Solution Providers

Solution Providers

Name of Organization Begins With:
CaixaBank
CaixaBank

CaixaBank is a financial group, leader within the Spanish market, comprising a banking and insurance business, as well as undertaking investments in international banks and in leading service sector companies. The Group's essence – and what sets it apart from others – is its level of implication and unswerving commitment to society. CaixaBank is committed to banking based on corporate values of quality, confidence and social commitment. CaixaBank has the largest customer base in Spain – 14 million people – and is the main bank for 1 in every 4 Spanish customers. The bank has the most extensive network in Spain, with over 5,000 branches and nearly 9,500 ATMs, complemented by a mobile and online banking service of the highest quality.

CaixaBank is also the tenth largest bank in the Eurozone in terms of market capitalisation.

Visit https://www.caixabank.com/

Canford Brook Associates Limited
Canford Brook Associates Limited

Canford Brook Associates is a NCSC Certified Cyber Security Consultancy specialising in the architecture and design of secure cloud-hosted systems.We are experts in AWS and Azure public cloud platforms, and help you deliver robust and secure solutions that Identify, Protect, Detect, Respond, and Recover from cyber security threats.

Visit https://www.canfordbrookassociates.co.uk

Cedrus
Cedrus

The Cedrus Cloud Security team has decades of experience in Enterprise Security. We understand the challenges within risk driven security programs and work with our clients to address these concerns as they manifest in the adoption of Cloud.

To help our clients, our team has created re-usable implementation patterns and use cases to specifically solve problems within the domains of Digital Identity Management Transformation and Digital Asset Protection in the Cloud through CASB.

Visit https://cedrus.digital/cloud-security/

Cendyn
Cendyn

Cendyn is a cloud-based software and services provider that develops integrated technology platforms for driving sales and marketing performance in the travel and hospitality industry. The Cendyn Hospitality Cloud offers the most complete set of innovative software and services in the industry, covering hotel marketing, guest engagement, group sales, and event management. With offices in Boca Raton, Atlanta, Boston, San Diego, Toronto, Whistler, London and Singapore, Cendyn proudly serves more than 30,000 clients in 143 countries with enterprise spend levels in excess of $1 billion. For more information on Cendyn, visit www.cendyn.com.

Visit http://www.cendyn.com

Centrify
Centrify

Centrify is redefining the legacy approach to Privileged Access Management (PAM) by delivering cloud-ready Zero Trust Privilege to secure access to Infrastructure, DevOps, Cloud, Containers, Big Data, and other modern enterprise attack surfaces. As traditional network perimeters dissolve, organizations must discard the old model of “trust but verify”, which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise.

Organizations may consider approaching PAM by solely implementing password vaults, leaving gaps that can easily be exploited. Centrify Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement, and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions.

Centrify’s industry-recognized solution redefines legacy PAM and goes beyond simple password vaulting to converge the core tenets of Zero Trust Privilege. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse. For more information, please visit www.centrify.com.

Visit http://www.centrify.com/

CEPREI Certification Body
CEPREI Certification Body

CEPREI HQ No.110 Dongguan Zhuang RD. Guangzhou, P.R.China Telephone: +86-20-87236606 [email protected] As a leading provider of management system certification body in China and the first Executive Member of CSA in Asia, CEPREI Certification Body Provides information security related professional services such as ISO20000 & ISO27001 certification, risk assessment, IT governance, Business Continuity Management etc. Also, newly launched C-STAR assessment scheme is provided to help our client fully understand cloud security issues they’re facing and how to put the appropriate controls in place. CEPREI Certification Body with unique legal status is a registrar authorized and accredited by national department and/or accreditation bodies home and abroad, to conduct third-party certification. It grew out of Inspection Division of China Electronic Product Reliability and Environmental Research Institute (the Fifth Electronic Institute) established in 1956, which is the first scientific research organization at national level engaged in product quality and reliability research in China. As early as 1979, CEPREI Certification Body introduced the concept of Certification into China. Ever since then CEPREI has issued more than ten thousand certificates of various types to its clients. It sets foot in all administrative regions in mainland China and other countries and regions including Hongkong Special Administration Region, Taiwan, USA, German, Holland, Denmark, Australia, Japan, Korea, Malaysia, Thailand and Singapore. As one of the most authoritative accreditation bodies in the world, America National Standard Institute-Registrar Accreditation Board (ANAB) has authorized CEPREI Certification Body to issue ISO9000, ISO14000 and ISO27001 certificates with ANAB logo since 2001. The certificate will be helpful for your products and services in improving reputation and enhancing competitiveness home and abroad.

