Solution Providers

Accenture

http://www.accenture.com/

Accenture is a global management consulting, technology services and outsourcing company, with approximately 236,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$25.5 billion for the fiscal year ended Aug. 31, 2011.

Accenture Security Solutions professionals leverage decades of experience, deep industry knowledge and business-process know-how to help protect against threats, minimize risks and enable the adoption of new technologies that promote growth.

Adallom

http://www.adallom.com/

Adallom is a SaaS security company founded in 2012 by alumni of the Israeli Intelligence Corps. We focus on evolving the way enterprises secure information in SaaS by monitoring all activity, detecting unauthorized access, and protecting users in real time. Adallom is the only SaaS security company to have defeated targeted SaaS attacks in the wild by applying advanced machine learning to real time user activity monitoring. We are members of Microsoft’s MAPP (Microsoft Active Protections Program), and would love to work with you on securing your company’s SaaS investment.

If you’re curious about our name, “Adallom” is an abbreviation of the Hebrew saying “Ad Halom” which literally means “up to here” and in game theory lingo means “the last line of defense.” In the context of SaaS we believe that pre-existing defense mechanisms are ineffective at protecting information in SaaS. So we created a solution that extends the boundaries of enterprise security into the cloud. We moved control, visibility, and detection directly into SaaS, away from devices and perimeters. In the SaaS era, security can’t be bounded. Adallom’s charter is Security Without Boundaries.

AEP Networks

http://www.aepnetworks.com/

AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organizations all over the world including governments, enterprises and carriers and 1,000 blue chip customers.

AEP Networks develops the highest grade security technologies tested and accredited to industry security standards, including CoCo, FIPS 140-2 Level 4 and CAPS. Its extensive portfolio of products and solutions protect the integrity of very sensitive data and are extremely reliable, survivable and resilient.

AEP Networks has also developed the industry’s first remote access Security as a Service offering , CloudProtect, aimed at Managed Service Providers and Cloud Service Providers. The offering secures remote access to the virtual data centers that Service Providers run to host their customers’ applications by securing centralized application access, whether physical or virtualized.

For more information, email us at: [email protected]

Agari

http://www.agari.com

Enterprise companies need to engage their customers. The email channel takes center stage in these digital conversations; which is exactly what cyber crime syndicates try to exploit. They leverage your brand name as a disguise to get your audience to open their malicious emails. Although your company had nothing to do with the attack, your reputation is at stake. Your customers expect you to protect them and your association with the attacks leads to brand damage, customer abandonment, and ultimately impacts your revenue. The most respected brands in the world – including Facebook, LinkedIn, Chase and Aetna – have chosen Agari Customer Protect to re-establish trust in their email channel to protect their customers from email-based attacks. Customer Protect can help you secure your email channel and ensure that every email your customer gets from you, will only be from you. Partnering with the world’s largest email providers, including Google, Microsoft and Yahoo, that cover 85% of US inboxes, Customer Protect ensures email attacks leveraging your brand will never reach your customers. When you control your email channel, you control your revenue.

The Agari cloud-based SaaS solution aggregates data from 2.5 billion mailboxes hosted by email receivers including Gmail and Yahoo! to help global brands including JPMorgan Chase, Facebook, Aetna, and UPS eliminate email threats, protect customers and their personal data, and proactively guard brand reputation. Today, Agari analyzes over 7 billion messages per day, identifies over 2 million malicious URLs per month, and blocks over 200 million malicious emails per month. Founded by the thought leaders behind Cisco’s IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security, is headquartered in Silicon Valley. Learn more at http://www.agari.com.

Agiliance

http://www.agiliance.com/

Agiliance, founded in late 2005, is the leading independent provider of Security and Operational Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance® RiskVision ™ enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, Agiliance customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance RiskVision’s configurable platform and applications, with a broad library of technology integrations, and GRC content. Agiliance RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions.

Agiliance’s Cloud Risk Management Service implements the CSA GRC Stack and Threat Matrix in RiskVision to provide an assessment and risk management toolkit for enterprises, cloud providers, security solution providers and IT auditors. At the heart of this service is Agiliance’s Common Control Framework (CCF) which maps the CSA Cloud Controls Matrix to NIST, ISO, and COBIT frameworks along with PCI and HiTech/HIPAA regulations, to output SAS 70 II and SSAE 16 reports.Customers have a broad set of product delivery options and a comprehensive set of managed and implementation services to address all phases of deployment. Customers can also access the Agiliance Cloud on Demand to provide beta product feedback, test new patches and upgrades, run proof of concepts (POCs), and provide community contributions such as workflows and reports, as well as attend half-yearly Agiliance advisory councils.

Aliyun

http://www.aliyun.com/

Established in 2009, Aliyun (Alibaba Cloud Computing) develops highly scalable cloud computing and data management services providing large and small businesses, financial institutions, governments and other organizations with flexible, cost-effective solutions to their networking and information needs. A business of Alibaba Group, one of the world’s largest e-commerce companies, Aliyun operates the network that powers Alibaba’s extensive online and mobile commerce ecosystem, and sells a comprehensive suite of cloud-computing services to support sellers and other third-party businesses participating in this ecosystem.

