Name of Organization Begins With:
Evident.io delivers a Security-as-a-Service platform to simplify the management of risk, compliance, and threat-detection in cloud-computing environments. We democratize the security capabilities of the billion-dollar cloud companies, and make them accessible to the cloud adopters of every size and industry. The Evident platform continuously evaluates your cloud resources to detect changes in risk, compliance, and security posture -- delivering the transparency and control you need to defend against today's pervasive security threats. Our customers range from the very early startup with no dedicated security staff, all the way up to the Fortune 500 businesses with multi-million dollar security budgets. One message has been consistent: cloud security needs a continuous solution -- and that solution is Evident.
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.
F5 makes apps go faster, smarter, safer for the world’s largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control. For more information, go to f5.com and follow us on twitter @F5Networks.
With a nearly 30 year heritage in shaping the enterprise security industry, Fischer continues its history of technology leadership and innovation by bringing to market a cloud-based Identity Services Platform that truly simplifies Identity Management, scales seamlessly from the SMB to the largest enterprise, and can be implemented either as a traditional software-as-a product deployment or via any outsourced delivery model. Fischer's solutions provide organizations of all sizes with greater choice in how they derive the benefits of Identity Management, but without risk or compromise. For more information, please visit: www.fischerinternational.com
Fishtech Labs is a technology accelerator focused on finding and creating solutions for our clients that deliver operational efficiencies and improved security posture. So you don't have to be, we are immersed in the changing security and emerging technology landscape specific to Cloud, IoT, SDN, and Virtualization. We identify gaps and appropriate solutions for our clients' maximum advantage. As innovation experts, our team takes a consultative approach to evaluate each client's objectives, benefits, and risks that may be mitigated with next-generation solutions. For more information, visit us at http://fishtechlabs.com or contact us by email at [email protected]
Five9, a provider of cloud contact center software, brings the power of the cloud to thousands of customers worldwide and facilitates more than three billion customer interactions annually. Since 2001, Five9 has helped organizations of every size transition from premise-based software to the cloud. With extensive expertise, technology, and an ecosystem of partners, Five9 helps businesses take advantage of their secure, reliable, scalable cloud contact center software to create exceptional customer experiences, increase agent productivity and deliver tangible business results. The purpose-built, highly scalable and secure Five9 Virtual Contact Center cloud platform delivers a comprehensive suite of easy-to-use applications that enable the breadth of contact center-related customer service, sales and marketing functions. For more information, visit www.five9.com.
Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec
Organization Description: As cloud cybersecurity experts, we provide the best cloud security expertise for companies in demanding or tightly regulated sectors.
Our mission is to define the cybersecurity strategy that will be best suited to the specific context of companies that want to move to the cloud.
Fortica offers a personalized approach and supports you every steps of your cloud projects: before, during, and after a cloud migration.
Fortica have a next-gen CSPM (Cloud Security Posture Manager) called Fortica Cloud Shield.
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider,
Freshworks Technologies Pvt Ltd
Software that’s easy-to-use doesn’t necessarily mean it's only for small organizations. Large businesses use Freshworks’ customer-for-life suite precisely because time-to-value is so short. The simpler we make things, the more value our customers get. No consultants and no engineers needed. Small businesses grow into big businesses with us. And big businesses choose us for our flexibility, scalability, and extensibility.
FTI Technology helps clients manage the risk and cost of e-discovery with confidence. From forensic data collection to fully managed document review services, we collaborate with our clients to deliver strategic solutions tailored to their unique legal requirements. With keen focus on the productivity and defensibility of document review, our clients rely on us to cost-effectively handle matters ranging from internal investigations to large-scale litigation with global e-discovery requirements. Best known for its market-leading scalability and performance, Ringtail® software equips legal teams with powerful review and analysis capabilities, the ability to search across millions of documents in seconds, and the most flexible production capabilities available. And Ringtail is the only document review platform featuring both linear and visual review tools to dramatically improve the speed and consistency of review teams. Ringtail SaaS is built to deliver the promised efficiency and savings of cloud computing while meeting the unique legal requirements of e-discovery transforming the way e-discovery projects are managed. Our electronic discovery professionals understand the technical intricacies and legal implications of data preservation and collection as well as the international protection and privacy issues that apply to electronic documents in these contexts. We can help design and implement defensible strategies to preserve, collect and analyze electronically stored information (ESI) regardless of format, language or location. For more information visit www.FTITechnology.com/saas
Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies. Our solution identifies cloud infrastructure security risks and compliance violations and ensures that they are never repeated. Fugue provides baseline drift detection and automated remediation to eliminate data breaches, and powerful visualization and reporting tools o easily demonstrate compliance.