Visit http://www.ceprei.org

Checkpoint Software
Checkpoint Software

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading
provider of cyber security solutions to governments and corporate
enterprises globally. Its solutions protect customers from 5th generation
cyber-attacks with an industry leading catch rate of malware, ransomware
and other types of attacks. Check Point offers multilevel security
architecture, , which defends enterprises’ cloud, network and mobile device
held information. Specifically, Check Point CloudGuard, provides unified
cloud native security for assets and workloads, across multi-cloud
environments to automate security, prevent threats, and manage posture.

Visit https://www.checkpoint.com/

CipherCloud
CipherCloud

CipherCloud introduced the first CASB solution to the market in 2011 and continues to reshape the cloud security market. CipherCloud’s recognized deep data visibility, adaptive controls and data protection expertise forms the foundation for the industry’s only zero-trust CASB solution, providing seamless zero-trust security across all clouds with unified policies, trusted data protection, and automated compliance for the cloud-mobile era. CipherCloud is a winner of the Best Cloud Security Product of the Year by SC Magazine, the only Visionary in Gartner’s 2019 CASB Magic Quadrant, and the Overall Leader in the KuppingerCole CASB Leadership Compass two years in a row. The world’s largest global enterprises and government institutions in over 25 countries protect and secure their cloud information with CipherCloud. CipherCloud is backed by Andreessen Horowitz, Transamerica Ventures, Delta Partners and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

Visit https://www.ciphercloud.com/

Citrix
Citrix

Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control. Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device. With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.

Visit http://www.citrix.com/secure

CloudLock
CloudLock

CloudLock is a leading cloud data security company that provides enterprise class solutions designed to give organizations control over their data in the public cloud, without invasive in-band technology, complicated overhead, or unanswered regulatory risk. Many of the world’s largest companies and institutions trust CloudLock’s approach of directly integrating with their SaaS applications, which makes robust security controls immediately available at a fraction of the cost and complexity of other alternatives. CloudLock helps organizations:

  • Extend their DLP policies to SaaS applications such as Google Apps and Salesforce
  • Implement a robust discovery/classification/control security framework in the public cloud
  • Enforce the principles of people-centric security, greatly reducing their risk of data exfiltration or breach without driving users into unsanctioned (often called “shadow IT”) systems
  • Apply risk appropriate controls, including selective encryption, across their most sensitive data
For more information, please visit us at cloudlock.com

Visit http://www.cloudlock.com/

CloudPassage
CloudPassage

CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company's Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.

Visit http://www.cloudpassage.com/

Cloudrise
Cloudrise

Elevating Cloud Security, Data Protection, and Privacy through Assessment, Technology Enablement, and Process Automation. Cloudrise delivers repeatable, successful outcomes through a proprietary automation platform to rapidly assess, enable, and automate security and privacy safeguards of digital assets in all types of computing environments. By leveraging automated workflows and action orientated analytics we enable our clients to reduce risk, work at the speed of business, and help manage data, privacy, and cloud security programs.

Visit https://cloudrise.com/

Cloudtango
Cloudtango

Cloudtango is a Managed Service Provider directory offering an easy way to match business needs with MSP/MSSPs throughout the industry. Our directory contains thousands of Managed Security Service Providers searchable by Service, partnership and location.

Visit https://www.cloudtango.org/

CloudVector
CloudVector

Discover, Monitor, Secure Your APIs


CloudVector enables organizations to go beyond the gateway with the first API Threat Protection solution that operationalizes the observability and security of enterprise APIs. Only CloudVector automates the continuous discovery of APIs, monitors for deviant behavior, and secures data from exfiltration to prevent breaches.