In 2015, Aliyun supported sales revenue of RMB 91.2 billion during T-mall 2015.11.11 Shopping Carnival, with the peak amount of transaction reaching up to 140,000 per second. In 2004, Aliyun finished sorting data of 100TB within 377 seconds, breaking 4 world records according to Sort Benchmark. In December 2014, Aliyun successfully helped one local game company resist the fiercest attack from DDoS. This incident lasted 14 hours and peak attacking traffic reached 453.8 gigabytes per second.

Today, Aliyun has more than 10 data centers around the world, including regional nodes in China (East China, North China, South China and Hong Kong), Singapore, and West Coast in the US. New data centers are also planned for West Coast in the US East Coast, Europe, Middle East, Russia and Japan.

Appian

http://www.appian.com

Appian delivers an enterprise platform for digital transformation that makes it easy for organizations to move fast and revolutionize the customer experience. Powered by industry leading Business Process Management (BPM) and Case Management capabilities, Appian’s low-code approach radically accelerates the time it takes to build and deploy powerful, modern applications, on-premises or in the cloud. The world’s most innovative organizations use Appian to revolutionize their customer experiences, transform their business operations, and master global risk and compliance. For more information, visit www.appian.com.

Armor

http://www.armor.com/

The leader in active cyber defense, Armor offers customer-centric security outcomes for retail and eCommerce enterprises, healthcare organizations, payment leaders and financial institutions. Armor protects highly sensitive data for the most security-conscious companies in the world – regardless of where the data is located. With its proven cybersecurity approach and proprietary cloud infrastructure built specifically for security, compliance and performance, responsible businesses choose Armor to reduce their risk.

athenahealth

http://www.athenahealth.com/

athenahealth is a leading provider of cloud-based practice management, EHR and patient communication services to medical groups, hospitals and health systems.

For athenahealth clients, being on a cloud-based service means benefiting from the collective clinical and payer knowledge of 29,000 providers on our growing network. This includes continuously tracking and updating payer and clinical rules, formulary requirements, and managing pay-for-performance and other quality programs to secure maximum incentives. athenahealth’s suite of integrated, cloud-based services includes:

  • athenaCollector® – a medical billing and practice management solution that reduces administrative red tape and allows medical groups to efficiently assess, plan, and improve practice performance while increasing revenue. It’s easy to use, saves time and dramatically improves the bottom line. Practices are able to track and access information on any claim, create simple, robust reports and get instant data for every business decision.
  • athenaClinicals® – a Stage 1 Meaningful Use-certified electronic health record that delivers greater clinical control and insights to medical practices while boosting efficiency and revenue potential.
  • athenaCommunicator®– automated messaging, live operator services, and a patient web portal that keeps medical groups competitive, compliant and accessible.
  • athenaCooordinator℠ – a care coordination service for order transmission, insurance pre-certification and patient registration among physicians and hospitals, surgical centers and imaging centers.

Being on a cloud-based service in the health care information technology space means we can exercise our comparative advantage to execute client work at scale, processing clinical documents, posting claims, tracking payments, and more. And it means we have constant visibility into every client’s performance, so we can monitor, benchmark and coach our clients toward peak performance.

Atlassian

https://www.atlassian.com

Atlassian unleashes the potential in every team. Our products help teams organize, discuss and complete shared work. Today Atlassian is the leading provider of collaboration software for teams at more than 51,000 companies globally, including top brands like Citigroup, eBay, Coca-Cola, Visa, BMW and NASA. We help teams at organizations of all sizes, from start-ups to large companies, and more than 75 percent of Fortune 100 companies are Atlassian customers.

Atlassian’s portfolio of products includes JIRA for team planning and project management, Confluence for team content creation and sharing, HipChat for team messaging and communications, Bitbucket for team code sharing and management and JIRA Service Desk for team services and support applications. Hundreds of third-party applications are built on top of Atlassian products and the company supports dozens of integration partners.

Atos

http://atos.net

Atos SE (Societas Europaea) is a leader in digital services with 2014 pro forma annual revenue of circa € 11 billion and 93,000 employees in 72 countries. Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Cyber-security solutions, as well as transactional services through Worldline, the European leader in the payments and transactional services industry. With its deep technology expertise and industry knowledge, the Group works with clients across different business sectors: Defense, Financial Services, Health, Manufacturing, Media, Utilities, Public sector, Retail, Telecommunications, and Transportation.

Atos is focused on business technology that powers progress and helps organizations to create their firm of the future. The Group is the Worldwide Information Technology Partner for the Olympic & Paralympic Games and is listed on the Euronext Paris market. Atos operates under the brands Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, and Worldline.

Avaya

https://www.avaya.com

Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. Avaya Breeze Platform™ enables third parties to create and customize business applications for competitive advantage. The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.

Battelle

http://www.battelle.org/

Cyber Operations and Security

Battelle works with corporate and government clients to solve some of today’s most perplexing cyber challenges and prepare for the changing cyber landscape of tomorrow. Our innovative solutions challenge conventional problem-solving approaches without sacrificing scientific integrity.

Innovations include:
* Quantum Key Distribution (QKD) communications and encryption technology and systems including installation of the first commercial QKD system in the US
* Mobile and embedded system security including vehicle-embedded systems
* Mission-focused security solutions including, BATTELLE Cantor Dust© and Battelle Ignite
* Architecture and advisory services to solve urgent and complex cyber security challenges
* Advanced products and solutions
* Cyber security for medical devices with
BATTELLE DeviceSecure™ Services

Battelle’s “Connect & Innovate” model enables real-time collaboration among government agencies, academia and industry to solve real-world operational problems in a learning lab environment and accelerate the education and development of the next-generation cyber workforce. This unique collaborative approach builds resilient, trusted networks of problem solvers that increase our national capacity to execute missions.