Fugue automates compliance audits with out-of-the-box frameworks for HIPAA, GDPR, CIS Benchmark, and NIST 800-53, and supports custom policies. Fugue works with CI/CD pipelines to ensure compliance and prevent unauthorized change. Customers like Sparkpost, PBS, and SAP NS2 rely on Fugue to protect against cloud risks and enforce compliance.
As the world's third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents. For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu's IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu's White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security. As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/
Gemalto is the global leader in digital security, with 2016 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world. Our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things. For more information, please visit: http://www.gemalto.com
GitHub is how people build software. Millions of individuals and organizations around the world use GitHub to discover, share, and contribute to software—from games and experiments to popular frameworks and leading applications.
GitHub is a Web-based Git version control repository hosting service. Primarily used for computer code, GitHub offers all of the distributed version control and source code management functionality of Git, as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project.
Whether you work for a small startup, a university, or a Fortune 500 company, GitHub enables powerful, collaborative workflows. You can use GitHub.com in the cloud or GitHub Enterprise on your server, then integrate your favorite apps and services to customize how you build software.
GitHub offers both plans for private and free repositories on the same account which are commonly used to host open-source software projects.
Playing host to almost 29 million users and 80+ million repositories, GitHub.com is the largest host of source code in the world.
Datang Gohigh Security (Zhejiang) Information Technology Co., Ltd. (hereinafter referred to as " GohighSec ") was established in 2015 with registered capital of 10 million RMB Yuan. Is engaged in trusted computing, trusted cloud computing and information security technology and product research and development, production and sales of professional firms. The main products are universal trusted x86 servers, trusted storage, trusted network equipment, trusted cloud platform software and trusted industry solutions. GohighSec with independent intellectual property rights of trusted computing server and trusted cloud computing technology as the foundation, integration of trusted computing industry chain, leading to provide end-to-end product and solution, in order to realize information security escort.
Gohigh Data Networks Technology Co., Ltd (hereinafter referred to as Gohigh) is a high-tech enterprise which has integrated data industry-related technologies, products and resources from Datang Telecom Technology & Industry Group. Gohigh has been listed on Shenzhen Stock Market in 2003 (Stock Code SZ. 000851), and it is one of the two listed domestic companies of Datang Group.
GohighSec is a subsidiary of Gohigh. With research and development base in Beijing and Yiwu city, Zhejiang province. In Beijing, Shanghai, Nanjing, Jinan, Guangzhou, Chengdu have branch offices and service agencies.
Google's cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements. For more information, please visit http://www.google.com/apps/intl/en/business/index.html
Our core competences include IT security consulting, data protection, IT infrastructure architecture, quality assurance and managed services. We work in an interdisciplinary, proactive and expedient way. You can expect autonomy, rock-solid reliability and the ability to think outside the box from us.
Our mission is a reduced workload and business process optimization, so that you, as our client, cut costs, stress and attain your business objectives faster.
Any time you require rapid and competent help with an IT project, we should have a chat. We would be happy to show you how you can gain the maximum benefit from our work and increase your productivity.
GuidePoint Security LLC
GuidePoint Security LLC is a Virginia-based cyber security company that
Founded in 2011 by cyber security industry veterans, GuidePoint is a
HackerOne is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security partner. Organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google, Twitter, GitHub, Nintendo, Lufthansa, Goldman Sachs, Qualcomm, Starbucks, Dropbox, Intel, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before they can be criminally exploited. HackerOne customers have resolved over 72,000 vulnerabilities and have awarded over $30M in bounty rewards. HackerOne is headquartered in San Francisco with offices in London, New York, and the Netherlands.
HERE Technologies enables people, enterprises and cities around the world to harness the power of location and create innovative solutions that make our lives safer and more efficient. We transform information from devices, vehicles, infrastructure and other sources into real-time location services that play a key role in how we move, live and interact with one another.
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity solutions and services to enterprise organizations. Herjavec Group delivers SOC 2 Type 2 certified managed security services globally supported by a state-of-the-art, PCI compliant, Security Operations Centre (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with leadership positions across a wide range of functions including consulting, professional services & incident response. Herjavec Group has offices globally including head offices in Toronto (Canada), New York City (USA), Reading (United Kingdom) and Sydney (Australia).
