hardware Security Module), financial HSM, Network attached HSM, encrypted storage gateway, key management systems, have got a large market share in China. With the rapid development of cloud computing, Sansec have developed high performance PCIE-HSM that supports virtualization, Cloud HSM/Cloud Cryptographic Services platform, encrypting gateway/middleware that supports various data types, etc. These products can be integrated to provide protections for the whole life cycle of the data in cloud. We believe cryptographic based security technology will be more and more important for cloud computing. We will provide customized encryption solutions for the cloud applications, and we are transforming into a cloud security service provider. Sansec’s logo is in the attachment in ai format.

SecurityScorecard

https://securityscorecard.com/

The SecurityScorecard Security Risk Benchmarking platform ingests millions of relevant threat intelligence signals to help organizations predict and mitigate security risk against their enterprise, their third-parties and benchmark against their industry peers.

SecurityScorecard helps enterprises gain operational command of their third-party security risk through continuous and passive monitoring of third party security hygiene in areas like application security, patching cadence, network security and passwords exposed. SecurityScorecard helps customers collaborate with their third parties in to decrease risk associated with their ecoysystem.

ServiceNow

http://www.servicenow.com

ServiceNow is changing the way people work.

With a service‑orientation toward the activities, tasks and processes that make up day‑to‑day work life, we help the modern enterprise operate faster and be more scalable than ever before. Customers use our service model to define, structure and automate the flow of work, removing dependencies on email and spreadsheets to transform the delivery and management of services for the enterprise. ServiceNow enables service management for every department in the enterprise including customer service, IT, human resources, facilities, field service and more. We deliver a ‘lights‑out, light‑speed’ experience through our enterprise cloud – built to manage everything as a service.

To find out how, visit www.servicenow.com.

Shyft

https://www.myshyft.com

Shyft is a rapidly growing cloud provider of mobile workforce management solutions for shift workers.

Skyhigh Networks

http://www.skyhighnetworks.com/

Skyhigh Networks, the world’s leading Cloud Access Security Broker (CASB), enables enterprises to safely adopt SaaS, PaaS and IaaS cloud services, while meeting their security, compliance and governance requirements. With more than 600 enterprise customers globally, Skyhigh provides organizations the visibility and management for all their cloud services, including enforcement of data loss prevention policies; detecting and preventing internal and external threats; encrypting data with customer-controlled keys; and implementing access-control policies.

Sophos

http://www.sophos.com

Sophos makes IT security simple with next-generation solutions that protect networks, servers, and devices, wherever they are. Today, more than 100 million users in 150 countries and a global network of channel partners trust Sophos to deliver simple solutions to complex security challenges. Focused on innovation and backed by a global network of SophosLabs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain, and manage, enabling organizations to focus on performance and growth. Sophos – Security made simple.

Spanning

http://spanning.com/

Spanning Cloud Apps, the most trusted provider of SaaS backup and recovery, prevents data loss with automated backup and accurate restores for Google Apps and Salesforce.com. Spanning Backup is a powerful, reliable enterprise-grade solution trusted by thousands of businesses and educational institutions. Visit: www.spanning.com and follow @SpanningBackup.

SSH Communications Security

https://www.ssh.com

As the creators of the SSH protocol which is used in nearly every network today, we understand the need to balance access with security. Our platform based approach to address controls and management for Secure Shell access as well as encrypted traffic monitoring provides the only solutions on the market that address; security, compliance and operational efficiency in today’s complex enterprise environments. Please visit ssh.com or reach us directly at info.us@ssh.com

ST Engineering Electronics Ltd.

https://www.stengg.com

ST Engineering is a global technology, defence and engineering group specialising in the aerospace, electronics, land systems and marine sectors. The Group employs about 22,000 people across offices in Asia, the Americas, Europe and the Middle East, serving customers in more than 100 countries. Its employees bring innovation and technology together to create smart engineering solutions for customers in the defence, government and commercial segments. Headquartered in Singapore, ST Engineering reported revenue of S$6.62b in FY2017 and it ranks among the largest companies listed on the Singapore Exchange. It is a component stock of the FTSE Straits Times Index, MSCI Singapore and the SGX Sustainability Leaders Index.