Learn more at www.battelle.org, by emailing solutions@battelle.org or on Twitter with @Battelle.

Bell

http://www.bell.ca/

Bell is Canada’s largest communications company, providing consumers and business customers with wireless, TV, Internet, home phone and business communications services. Bell Media is Canada’s premier multimedia company, with leading assets in television, radio, out of home and digital media. Bell is wholly owned by Montréal’s BCE Inc. (TSX, NYSE: BCE). For more information, please visit http://Bell.ca.

Bitglass

http://www.bitglass.com/

Bitglass is a “cloud access security broker” and the leader in total data protection. Bitglass enables enterprises to adopt cloud-based applications without having to sacrifice the security of their data. The company’s data protection suite delivers innovative technologies that transcend the network perimeter to deliver end-to-end data protection for the enterprise – in the cloud, on mobile devices and anywhere on the Internet. As industries like Healthcare and Finance begin adopting cloud apps, companies within them must comply with strict data protection regulations. Bitglass helps enterprises remain compliant while giving their enterprise IT teams the visibility and control they need and their employees the mobility and privacy they require. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. The company is based in Silicon Valley and backed by venture capital from NEA and Norwest.

Blue Coat Systems

http://www.bluecoat.com/

Founded in 1996, Blue Coat provides industry leading web security to more than 15,000 customers worldwide, including 88% of the Fortune® Global 500.

In 2011 Blue Coat introduced the web security module also known as ThreatPulse. ThreatPulse is a cloud-delivered service that gives you all the benefits of real-time security without the need to update appliances, servers or user desktops. This Internet-delivered security service offers complete protection against web-borne threats by leveraging Blue Coat’s proven security technology as well as the WebPulse cloud community of over 75 million users.

With extensive web application controls and granular reporting features, IT administrators can instantly create and apply new policies to all users, including roaming workers using external networks. Just as important, you can identify and categorize new web content in real time with 99+% accuracy. Blue Coat cloud service is backed by our guaranteed 99.999% uptime agreement

Bluedon

http://www.bluedon.com

Bluedon is a trusted provider of network security solution, enables organizations to simplify network security and make their online business reliable. Over 10,000 customers worldwide run systems on Bluedon’s high performance network security solutions, including China’s large state-owned enterprises, Fortune 500 companies, famous education and financial institutions and telecom operators. Bluedon is headquartered in Guangzhou in China, and has always been providing top-ranking network security products and best practice services, helping customers protect their data and information since founded in 1999. Bluedon’s products cover four categories, Security Gateway, Network Activity Audit, Security Management and Web Security. Specifically, IDS, UTM, BSM, Database Security Audit and Security Operation Center have been highly commended with outstanding performance by customers from different areas. With Bluedon’s cloud security solution, your organization enjoys productivity and flexibility that cloud brings to you. For more information, please visit http://www.bluedon.com.

Booz Allen Hamilton

http://www.boozallen.com/

Booz Allen Hamilton, a Fortune 500 company, has been at the forefront of strategy and technology consulting for more than 100 years. Today, Booz Allen is a leading provider of management consulting, technology, and engineering services to the US government in defense, intelligence, and civil markets. We also serve major corporations, institutions, not-for-profit organizations, and international clients.

Booz Allen helps clients achieve success today and address future needs by applying our expertise in such areas as systems development, cybersecurity, advanced engineering, and innovation to design, develop, and implement solutions. We attribute the strength of our client relationships, the commitment of our people, and our strong financial position to our management consulting heritage and collaborative culture. At the dawn of our second century, we continue to build on our legacy of innovative client service by investing in new and different ways to solve our clients’ toughest problems.

Box

http://www.box.com/

Box provides a secure, scalable content sharing and collaboration platform that both users and IT love and adopt, including 92% of the Fortune 500. Box’s dynamic, flexible content management solution empowers users to share and access content from anywhere, while providing IT enterprise-grade security and oversight into how content moves throughout their organizations. Content on Box can be shared internally and externally, accessed through iPad, iPhone, Android and PlayBook applications, and extended to partner applications such as Google Apps, NetSuite and Salesforce. Headquartered in Los Altos, CA, Box is a privately held company and is backed by venture capital firms Andreessen Horowitz, Bessemer Venture Partners, Draper Fisher Jurvetson, Emergence Capital Partners, Meritech Capital Partners, NEA, Scale Venture Partners, and U.S. Venture Partners, and strategic investors salesforce.com and SAP.

CaixaBank

https://www.caixabank.com/

CaixaBank is a financial group, leader within the Spanish market, comprising a banking and insurance business, as well as undertaking investments in international banks and in leading service sector companies. The Group’s essence – and what sets it apart from others – is its level of implication and unswerving commitment to society. CaixaBank is committed to banking based on corporate values of quality, confidence and social commitment. CaixaBank has the largest customer base in Spain – 14 million people – and is the main bank for 1 in every 4 Spanish customers. The bank has the most extensive network in Spain, with over 5,000 branches and nearly 9,500 ATMs, complemented by a mobile and online banking service of the highest quality.

CaixaBank is also the tenth largest bank in the Eurozone in terms of market capitalisation.