Herjavec Group’s Managed Security Services practice defends enterprise level organizations globally from increasingly sophisticated, targeted cybercrime threats. Core managed services include: Security Information and Event Management, Intrusion Prevention and Detection, Application Security, Next Generation Firewall Management, Endpoint Protection, Data Loss Prevention, Web Proxy and URL Filtering and Vulnerability Management. Herjavec Group’s managed security service practice relies on two custom built technology pillars:
Herjavec Group Threat Framework - The Threat Framework allows dynamic and evolving threat modelling to be applied within any organizational environment. Herjavec Group focuses on meaningful security use cases to proactively identify attacks by applying the Framework to onboarded technologies & threat intelligence products in the customer’s environment. The Threat Framework covers key attack categories including Authentication, Targeted Attacks, Malware, DDOS and Traffic Anomalies.
Herjavec Group’s Analytics Platform - Herjavec Group’s Analytics Platform filters threat intelligence and customer data into actionable, relevant alerts. Alerts enriched using Herjavec Group’s Threat Framework are processed through the Platform, which automatically performs additional enriching functions including IP reputation look up, geo mapping, alert trending & deduplication, prior to preparing a readable output for Herjavec Group’s security analysts to review and action accordingly.
For more additional information or to engage a security specialist please visit www.herjavecgroup.com
Hewlett Packard Enterprise
HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible. HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits. With 90+ learning centers worldwide, numerous partner facilities and customer's onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements.
Visit HP: www.hp.com/learn
Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video
At Hewlett Packard Enterprise, we advance the way you live and work by engineering experiences that unlock your full potential.
HEXCloud is a professional catering chain system consulting service and related industry software product research and development company. With the long-term accumulation of rich industry management experience and the spirit of innovation, we will create solutions with international management concepts and local user management practices. Company always adhere to the "innovative ideas, innovative architecture" development concept and "with partners and customers win-win" service tenet, and partners for clients to provide professional HEX system implementation and customer service.
HID Global® is the leading provider for innovative products, solutions and services that help organizations create, manage and use secure identities. Trusted by millions of customers around the world, HID Global provides comprehensive solutions to secure facilities, assets, networks and cloud resources.
HID Global will be the market leader for trusted identity solutions by providing seamless access and IP at the door solutions complemented by our Cloud Services. HID Global is dedicated to ensuring that when customers purchase Genuine HID products and solutions, they are purchasing absolute confidence in performance, value and service. HID Global is an ASSA ABLOY Group brand.
HKBN Enterprise Solutions Limited
Who We Are
HKBN is Hong Kong’s largest provider of residential high-speed fibre broadband service (symmetrical 100Mbps to 1000Mbps) by number of subscriptions, and a rapidly growing enterprise solutions provider. We offer a diverse portfolio of premier telecom solutions to personal and enterprise markets, including broadband, mobile, entertainment, voice communications, cloud solutions, data facilities and system integration.
We built and own one of the most extensive fibre optic networks in Hong Kong, which covers over 2.2 million residential homes passed, representing approximately 81% of Hong Kong’s total residential units, and more than 2,200 commercial buildings. In 2004, we successfully built the largest Metro Ethernet network in the world. In 2005, we became the first Internet Service Provider in Hong Kong to offer 1,000Mbps residential Fibre-to-the-Home service. In 2013, we completed our acquisition of Y5ZONE Limited and further extended our Wi-Fi business development. In 2016, we further strengthened our Enterprise Solutions business with the acquisition of New World Telephone Holdings Limited’s telecommunications and online marketing solutions business. For more information, please visit http://hkbnes.net.
Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world's population. Huawei's vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.