API Inspection Modules (AIM) use fully automated microsensor modules to enable the continuous discovery of all APIs--even shadow APIs. Deep API Risk Trackers (DART) apply AI policies to customer-specific API blueprints to monitor for API risks and real-time detection of reconnaissance attempts. API Response Modules (ARM) enforce targeted policies against API abuse in real-time. CloudVector is the only API Threat Protection solution to entirely address the OWASP API Security Top 10.

CloudVector is purpose-built for modern application architectures, and is deployed with zero impact to inline performance, with no changes required to applications or DevOps processes. In fact, CloudVector eliminates the need for manual API specification registration to deliver immediate time to value.

Visit https://www.cloudvector.com/

CNG Cyber Solutions
CNG Cyber Solutions

CNG’s game changing solutions are designed to combat the ever-evolving cyber security threat environment. CNG Cyber Solutions, LLC three focus areas. Ground Zero, Federal Risk and Authorization Management Program (FedRAMP) FedRAMP Certification and Accreditation, Custom design and building of Sensitive Compartmented Information Facility.

Visit https://www.cngcybersolutions.com

Coalfire Controls
Coalfire Controls

Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Coalfire's approach addresses each businesses' specific vulnerability challenges, developing a long-term strategy to prevent security breaches and data theft. Coalfire provides advisory and assessment services for cyber security and compliance in DoD SRG, FISMA/FedRAMP, HIPAA/HITRUST, PCI DSS, PCI PA-DSS, ISO 27001, SOC and technical testing services such as penetration testing, social engineering and forensics. Coalfire has offices throughout the United States and Europe.

Visit http://www.coalfire.com/

Conga
Conga

Conga helps businesses get more value from their CRM by transforming their processes through AI-empowered digital transformation. Conga delivers digital transformation by helping create, manage, collaborate on, negotiate, and eSign business documents and contracts, all via visual process automation. The Conga Suite of products helps to simplify user experiences and increase productivity.

As a Salesforce Platinum Partner, Conga has built a base of more than 700,000 users, in 85+ countries, across all industries. Thousands of organizations rely on Conga daily to manage and simplify critical business processes. The company is based in Colorado with global operations in the UK and Australia. Learn more at www.conga.com or follow Conga on Twitter: @getconga.

Visit http://www.conga.com

ControlCase
ControlCase

ControlCase is a global provider of certification, cyber security and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost effective and comprehensive in both on-premise and cloud environments. ControlCase offers certifications and a broad spectrum of cybersecurity services that meet the needs of companies required to certify to PCI DSS, HITRUST, SOC 2 Type II, ISO 27001, PCI PIN, PCI P2PE, PCI TSP, PA DSS, CSA STAR, HIPAA, GDPR, SWIFT and FedRAMP.

www.controlcase.com

ControlCase
USA +1.703.483.6383
Canada +1.416.900.1272
Europe, Middle East and Africa +44.2035145389
India +91.7506610917
Asia Pacific +66-21056164
Website: https://controlcase.com
Email: [email protected]

Visit http://controlcase.com

Corelight
Corelight

Corelight delivers powerful network traffic analysis (NTA) solutions that help organizations defend themselves more effectively by transforming network traffic into rich logs, extracted files, and security insights. Corelight Sensors are built on Zeek (formerly called “Bro”), the open-source NTA framework that generates actionable, real-time data for thousands of security teams worldwide. Zeek has become the ‘gold standard’ for incident response, threat hunting, and forensics in large enterprises and government agencies worldwide. Corelight makes a family of physical, cloud and virtual network sensors that take the pain out of deploying open-source Zeek and expand its performance and capabilities.

Visit https://www.corelight.com/

CPG
CPG

CPG is Australian owned and a full-scope International Certification and Training Body. They are recognized by JAS-ANZ (Joint Accreditation System – Australia New Zealand), by Singapore Accreditation Council and by APMG International as an Accredited Certification Body, by SANAS (South African National Accreditation System) and by Exemplar Global as an Accredited Training Organisation. CPG certifies small through to large organisations, businesses, hospitals and government departments to both National and International standards, across a wide array of management systems certifications.