Centri

http://www.centritechnology.com/

CENTRI provides next generation data encryption and optimization solutions for the connected world. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers or mobile devices and the Internet of Things. Enterprises and governments rely on CENTRI to seamlessly protect the full lifecycle of their data – on the endpoint, in transit and in storage. For more information visit http://www.centritechnology.com/.

Centrify

http://www.centrify.com/

Centrify is the leader in securing enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 500.

CEPREI Certification Body

http://www.ceprei.org

CEPREI HQ No.110 Dongguan Zhuang RD. Guangzhou, P.R.China Telephone: +86-20-87236606 C-STAR@ceprei.org As a leading provider of management system certification body in China and the first Executive Member of CSA in Asia, CEPREI Certification Body Provides information security related professional services such as ISO20000 & ISO27001 certification, risk assessment, IT governance, Business Continuity Management etc. Also, newly launched C-STAR assessment scheme is provided to help our client fully understand cloud security issues they’re facing and how to put the appropriate controls in place. CEPREI Certification Body with unique legal status is a registrar authorized and accredited by national department and/or accreditation bodies home and abroad, to conduct third-party certification. It grew out of Inspection Division of China Electronic Product Reliability and Environmental Research Institute (the Fifth Electronic Institute) established in 1956, which is the first scientific research organization at national level engaged in product quality and reliability research in China. As early as 1979, CEPREI Certification Body introduced the concept of Certification into China. Ever since then CEPREI has issued more than ten thousand certificates of various types to its clients. It sets foot in all administrative regions in mainland China and other countries and regions including Hongkong Special Administration Region, Taiwan, USA, German, Holland, Denmark, Australia, Japan, Korea, Malaysia, Thailand and Singapore. As one of the most authoritative accreditation bodies in the world, America National Standard Institute-Registrar Accreditation Board (ANAB) has authorized CEPREI Certification Body to issue ISO9000, ISO14000 and ISO27001 certificates with ANAB logo since 2001. The certificate will be helpful for your products and services in improving reputation and enhancing competitiveness home and abroad.

Certes Networks

http://certesnetworks.com

Certes Networks protects data in motion. The company’s award-winning CryptoFlow™ Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any infrastructure without compromising network device or application performance. Companies around the world rely on network encryption products from Certes Networks to protect data, accelerate application deployment, simplify network projects, reduce compliance costs, and improve the return on investment in IT infrastructure.

For more information, visit http://certesnetworks.com.

Email: info@certesnetworks.com
Tel: 1-412-262-2571

CipherCloud

http://www.ciphercloud.com/

CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive data discovery, protection – search strong encryption, tokenization, data loss prevention, key management, and malware detection – and activity and anomaly monitoring services.

CipherCloud has experienced exceptional growth and success with over 2.6 million business users, across 25 countries, and in more than 11 industries.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as salesforce.com, Box, and Microsoft Office 365.

CipherCloud, named as SC Magazine’s 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud

Citrix

http://www.citrix.com/secure

Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control.

Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device.

With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.

Clearmanage

http://clearmanage.com/

Clearmanage is a cloud computing and cloud security service provider, with more than 8years’ experience specializing in providing cloud services, cloud infrastructure and hosting, and advance security solution and services for government and enterprises.

Clearmanage worked with our reseller partners,to provide secure IaaS, PaaS and SaaS Cloud Service and security cloud services to government agencies for more than 6years. We have been the team behind several Singapore government Cloud Service bulk tender withour partners.Some of our commercial cloud service partners leverage on our solution and infrastructure to provide innovative cloud services to their clients.

We operate across multiple data centers, which includes Uptime Institute certified Tier III certified data center,to ensure reliability and continuity. We are one of the first in Singapore to be certified for SS 584 MTCS level 3, capable of hosting client with sensitive information & highly confidential business data, and we are certified for ISO 27001:2013 and CSA Star Gold.

Contact your favorite IT partners to learn more about our service or contact us at info@clearmanage.com.

CloudLock

http://www.cloudlock.com/

CloudLock is a leading cloud data security company that provides enterprise class solutions designed to give organizations control over their data in the public cloud, without invasive in-band technology, complicated overhead, or unanswered regulatory risk. Many of the world’s largest companies and institutions trust CloudLock’s approach of directly integrating with their SaaS applications, which makes robust security controls immediately available at a fraction of the cost and complexity of other alternatives.

CloudLock helps organizations:

  • Extend their DLP policies to SaaS applications such as Google Apps and Salesforce
  • Implement a robust discovery/classification/control security framework in the public cloud
  • Enforce the principles of people-centric security, greatly reducing their risk of data exfiltration or breach without driving users into unsanctioned (often called “shadow IT”) systems
  • Apply risk appropriate controls, including selective encryption, across their most sensitive data

For more information, please visit us at cloudlock.com

CloudPassage

http://www.cloudpassage.com/

CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company’s Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.

Coalfire

http://www.coalfire.com/

Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Coalfire’s approach addresses each businesses’ specific vulnerability challenges, developing a long-term strategy to prevent security breaches and data theft. Coalfire provides advisory and assessment services for cyber security and compliance in DoD SRG, FISMA/FedRAMP, HIPAA/HITRUST, PCI DSS, PCI PA-DSS, ISO 27001, SOC and technical testing services such as penetration testing, social engineering and forensics. Coalfire has offices throughout the United States and Europe.