The Electronics sector specialises in the design, development and delivery of Information and Communications Technology (ICT) products, solutions and services addressing the needs of Smart Cities for Connectivity, Mobility and Security. Its deep technological and engineering expertise straddles business domains in Rail & Road engineering, Satellite Communications, Public Safety & Security, Cybersecurity, Artificial Intelligence, Training & Simulation, Managed Services and Defence C4ISR. It has presence in more than 30 global cities across North America, Latin America, Europe, Africa, the Middle East, China, India and Southeast Asia. For more information, please visit www.stengg.com.

StatPro

http://www.statpro.com/

StatPro is a global provider of award winning portfolio analytics solutions for the investment community. The Group’s cloud-based platform provides vital analysis of portfolio performance, attribution, risk and compliance. This multi-asset class analytics platform helps StatPro’s clients increase assets under management, improve client service, meet tough regulations and reduce costs.

The Group’s integrated and global data coverage includes over 3.2 million securities such as equities, bonds, mutual funds, FX rates, futures, options, OTCs, sector classifications and much else besides. StatPro also covers most families of benchmarks including MSCI, FTSE, Russell, NASDAQ and the open source Freedom Index.

Symantec

http://www.symantec.com/index.jsp

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Telecom Italia

http://www.telecomitalia.com

Telecom Italia is one of the most important telecommunications and ICT operators in Italy as well as being a major telco provider in Latin America.

In the domestic market the Group provides fixed and mobile telecommunications, internet and media services, office systems and solutions for businesses, research and development.

Telecom Italia has an extensive network consisting of the latest transmission technologies ranging from fibre optics to xDSL; it provides fibre optic back-bones in Europe and South America.

Moreover, by leveraging its back-bone and network capacity Telecom Italia it is able to provide cloud computing service platforms to customers ensuring end-to-end security and quality performance.

Tenable

https://www.tenable.com/

Tenable™, Inc. is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and mid-sized organizations across the private and public sectors.

Tencent Cloud Computing (Beijing) Limited

https://www.qcloud.com/

Tencent Cloud is committed to provide high-quality cloud services including cloud computing, cloud data and cloud operations for enterprises and entrepreneurs. Based on the years of massive cloud-based business technology, it covers many areas such as infrastructure to ne operation, platforms to ecological capacity, games, videos, mobile applications, nance, government and etc. Also industry solutions, and building cloud servers, cloud database, audio, video and a series of entertaining products are Tencent cloud’s coverage.

腾讯云基于腾讯多年来海量业务的技术锤炼,从基础架构到精细化运营,从平台实力到生态能力建 设,通过游戏、视频、移动应用、金融、政企等行业解决方案和云服务器、云数据库、音视频等一 系列明星产品服务的打造,致力于为企业和创业者提供集云计算、云数据、云运营于一体更优质的 云端服务体验,成为全球领先的云服务提供商。

Tenet Health

https://www.tenethealth.com/

Tenet Healthcare Corporation is a diversified healthcare services company with more than 125,000 employees united around a common mission: to help people live happier, healthier lives. Through its subsidiaries, partnerships and joint ventures, including United Surgical Partners International (USPI), the company operates 80 general acute care hospitals, 18 short-stay surgical hospitals and over 400 outpatient centers in the United States, as well as nine facilities in the United Kingdom. Tenet’s Conifer Health Solutions subsidiary provides technology-enabled performance improvement and health management solutions to hospitals, health systems, integrated delivery networks (IDN), physician groups, self-insured organizations and health plans. Tenet also operates six health plans.

Thales e-Security

http://www.thales-esecurity.com/

Thales e-Security is a leading global provider of information security providing data encryption solutions to the financial services, manufacturing, government and technology sectors. With a 40 year unrivalled track record of protecting corporate and government information, Thales solutions protect our customers most sensitive data and is used by four of the five largest energy and aerospace companies, government networks around the world, and secures more than 80 percent of the worldwide payment transactions. Thales e-Security has offices in Japan, Hong Kong, United Kingdom and the United States and is represented in over 90 countries around the world. For more information, visit www.thales-esecurity.com

ThousandEyes

http://www.thousandeyes.com/

ThousandEyes provides IT performance management for the cloud era. With the adoption of cloud applications, enterprises are becoming heavily reliant on networks outside of their control. This creates new challenges in troubleshooting performance issues, both inside and outside the corporate network. ThousandEyes provides detailed visibility beyond the corporate network perimeter, identifies the root cause of performance problems with cloud applications and enables distributed collaboration to resolve problems quickly.