For more than 20 years, Hyland has been dedicated to meeting organizations’ needs for document and process management with OnBase, an enterprise content management (ECM) solution. As OnBase has evolved through consistent product innovation, it remains focused on automating business processes that depend on documents, content and people to operate more effectively. OnBase is the pioneer of ECM in the cloud. Since 2000, the OnBase Cloud has been empowering more than 600 organizations around the world to better manage the content that surrounds their processes. The OnBase Cloud connects people to the content, data and processes they need to make more informed decisions – without additional infrastructure needs. Employee productivity increases as they spend less time searching for paper and dedicate more time to providing quality service to customers. For more information about OnBase cloud-based and hosted solutions, please visit https://www.onbase.com/
Hyperproof builds cloud-based software that allows organizations of all sizes to easily navigate their compliance journey. As the first-ever compliance operations solution, Hyperproof makes compliance efforts and audit processes faster, simpler and less expensive. Hyperproof’s leadership team of enterprise software veterans has a combined 150+ years of experience in finding solutions to the most complex enterprise software problems. Hyperproof provides compliance officers with the tools needed to collaborate with stakeholders, both internally and externally, to ensure that risks are mitigated, compliance objectives are met and business objectives achieved. Hyperproof offers technology solutions that help organizations meet their highest aspirations and demonstrate their commitment to protecting their customers, shareholders, partners and suppliers along with the greater community. For more information about Hyperproof and their products, log on to Hyperproof.io or follow Hyperproof on Facebook, Twitter, Instagram and LinkedIn.
IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM's capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: - understand threats and vulnerabilities in terms of business impact - respond to security events with security controls that optimize business results - prioritize and balance your security investments. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today's business climate. IBM's cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 100 patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide. To learn more, visit http://www.iboss.com.
Icertis, the leading provider of enterprise contract management in the cloud, solves the hardest contract management problems on the easiest to use platform. Icertis helps companies transform their commercial foundation ensuring compliance, improving governance, mitigating risk and enhancing user productivity, thereby improving the bottom line. The Icertis Contract Management (ICM) platform is used to manage 5+ million contracts by 2+ million subscribers at companies like 3M, Daimler, Microsoft, Roche and Wipro in 40+ languages across 90+ countries. The AI-powered platform allows customers to increase contract velocity and agility, proactively manage entitlements and obligations as well as surface commercial insights and intelligence.
Next-Gen Access, protecting organizations from data breaches through a zero trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating their devices, and intelligently limiting their access. Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). With Idaptive, organizations experience secure access everywhere, reduced complexity and
IDF CONNECT: BRINGING ZERO TRUST ACCESS MANAGEMENT TO THE CLOUD
IDF Connect provides innovative Cloud Access Management solutions and services to enterprises and other large organizations. We specialize in helping our customers achieve SSO and Zero Trust Access Management for both Cloud-deployed and on-premises apps without major new integration or risk. SSO/Rest, our flagship product – either as a stand-alone solution or in tandem with your existing web access management framework – protects your Cloud-deployed apps as if they were still in your own data center.
ID Quantique (IDQ)
ID Quantique (IDQ) is the world leader in quantum-safe crypto solutions designed to protect data for the long-term future. The company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution solutions and services to the financial industry, enterprises and government organisations globally. IDQ also commercializes a quantum random number generator, which is the reference in the gaming and lottery industries. Additionally, IDQ is a leading provider of optical instrumentation products; most notably photon counters and related electronics. The company's innovative photonic solutions are used in both commercial and research applications.
IdRamp is a decentralized identity fabric. We simplify integration across multiple identity providers, cloud, mobile, and legacy applications.
We develop technology that incorporates profound contact center business and operation knowledge gathered during more than 15 years of successful implementations. We also provide consulting and professional services adhering to the best practices in the industry.
This allows us to deliver highly customized solutions, hosted either in your own datacenter or cloud-based, which are specially designed to reduce costs, improve service processes and provide a superior experience to your customers.
InEight is a leading developer of construction project management software, combining proven technology with a unified vision, delivering actionable insights and project certainty to more than 25,000 active users in more than 750 companies. Built on a history of construction and engineering excellence, InEight solutions help companies visualize, estimate, manage, control and connect all aspects of capital and maintenance projects. With configurable, integrated and field-tested solutions, InEight customers have the visibility and control required for on-budget and on-time project completion.
Informatica is a leading independent software provider focused on delivering transformative innovation for the future of all things data. Organizations around the world rely on Informatica to realize their information potential and drive top business imperatives. The Informatica Platform is an intelligent data platform, which includes data integration, data quality, master data management, data archiving and data security capabilities, to empower customers to transform raw, possibly unsafe, data into great data for more accurate insights and more effective decisions. More than 5,800 enterprises depend on Informatica to fully leverage their information assets residing on-premise, in the Cloud and on the internet, including social networks. For more information, call +1 650-385-5000 (1-800-653-3871 in the U.S.), or connect with Informatica at LinkedIn, @Informatica on Twitter and Facebook.