CradlePoint

https://cradlepoint.com/

CradlePoint solutions are part of the leading-edge 4G networks in the world. Our complete networking and cloud-management solutions help enterprises deliver better ROI and lower-cost of management. Regardless of the application, CradlePoint is delivering greater network security, better management, and better value than any other available systems on the market.

CradlePoint is the leading provider of cloud-managed 3G/4G LTE networking solutions for distributed enterprises. CradlePoint solutions provide uncompromised mobile broadband performance while delivering proven network system interoperability. CradlePoint’s broad family of high-performance routers are designed for deployment in mission-critical applications that require 24×7 connectivity. With both integrated wireless WAN and non-integrated versions, the solutions are ideal for distributed operations and emerging industries that require either remote connectivity or multi-WAN redundancy.

Founded in 2006, CradlePoint has shipped nearly a million devices and offers products certified and promoted by major worldwide carriers.

Cryptzone

https://www.cryptzone.com/

Cryptzone secures the enterprise with dynamic, context aware security solutions that protect critical services, applications and content from internal and external threats. For over a decade, enterprises have turned to Cryptzone to galvanize their Cloud and network security with responsive protection and access intelligence. More than 450 public sector and enterprise customers, including some of the leading names in technology, manufacturing and consumer products trust Cryptzone to keep their data and applications secure.

Learn more at www.cryptzone.com, email info@cryptzone.com or follow us @Cryptzone.

Datapipe

http://www.datapipe.com/

Datapipe offers a single provider solution for managing and securing mission-critical IT services, including cloud computing, infrastructure as a service, platform as a service, colocation and data centers. Datapipe delivers those services from the world’s most influential technical and financial markets including New York metro, Silicon Valley, London, Hong Kong and Shanghai.

Datapipe combines extensive Managed Services experience with Amazon Web Services elastic infrastructure, and our own Stratosphere(tm) virtualization offerings to develop industry-leading enterprise cloud computing solutions. When professionally engineered and optimized, cloud computing delivers unprecedented power. Our customized cloud solutions focus on your unique needs to leverage the flexibility, cost savings and processing power of the cloud when you need it, where you need it, how you need it – while freeing up valuable personnel and resources.

For more information about Datapipe visit www.datapipe.com or call 1-877-773-3306.

DBAPPSecurity

http://www.dbappsecurity.com.cn

2007 in Fremont of California, the company now has many branches with its national sales networks in many cities, such as Hongkong and Shanghai, Beijing in China. We provide products and services to 1000 customers across all industries, including many Fortune 500, large and middle-sized organizations. Since 2009, the DBAPPSecurity Ltd., a Leading company focusing on Web Application security and database security technologies. Founded in company’s revenue has being grown more than 50% per year.

DBAPPSecurity focuses its efforts on research and development and has a professional team with years of experience in developing and implementing data security and web application security solutions. The company owns some of the world leading technology patterns, and is dedicated to offer web application security and database security solutions. DBAPPsecurity’s customers include government organizations as well as leading companies from various industries such as finance, energy, education, medical and e-commerce industry.

Digi International

http://www.idigi.com/

Digi International (www.digi.com) is making wireless M2M easy by developing reliable products and solutions to connect and securely manage local or remote electronic devices over the network or utilizing our cloud technology; the iDigi Device Cloud. The iDigi Device Cloud is the intelligent platform choice for today’s and tomorrow’s device application solutions within any industry. Designed by a team with decades of experience in device network solutions, the iDigi Device Cloud provides the reliability, scalability, performance and security your solution needs

For more information, visit the iDigi Web site at www.idigi.com, or call 877-912-3444.

Digiware S.A

http://www.digiware.net/

Digiware S.A. is the expert provider of comprehensive strategies generation in information security for America. With 20 years of experience, it protects organizations against security risks involved technological growth; in turn, aware of the enormous challenge facing the areas of information security today rests on the definition, implementation and maintenance of strategic programs for information security, that integrate with business objectives.

Proactive protection Digiware S.A., under the model of Resources of Security Intelligence – RIS, provides the visibility needed to boards, governing bodies, personal risk, operational, technological and security, to deal with the risks of dynamic information.

Dimension Data

http://cloud.dimensiondata.com/

Dimension Data accelerates the ambitions of its clients by delivering exceptional value through its great people. As an organization we’re inspired by teamwork, innovation, diversity, and integrity. We’re driven by professional excellence and always place our clients at the centre of everything we do. As a global leader in the provision and management of specialist IT infrastructure solutions and services, let us bring your ambitious ideas to life and accelerate your success.

DocuSign

https://www.docusign.com/

DocuSign®, The Global Standard for Digital Transaction Management™,automates manual, paper-based processes with the only open, independent, standards-based DTM platform for managing all aspects of documented business transactions. DocuSign helps companies Keep Business Digital™ with industry-leading identity management, authentication, eSignature, forms/data collection, collaboration, workflow automation, payment collection, and cloud storage. DocuSign accelerates transactions for dramatic ROI, improved security and compliance, and better customer experiences with the easiest, fastest, most secure global network for sending, signing, tracking, and storing documents in the cloud. DocuSign helps companies securely collect information and payments, automate workflows, and transact business anytime, anywhere, on any device.