With offices in over 30 countries, CPG (formerly International Standards Global) is a full-scope CB, with accreditations from multiple IAF and National Bodies. Programs offered include ISO2700, ISO9000, HACCP, Food Safety, Occupational Health, Disability, and Business Continuity. https://cpg.global

Visit https://cpg.global

Cradlepoint
Cradlepoint

Branch, mobile, and IoT edge networks are undergoing dramatic change — and taking traditional enterprise WANs to their breaking point. Organizations must manage complex branch sites; data-driven vehicle fleets and mobile command centers; a vast array of IoT and M2M use cases; and everything in between. Founded in 2006, Cradlepoint has grown to become the industry leader in cloud-delivered 4G LTE network solutions for business, service providers, and government organizations, and we are committed to extending our leadership into the emerging 5G space. More than 25,000 customers worldwide in retail, financial services, healthcare, transportation, public sector, and other industries rely on Cradlepoint to keep their branch and mobile networks, and IoT devices, always connected and protected. Our Elastic Edge™ vision provides a blueprint for next-generation, software-defined edge networks built on pervasive and reliable 4G/5G wireless services, connecting people, places, and things everywhere with enterprise-class visibility, security, and control.

Cradlepoint is a privately held company headquartered in Boise, Idaho, with a development center in Silicon Valley, California, and international offices in the UK and Australia.

Visit https://cradlepoint.com/

Crowdstrike
Crowdstrike

CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture. CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 27 billion events per day from millions of sensors deployed across more than 170 countries, uniquely providing crowdsourced protection for the entire customer community.

Visit https://www.crowdstrike.com/

CyberInt
CyberInt

Recently recognized as one of the 20 most promising enterprise security solution providers for 2018 by CIOReview, CyberInt eliminates potential threats before they become crises by looking at all online activities and digital assets from an attacker’s perspective and provides managed detection and response services to customers worldwide. Leveraging ArgosTM real-time Digital Risk Protection platform with a global cyber expert analyst team, as well as managed SOC, threat hunting, deep dive investigations, real-time incident response and risk and business impact assessment services, CyberInt provides holistic end-to-end protection to digital businesses in retail, ecommerce, gaming and financial industries.

Visit https://www.cyberint.com/

Cyxtera
Cyxtera

Cyxtera Technologies combines a worldwide footprint of 50+ best-in-class data centers with a portfolio of modern, cloud- and hybrid-ready security and analytics offerings – providing more than 3,500 enterprises, government agencies and service providers an integrated, secure and cyber-resilient infrastructure platform for critical applications and systems. For more information about Cyxtera visit http://www.cyxtera.com/.

Visit https://www.cyxtera.com/

DAS SEE
DAS SEE

SN Registrars (Holdings) Ltd is the UKAS Accredited certification body operating under the trading names SNR Certification, DAS Certification and QEC Certification. For more information and locations of our international offices please visit www.snregistrars.com or www.dascertification.com

As regional representatives of DAS Certification, The DAS SEE office combines many years of experience in ISO 27001 and ISO 20000-1 certification within the ICT sector and is the designated program leader for the STAR Certification scheme with contact details below: DAS SEE, agent of SN Registrars (Holdings) Ltd [email protected] www.das-see.com

Visit http://www.das-see.com

Databank
Databank

DataBank is a leading provider of enterprise-class data center, cloud, and
connectivity services, offering customers 100% uptime availability of data,
applications, and infrastructure. DataBank’s managed data center services
are anchored in world-class facilities that cater to today’s network and
computing edge – users and applications in dense but underserved markets.

DataBank provides its suite of services in a truly hybrid model allowing
enterprises to port workloads, technologies and even contract terms from
data center to data center and from cloud to colocation, with compliance
certifications to meet the most stringent demands. By evolving the data
center experience in this manner, our customers are able to more
effectively manage risk, improve technology performance and focus on growth.

Visit https://www.databank.com/

DBAPPSecurity
DBAPPSecurity

2007 in Fremont of California, the company now has many branches with its national sales networks in many cities, such as Hongkong and Shanghai, Beijing in China. We provide products and services to 1000 customers across all industries, including many Fortune 500, large and middle-sized organizations. Since 2009, the DBAPPSecurity Ltd., a Leading company focusing on Web Application security and database security technologies. Founded in company’s revenue has being grown more than 50% per year.