Trend Micro

http://www.trendmicro.com/aws

With over two decades of expertise in Endpoint, Messaging and Web Security, Trend Micro provides individuals, and organizations of all sizes, with smarter security solutions that protect against a wide range of insidious threats and combined attacks including viruses, spam, phishing, spyware, botnets and other Web threats, such as data-stealing malware. Trend Micro develops, delivers, and supports proactive cloud-based solutions designed to safeguard critical information and protect personal and corporate reputations. As an industry leader in security intelligence, Trend Micro’s mission is to secure the exchange of digital information by providing the most flexible and customizable Internet Content Security solutions available.

Trintech

http://www.trintech.com/

Trintech is the leading provider of financial software solutions for the Record-to-Report process. Over 800 clients in 100 countries – including half of the Fortune 50 and the FTSE 100 – rely on our solutions to optimize resources, reduce costs, manage risk and monitor activities across the entire finance organization worldwide. Trintech’s Cloud-based Cadency™ software automates the entire R2R cycle – including account reconciliation, close management, compliance, and financial reporting. Trintech’s offices are located in the United States, the United Kingdom, The Netherlands, Australia, France, Ireland and the Nordics, with partners in South Africa, Latin America and across the Asia Pacific region. www.trintech.com.

Tugboat Logic Inc.

https://www.tugboatlogic.com/

The Tugboat Logic mission is to make security and compliance easier, engaging, and a business enabler for every enterprise. Our automation and intelligence provide insights that ready your organization to build trust with customers.

Tugboat Logic is for small to mid sized enterprises who have matured their business where risks are becoming greater but don’t know where to start or can’t afford a security professional. Tugboat Logic is a security management platform that helps companies be secure quickly and easily with self-direction, intelligence and automation.

TÜV Austria

https://www.tuv.at/

Certification Competence Center
TÜV AUSTRIA Deutschland GmbH (TAD)
Tel: +49 (0)711 7223360140
Fax: +49 (0)711 7223360149
Internet: www.tuv-ad.de
E-Mail: service@tuv-ad.de
Falkenweg 1 D- 70794 Filderstadt

The TÜV AUSTRIA Deutschland GmbH (TAD) represents the offical Certification-Office of the TÜV AUSTRA GROUP concerning the certification of management-systems for IT-Security like ISO 27001 or CSA STAR. The TÜV AUSTRIA Group is an international group of companies with branches in more than 40 countries and with 1,400 employees worldwide. Services range from testing elevators and pressure equipment, plant safety, training & further education, medical devices, electric engineering, environmental protection, IT security, loss adjustment, certifications, calibrations, technical due diligence, legal compliance checks, and product testing through to the testing of stage and photovoltaic systems as well as wind turbines.

Universal Compute Xchange (UCX)

http://ucxchange.com/

UCX has created an electronic spot exchange to help Enterprise Organizations and Cloud Service providers manage their financial IT Infrastructure risk exposure by trading the cloud as a commodity. UCX has created the first centralized, transparent exchange that brings both enterprise organizations and cloud service providers together to engage in price discovery, trade execution and the physical delivery of compute resources using one standard unit of measure, providing “apples to apple” comparisons, operational agility, market and capital efficiencies.

Venustech

http://www.venustech.com.cn

Founded in 1996, Venustech is the leading provider of network security products, trusted security management platforms, specialized security services and solutions. Venustech has provided security equipments and solutions for over 30,000 users worldwide, including more than 30 firms of the fortune global 500, over 80% of Chinese banking institutions and over 60% of China’s large state-owned enterprises, as well as all Chinese telecom carriers. Venustech owns the first enterprise-level Postdoctoral Station for network security in the nation, and the certified state-level network security R&D center with over 200 developers. Venustech has applied for hundreds of technical patents and won numerous pioneering achievements in the industry: China’s first IDS hardware product, China’s first distributed vulnerability scanning system, China’s first 10 Gigabit multi-core UTM platform, and realization of significant breakthrough in 10 Gigabit UTM core technology.