Dropbox

https://www.dropbox.com/

Millions of people trust Dropbox to easily and reliably store, sync, and share their documents, photos, and videos across devices and platforms. Dropbox for Business helps organizations around the world collaborate effectively and increase productivity. And it brings IT admins the functionality, controls, and visibility they need to ensure the safety of their company data. Dropbox has been designed to keep users’ data safe, employing a sophisticated infrastructure, enterprise-grade security, layers of encryption, and detailed security, privacy, and compliance policies and procedures. To learn more about Dropbox for Business, www.dropbox.com/business.

Duo Security

https://www.duo.com

Duo Security is a cloud-based trusted access provider protecting the world’s fastest-growing companies and thousands of organizations worldwide, including Dresser-Rand Group, Etsy, NASA, Facebook, K-Swiss, The Men’s Wearhouse, Paramount Pictures, Random House, SuddenLink, Toyota, Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at www.duo.com.

Elastica

http://elastica.net/

Elastica is the innovator of Data Science Poweredtm Cloud Application Security. Its CloudSOCtm solution empowers the elastic enterprise, and enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. Elastica Apps on extensible CloudSOCtm platform today offer cloud audit for Shadow IT, granular transaction visibility, threat detection, security controls and post-incident forensic analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. Learn more about Elastica at http://www.elastica.net.

Ericsson

http://www.ericsson.com/

Ericsson is the world’s leading provider of communications technology and services. We are enabling the Networked Society with efficient real-time solutions that allow us all to study, work and live our lives more freely, in sustainable societies around the world.

Our offering comprises services, software and infrastructure within Information and Communications Technology for telecom operators and other industries. Today more than 40 percent of the world’s mobile traffic goes through Ericsson networks and we support customers’ networks servicing more than 2.5 billion subscribers.

We operate in 180 countries and employ more than 100,000 people. Founded in 1876, Ericsson is headquartered in Stockholm, Sweden.

Evident.io

http://evident.io/

Evident.io delivers a Security-as-a-Service platform to simplify the management of risk, compliance, and threat-detection in cloud-computing environments. We democratize the security capabilities of the billion-dollar cloud companies, and make them accessible to the cloud adopters of every size and industry. The Evident platform continuously evaluates your cloud resources to detect changes in risk, compliance, and security posture — delivering the transparency and control you need to defend against today’s pervasive security threats. Our customers range from the very early startup with no dedicated security staff, all the way up to the Fortune 500 businesses with multi-million dollar security budgets. One message has been consistent: cloud security needs a continuous solution — and that solution is Evident.

EY CertifyPoint

http://www.ey.com/certifypoint

EY CertifyPoint HQ Antonio Vivaldistraat 150 1083 HP  Amsterdam The Netherlands certifypoint@nl.ey.comhttp://www.ey.com/certifypoint International offices Founded in 2002, EY CertifyPoint is an accredited independent and impartial certification institute with experienced auditors all over the world certifying some of the top international organizations. Being related to the global EY organization, EY CertifyPoint is able to provide you with a local contact person in nearly every country world-wide. For more information, please visit http://www.ey.com/certifypoint.

Fischer International

http://www.fischerinternational.com/

With a nearly 30 year heritage in shaping the enterprise security industry, Fischer continues its history of technology leadership and innovation by bringing to market a cloud-based Identity Services Platform that truly simplifies Identity Management, scales seamlessly from the SMB to the largest enterprise, and can be implemented either as a traditional software-as-a product deployment or via any outsourced delivery model. Fischer’s solutions provide organizations of all sizes with greater choice in how they derive the benefits of Identity Management, but without risk or compromise. For more information, please visit: www.fischerinternational.com

Fishtech Labs

http://fishtechlabs.com

Fishtech Labs is a technology accelerator focused on finding and creating solutions for our clients that deliver operational efficiencies and improved security posture. So you don’t have to be, we are immersed in the changing security and emerging technology landscape specific to Cloud, IoT, SDN, and Virtualization. We identify gaps and appropriate solutions for our clients’ maximum advantage. As innovation experts, our team takes a consultative approach to evaluate each client’s objectives, benefits, and risks that may be mitigated with next-generation solutions. For more information, visit us at http://fishtechlabs.com or contact us by email at info@fishtechlabs.com

Five9

http://www.five9.com/

Five9, a provider of cloud contact center software, brings the power of the cloud to thousands of customers worldwide and facilitates more than three billion customer interactions annually. Since 2001, Five9 has helped organizations of every size transition from premise-based software to the cloud. With extensive expertise, technology, and an ecosystem of partners, Five9 helps businesses take advantage of their secure, reliable, scalable cloud contact center software to create exceptional customer experiences, increase agent productivity and deliver tangible business results. The purpose-built, highly scalable and secure Five9 Virtual Contact Center cloud platform delivers a comprehensive suite of easy-to-use applications that enable the breadth of contact center-related customer service, sales and marketing functions. For more information, visit www.five9.com.

Fortinet

http://www.fortinet.com/

Fortinet (NASDAQ: FTNT) is a worldwide provider of network security solutions and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threatswhile simplifying the IT security infrastructure. We offer both virtual and physical appliances to protect public, private, and hybrid clouds, as well as virtual domain security for multi-tenant environments.

Fortinet has the cloud-ready technologies to help you create a secure cloud. Whether you are a cloud hosting provider, cloud service provider, orlarge enterprise, Fortinet physical and virtual appliances provide the technology you need to help you protect your virtualized environment. You can deploy a fully IPv6-ready, flexible, multi-tenant security platform that can evolve and scale effortlessly along with your user base and business plans.

Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2011 Fortune Global 100. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.