DBAPPSecurity focuses its efforts on research and development and has a professional team with years of experience in developing and implementing data security and web application security solutions. The company owns some of the world leading technology patterns, and is dedicated to offer web application security and database security solutions. DBAPPsecurity’s customers include government organizations as well as leading companies from various industries such as finance, energy, education, medical and e-commerce industry.

Visit http://www.dbappsecurity.com.cn

Dell
Dell

Dell Technologies (NYSE:DELL) is a unique family of businesses that helps organizations and individuals build their digital future and transform how they work and live. The company provides customers with the industry’s broadest and most innovative technology and services portfolio spanning from edge to core to cloud. The Dell Technologies family includes Dell, Dell EMC, Pivotal, RSA, Secureworks,Virtustream and VMware.

Visit https://www.dell.com

DHG
DHG

DHG IT Advisory works with companies to manage technology risk while maintaining data integrity, protecting privacy and complying with regulations. From project management and regulatory compliance assistance to digital forensics and incident response, DHG is equipped to meet your IT advisory needs that drive your business. With more than 2,000 people across the United States, Dixon Hughes Goodman ranks among the nation’s top 20 public accounting firms. Offering comprehensive assurance, tax and advisory services, the firm focuses on major industry lines and serves clients in all 50 states, as well as internationally.

Visit https://www.dhg.com/services/advisory/it-advisory

Digital14
Digital14

Delivering trust in a world where cyber risks are a constant threat, Digital14 guides clients on their journeys to reach unprecedented heights and navigate what lies ahead in tomorrow’s digital frontier. Digital14, established in 2020, is wholly owned by ADQ and based in the regional and global innovation hub of Abu Dhabi. This base provides the ideal platform for Digital14 to accelerate digital advancement and cyber resilience solutions via robust, end-to-end solutions.

Whether it is enjoying the flexibility of a protected internet connection, making secure transactions or communicating safely, we strive to protect, transform and nurture today, so that our clients can have the freedom to achieve their potential tomorrow. We are Digital14. Protect. Transform. Nurture.

Visit https://digital14.com/

Digital Asset Custody Company, Inc
Digital Asset Custody Company, Inc

DACC provides institutional quality crypto currency asset custody to institutional investors, HNW individuals, and family offices. DACC’s goal is to custody any crypto asset, including those deemed to be securities by the SEC. Currently, DACC can technologically custody 60+ crypto assets with industry-leading egress times from our network of secure, cold storage (“air-gapped”) facilities. These facilities are built to align with best practices found in the most secure government and private security organizations offering security, redundancy and, most importantly for institutional investors, custody.

DACC’s leadership team is comprised of individuals with careers spent within the most sophisticated financial services firms. This experience provides a unique vantage point and drives the customer service ethos expected by sophisticated crypto currency investors.

The DACC provides:

  • Institutional quality crypto asset custody
  • Segregated asset storage for every customer
  • Emphasis on process transparency, reporting, and service
  • Enterprise cyber security and physical security controls
  • Audited operational procedures

DACC has applied for membership to the Financial Industry Regulatory Authority (FINRA) and upon approval will be a Securities and Exchange Commission (SEC) registered broker-dealer.

Visit https://www.digitalassetcustody.com/

Digiware S.A
Digiware S.A

Digiware S.A. is the expert provider of comprehensive strategies generation in information security for America. With 20 years of experience, it protects organizations against security risks involved technological growth; in turn, aware of the enormous challenge facing the areas of information security today rests on the definition, implementation and maintenance of strategic programs for information security, that integrate with business objectives.

Proactive protection Digiware S.A., under the model of Resources of Security Intelligence - RIS, provides the visibility needed to boards, governing bodies, personal risk, operational, technological and security, to deal with the risks of dynamic information.

Visit http://www.digiware.net/

Dimension Data
Dimension Data

Dimension Data accelerates the ambitions of its clients by delivering exceptional value through its great people. As an organization we’re inspired by teamwork, innovation, diversity, and integrity. We’re driven by professional excellence and always place our clients at the centre of everything we do. As a global leader in the provision and management of specialist IT infrastructure solutions and services, let us bring your ambitious ideas to life and accelerate your success.