Vera

http://www.vera.com

Vera is transforming the way companies around the world protect their most valuable data. By making sharing information simple, collaborative, and highly secure, Vera is solving a tough problem every company, no matter the size, faces. By encrypting every file, organizations have complete control over their information as it moves throughout the world. Vera’s granular security policies travel with the data, enforcing strict access controls, while ensuring the highest level of security, visibility, and control. For more information, visit www.vera.com

Veracode

http://veracode.com/

CA | Veracode, now part of CA Technologies, enables the secure development and deployment of the software that powers the application economy.

With its combination of automation, process and speed, CA | Veracode becomes a seamless part of the software lifecycle, eliminating the friction that arises when security is detached from the development and deployment process. As a result, enterprises are able to eliminate vulnerabilities during the lowest cost-point in the development/deployment chain so they can fully realize the advantages of DevOps environments while ensuring secure code is synonymous with high-quality code.

CA | Veracode’s SaaS platform assesses and improves the security of applications from inception through production so that businesses can fully realize the benefits of the applications they build, buy and deploy as well as the components they integrate into their environments.

Without the need for additional staff or equipment, CA | Veracode customers ramp up quickly, see results and prove value on day one, and consistently see improvement over time.

Vormetric

http://www.vormetric.com/

Vormetric is the leader in enterprise systems encryption and key management for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to encrypt any file, any database, any application, anywhere it reside. Vormetric achieves strong encryption without sacrificing application performance or creating key management complexity. The most security conscious organizations and government agencies in the world, including 7 of the Fortune 10, have standardized on Vormetric to provide strong, easily manageable data security. For more information visit www.vormetric.com.

Weaver

http://weaver.com/

Weaver’s IT Advisory Services focuses on delivering performance-enhancing consultation that simultaneously addresses IT and business agendas. We work directly with CIOs and others to create a more risk-aware, effective IT organization that can nimbly drive process efficiencies throughout companies and better support and deliver transformational business change. From cloud computing to mobile payment information, data integrity and information security have never been more crucial. With a range of specialized IT advisory services, Weaver helps organizations distinguish IT as the strategic advantage companies need to succeed in the age of big data.

Founded in 1950, Weaver currently has 500+ employees and offices in eight cities across the United States. Weaver is ranked the largest independent accounting firm in the Southwest by Accounting Today magazine. The firm is also ranked the 38th largest firm in the United States and a ‘2015 Best of the Best Firm to Watch’ by INSIDE Public Accounting. Weaver serves a broad range of clients including public and private national and international companies, nonprofit organizations and government entities. In addition to traditional assurance and tax services, Weaver also provides numerous advisory services, including risk advisory, transaction advisory, IT advisory, energy compliance and consulting, forensics and litigation, international tax, property tax, state and local tax, and wealth strategies services. Learn more at http://www.weaver.com.

Whistic

https://www.whistic.com/

Whistic is the best way for tech-enabled companies to manage security risk assessments both internally and with third parties, and allows them to gain visibility into the security gaps within their own organizations, as well as their vendors, customers, and partners. Whistic’s platform simplifies the process of gathering responses to security questionnaires by automating the sending and receiving of assessments, gathering supporting documentation, providing contextual security information, and synthesizing the data into easy to read reports and dashboards.

Willis Towers Watson

https://www.willistowerswatson.com

Willis Towers Watson is a leading global professional services, technology and solutions company that helps organizations improve performance through effective people, risk and financial management. With 16,000 associates around the world, we offer consulting and software solutions in the areas of benefits, talent management, rewards, and risk and capital management.

We are the world’s largest provider of actuarial software. Global organizations, including the world’s largest insurers, rely on Willis Towers Watson solutions to measure value, manage risk, safeguard solvency and improve overall business performance.

A powerful combination of tailored best of breed software solutions integrated with world class advisory services sets our offering apart. We have the ability to support our clients’ end-to-end processes leveraging software as a service and cloud technology with the backing of technical expertise and support enabling them to maximize investment and deliver value.

WinMagic

http://www.winmagic.com/

WinMagic Inc. provides application aware Intelligent Key Management for everything encryption, with robust, manageable and easy-to-use data security solutions. WinMagic’s SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

Wipro

http://www.wipro.com/

Wipro Ltd (NYSE:WIT) is a global information technology, consulting and outsourcing company with 170,000+ workforce serving clients in 175+ cities across 6 continents. The company posted revenues of $7.6 billion for the financial year ended Mar 31, 2015.