FTI Technology

http://www.ftitechnology.com/

FTI Technology helps clients manage the risk and cost of e-discovery with confidence. From forensic data collection to fully managed document review services, we collaborate with our clients to deliver strategic solutions tailored to their unique legal requirements. With keen focus on the productivity and defensibility of document review, our clients rely on us to cost-effectively handle matters ranging from internal investigations to large-scale litigation with global e-discovery requirements.

Best known for its market-leading scalability and performance, Ringtail® software equips legal teams with powerful review and analysis capabilities, the ability to search across millions of documents in seconds, and the most flexible production capabilities available. And Ringtail is the only document review platform featuring both linear and visual review tools to dramatically improve the speed and consistency of review teams. Ringtail SaaS is built to deliver the promised efficiency and savings of cloud computing while meeting the unique legal requirements of e-discovery transforming the way e-discovery projects are managed.

Our electronic discovery professionals understand the technical intricacies and legal implications of data preservation and collection as well as the international protection and privacy issues that apply to electronic documents in these contexts. We can help design and implement defensible strategies to preserve, collect and analyze electronically stored information (ESI) regardless of format, language or location.

For more information visit www.FTITechnology.com/saas

Fujitsu

http://www.fujitsu.com

As the world’s third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents.

For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu’s IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu’s White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security.

As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/

Google

http://www.google.com/apps/intl/en/business/infrastructure_security.html

Google’s cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements.

For more information, please visit http://www.google.com/apps/intl/en/business/index.html

Herjavec Group

http://www.herjavecgroup.com/

Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity solutions and services to enterprise organizations. Herjavec Group delivers SOC 2 Type 2 certified managed security services globally supported by a state-of-the-art, PCI compliant, Security Operations Centre (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with leadership positions across a wide range of functions including consulting, professional services & incident response. Herjavec Group has offices globally including head offices in Toronto (Canada), New York City (USA), Reading (United Kingdom) and Sydney (Australia).

Herjavec Group’s Managed Security Services practice defends enterprise level organizations globally from increasingly sophisticated, targeted cybercrime threats. Core managed services include: Security Information and Event Management, Intrusion Prevention and Detection, Application Security, Next Generation Firewall Management, Endpoint Protection, Data Loss Prevention, Web Proxy and URL Filtering and Vulnerability Management. Herjavec Group’s managed security service practice relies on two custom built technology pillars:

Herjavec Group Threat Framework – The Threat Framework allows dynamic and evolving threat modelling to be applied within any organizational environment. Herjavec Group focuses on meaningful security use cases to proactively identify attacks by applying the Framework to onboarded technologies & threat intelligence products in the customer’s environment. The Threat Framework covers key attack categories including Authentication, Targeted Attacks, Malware, DDOS and Traffic Anomalies.

Herjavec Group’s Analytics Platform – Herjavec Group’s Analytics Platform filters threat intelligence and customer data into actionable, relevant alerts. Alerts enriched using Herjavec Group’s Threat Framework are processed through the Platform, which automatically performs additional enriching functions including IP reputation look up, geo mapping, alert trending & deduplication, prior to preparing a readable output for Herjavec Group’s security analysts to review and action accordingly.

For more additional information or to engage a security specialist please visit www.herjavecgroup.com

Hewlett Packard Enterprise

https://www.hpe.com/

HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible. HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits. With 90+ learning centers worldwide, numerous partner facilities and customer’s onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements. Visit HP: www.hp.com/learn Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video

Huawei

http://www.huawei.com/en/

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world’s population.

Huawei’s vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.

IBM

http://www.ibm.com/security

IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM’s capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: – understand threats and vulnerabilities in terms of business impact – respond to security events with security controls that optimize business results – prioritize and balance your security investments. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today’s business climate. IBM’s cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.

ID Quantique (IDQ)

http://www.idquantique.com/

ID Quantique (IDQ) is the world leader in quantum-safe crypto solutions designed to protect data for the long-term future. The company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution solutions and services to the financial industry, enterprises and government organisations globally. IDQ also commercializes a quantum random number generator, which is the reference in the gaming and lottery industries. Additionally, IDQ is a leading provider of optical instrumentation products; most notably photon counters and related electronics. The company’s innovative photonic solutions are used in both commercial and research applications.

Imperva

http://www.imperva.com/

Imperva® (NYSE:IMPV), is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. The Imperva Application Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the-minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. Learn more: http://www.imperva.com, our blog, on Twitter.

The Imperva Skyfence Cloud Gateway is a cloud access security broker that provides visibility and control over sanctioned and unsanctioned cloud apps. Organizations can discover SaaS applications in use and assess related risks, enforce controls to prevent account-centric threats, meet compliance requirements, and protect user accounts and data in the cloud.

Imperva Incapsula is a cloud-based application delivery service that protects websites and increases their performance, improving end user experiences and safeguarding web applications and their data from attack. Incapsula includes a web application firewall to thwart hacking attempts, DDoS mitigation to ensure attacks don’t impact online business assets, a content delivery network to optimize and accelerate web traffic, and a load balancer to maximize the potential of web environments.