Visit http://cloud.dimensiondata.com/

DivvyCloud
DivvyCloud

DivvyCloud by Rapid 7 protects your cloud and container environments from misconfigurations, policy violations, threats and IAM challenges. With automated, real-time remediation DivvyCloud customers achieve continuous security and compliance, and can fully realize the benefits of cloud and container technology. We protect customers using AWS, Azure, GCP, and Kubernetes.

Visit https://www.divvycloud.com

DocuSign
DocuSign

The DocuSign Agreement Cloud™ digitally transforms how you do business via contracts and other types of agreements. Choose from more than a dozen applications and more than 350 integrations, covering the entire agreement process—from preparing to signing, acting on, and managing agreements. By modernizing your system of agreement with the DocuSign Agreement Cloud, you’ll do business faster with less risk, lower costs, and better experiences for customers and employees.

Visit https://www.docusign.com/

Dome9
Dome9

Dome9, the public cloud security company, delivers security and compliance automation to enterprises as they scale in any cloud. With Dome9, organizations gain full visibility and control of their security posture, allowing them to minimize their attack surface and protect against vulnerabilities, identity compromise, and data loss in the cloud. Dome9’s agentless SaaS solution provides operational efficiency for faster time-to-protection on Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Dome9 Arc is the most comprehensive cloud security solution in the market, going beyond just monitoring and alerting to deliver active cloud security. Enterprises around the world have chosen Dome9 as their key partner to provide the active protection necessary throughout their cloud journey.

Visit https://dome9.com

Dropbox
Dropbox

Millions of people trust Dropbox to easily and reliably store, sync, and share their documents, photos, and videos across devices and platforms. Dropbox for Business helps organizations around the world collaborate effectively and increase productivity. And it brings IT admins the functionality, controls, and visibility they need to ensure the safety of their company data. Dropbox has been designed to keep users’ data safe, employing a sophisticated infrastructure, enterprise-grade security, layers of encryption, and detailed security, privacy, and compliance policies and procedures. To learn more about Dropbox for Business, www.dropbox.com/business.

Visit https://www.dropbox.com/

Druva
Druva

Druva is the leader in cloud data protection and information management, leveraging the public cloud to offer a single pane of glass to protect, preserve and discover information – dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva’s award-winning solutions intelligently collect data, and unify backup, disaster recovery, archival and governance capabilities onto a single, optimized data set. As the industry’s fastest growing data protection provider, Druva is trusted by over 4,000 global organizations and protects over 25 PB of data. Learn more at www.druva.com and join the conversation at www.twitter.com/druvainc.

Visit http://www.druva.com

DTCC
DTCC

With more than 40 years of experience, DTCC is the premier post-trade market infrastructure for the global financial services industry. From operating facilities, data centers and offices in 16 countries, DTCC, through its subsidiaries, automates, centralizes and standardizes the processing of financial transactions, mitigating risk, increasing transparency and driving efficiency for thousands of broker/dealers, custodian banks and asset managers. Industry owned and governed, the firm simplifies the complexities of clearing, settlement, asset servicing, data management and information services across asset classes, bringing increased security and soundness to the financial markets. In 2016, DTCC’s subsidiaries processed securities transactions valued at more than U.S. $1.5 quadrillion. Its depository provides custody and asset servicing for securities issues from over 130 countries and territories valued at U.S. $49.2 trillion. DTCC’s Global Trade Repository maintains approximately 40 million open OTC positions per week and processes over one billion messages per month. To learn more, visit us at www.dtcc.com or connect with us on LinkedIn, Twitter, YouTube and Facebook.

Visit http://www.dtcc.com/

Duo Security
Duo Security

Duo Security is a cloud-based trusted access provider protecting the world’s fastest-growing companies and thousands of organizations worldwide, including Dresser-Rand Group, Etsy, NASA, Facebook, K-Swiss, The Men’s Wearhouse, Paramount Pictures, Random House, SuddenLink, Toyota, Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at www.duo.com.

Visit https://www.duo.com