Wipro helps customers do business better by leveraging our industry-wide experience, deep technology expertise, comprehensive portfolio of services and vertically aligned business model. Our 55+ dedicated emerging technologies ‘Centers of Excellence’ enable us to harness the latest technology for delivering business capability to our clients.

Wipro is globally recognized for its innovative approach towards delivering business value and its commitment to sustainability. Wipro champions optimized utilization of natural resources, capital and talent. Today we are a trusted partner of choice for global businesses looking to ‘differentiate at the front’ and ‘standardize at the core’ through technology interventions.

Workday

https://www.workday.com/

Workday is a leading provider of enterprise cloud applications for finance and human resources. Founded in 2005, Workday delivers financial management, human capital management, and analytics applications designed for the world’s largest companies, educational institutions, and government agencies. More than 1,000 organizations, ranging from medium-sized businesses to Fortune 50 enterprises, have selected Workday.

Workshare

http://www.workshare.com

Workshare is a leading provider of secure enterprise file sharing and collaboration applications. Workshare allows individuals to easily create, share, and manage high-value content anywhere, on any device. Workshare enhances the efficiency of the collaborative process by enabling content owners to accurately track and compare changes from contributors simultaneously. Workshare also reduces the commercial risk posed by inadvertently sharing confidential or sensitive documents. More than 2 million professionals in 70 countries use Workshare’s award-winning desktop, mobile, tablet, and online applications. For more information visit http://www.workshare.com or follow Workshare on twitter at @workshare.

Xactly

http://xactlycorp.com

Xactly (NYSE:XTLY) is a leading provider of enterprise-class, cloud-based, incentive compensation solutions for employee and sales performance management. We address a critical business need: To incentivize employees and align their behaviors with company goals. Our products allow organizations to make more strategic decisions, increase employee performance, improve margins, and mitigate risk. Our core values are key to our success, and each day we’re committed to upholding them by delivering the best we can to our customers.

Xactly Corporation
300 Park Avenue
Suite 1700
San Jose, CA 95110
1-866-GO-XACTLY

Zendesk

http://www.zendesk.com/

Zendesk builds cloud software for better customer service, bringing companies and their customers closer together. With Zendesk, companies engage directly and openly with customers, building more meaningful customer relationships that last a lifetime. More than 40,000 customers use Zendesk to provide service to more than 300 million people worldwide. Learn more at www.zendesk.com.

ZScaler

http://www.zscaler.com/

Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.

ZTE

http://www.zte.com.cn/global

ZTE Corporation is a global leader in telecommunications and information technology. As part of ZTE’s M-ICT strategy, the company is committed to providing integrated end-to-end innovations to deliver excellence and value to consumers, carriers, businesses and public sector customers around the world to enable increased connectivity and productivity. Founded in 1985, ZTE is listed on both the Hong Kong and Shenzhen Stock Exchanges. In 2015, ZTE achieved an annual revenue to over RMB 100 billion for the first time, with a net profit increase of 21.8% to RMB 3.21 billion, driven by new operations including semiconductors and the Internet of Things.

With the industry’s most comprehensive product range and end-to-end solutions, ZTE offers cutting-edge wireless, access & bearer, value-added services, terminals and managed services to telecommunications carriers, in addition to ICT solutions for enterprises and government agencies. ZTE’s advanced capabilities enable leading telecommunications operators and Fortune 500 enterprises in more than 160 countries to achieve their business objectives and increase competitiveness. In addition, ZTE’s acclaimed AXON, Blade, and SPRO series of smartphones and mobile devices are chosen by consumers around the world.

ZTE believes in technology innovation as a core value of the company, investing more than 10% of annual revenue in R&D. The company has established 20 state-of-the-art R&D centres in Asia, North America and Europe and employs over 30,000 research professionals in the development of next-generation technologies including 5G, the Internet of Things, NFV, SDN, Cloud Computing, Big Data and Smart City. ZTE has filed applications for more than 66,000 patents, with over 24,000 granted. Since 2010, ZTE has been ranked among the world’s Top-3 for patent applications under the Patent Cooperation Treaty (PCT) each year, according to the World Intellectual Property Organization.