Informatica

https://www.informatica.com/

Informatica is a leading independent software provider focused on delivering transformative innovation for the future of all things data. Organizations around the world rely on Informatica to realize their information potential and drive top business imperatives. The Informatica Platform is an intelligent data platform, which includes data integration, data quality, master data management, data archiving and data security capabilities, to empower customers to transform raw, possibly unsafe, data into great data for more accurate insights and more effective decisions. More than 5,800 enterprises depend on Informatica to fully leverage their information assets residing on-premise, in the Cloud and on the internet, including social networks. For more information, call +1 650-385-5000 (1-800-653-3871 in the U.S.), or connect with Informatica at LinkedIn, @Informatica on Twitter and Facebook.

Information Services Group

http://www.isg-one.com/

Information Services Group (ISG) (NASDAQ: III) is a leading technology insights, market intelligence and advisory services company, serving more than 500 clients around the world to help them achieve operational excellence. ISG supports private and public sector organizations to transform and optimize their operational environments through research, benchmarking, consulting and managed services, with a focus on information technology, business process transformation, program management services and enterprise resource planning. Clients look to ISG for unique insights and innovative solutions for leveraging technology, the deepest data source in the industry, and more than five decades of experience of global leadership in information and advisory services. Based in Stamford, Conn., the company has more than 700 employees and operates in 21 countries. For additional information, visit www.isg-one.com.

Infosys

http://www.infosys.com/

Infosys is a global leader in consulting, technology and outsourcing solutions with US$8.25 billion in annual revenues and 160,000+ employees. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. Infosys has a dedicated Enterprise Security & Risk Management (ESRM) unit with strong credentials in Security consulting and implementation services using majority of the industry’s leading products. Infosys’ security services spans across all aspects of Information Security & Compliance for enterprises including Governance, Risk Compliance (SOX/BASEL2/ HIPAA, PCI etc.), Identity & Access Management, Infrastructure security (Endpoint security, Network, Ethical hacking, Penetration testing etc.) and Application and Data security. Infosys has 1000+ consultants in Enterprise Security space. Infosys Cloud Security service offerings consists of a broad range of services tailored to suit the specific client context. It enable clients adopt Cloud and leverage the benefits of Cloud in a secure manner. Our Cloud Security services caters to private, public or hybrid cloud platforms and provides defense in depth security posture by applying relevant security controls across perimeter, internal network, endpoint devices, applications and data layers. Infosys also offers Managed Security Services through a highly flexible and customizable Security Operations Center (SOC) for managing and monitoring Cloud security. For further details you can contact savitrim@infosys.com

Inspur

http://en.inspur.com/

As a leading total solution and service provider of cloud computing, Inspur is capable of providing total solution at IaaS, PaaS and SaaS levels. With high-end servers, mass storages, and cloud operating system and information security technology, Inspur offers advanced cloud computing infrastructure platform for its customers. Based on Inspur’s information softwares for government, enterprise and industry, as well as terminal products and solutions, this platform provides comprehensive support to the construction of smart government, and enterprise cloud and vertical industry cloud.

InstaSafe Technologies Pvt Ltd

http://www.instasafe.com

Instasafe Technologies (www.instasafe.com) is a leading Cloud based Security-as-a-Service solution provider delivering comprehensive and uncompromising protection to mobile and remote workers enabling them to safely and securely access enterprise apps, email and web from anywhere on any network. Instasafe’s flagship product, Instasafe Secure Access (ISA) offers a hardware free, zero configuration, self-service style, fully redundant, Security-as-a-Service solution that can be deployed in minutes and scaled instantly as per customer requirement.

Instasafe Web Security (IWS) offers a hardware free, cloud based security solution that is easy to deploy and manage, is scalable and helps you control your bandwidth consumption while protecting your organisation from web threats.

For more information, visit http://www.instasafe.com.

Intel Security

http://www.mcafee.com/us/

Intel Security is comprised of a portfolio of client & data center cloud security products that use API Management at the cloud edge and trusted execution technology within the datacenter to provide a secure client to cloud connection. Learn more about Intel & McAfee’s cloud security products at www.mcafee.com.

Juniper Networks

http://www.juniper.net/us/en/

At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.

The network plays a central role in addressing the critical challenges we face as a global community. Consider the healthcare industry, where the network is the foundation for new models of mobile affordable care for underserved communities. Or the energy sector, where the network is helping to accelerate distribution of clean, renewable sources of energy. In education, the network continues to expand access to quality teaching resources, so that people of every socioeconomic background have a chance to educate themselves and participate in the global economy. At its core, the network has become a platform—one that transforms how we interact with our government institutions, conduct business on a daily basis, and connect with our family and friends.

Every day, Juniper Networks is helping our customers build the best networks on the planet. Every innovation we envision, every technology we create is informed by our desire to help solve our customers’ toughest challenges so they can compete and thrive today and into the future.

KPMG

http://www.kpmg.com

KPMG LLP is an audit, tax and advisory services firm that specializes in delivering business, technical, regulatory/tax, assurance, security, and management guidance to clients considering the cloud.

LivePerson

http://www.liveperson.com/

With over 18,000 clients, LivePerson is the global leader in intelligent online customer engagement.

Chat is great. It’s even better when paired with personalized content at every step of the customer journey…which boosts sales and increases your bottom line.

From financial services to the healthcare industry, from mom-and-pop shops to the world’s leading brands, anyone can use LivePerson to help customers, convert site visitors, and bolster sales.

LockPath

https://www.lockpath.com/

LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC) and information security (InfoSec) software. The company’s flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. LockPath serves a client base of global organizations ranging from small and midsize companies to Fortune 10 enterprises in more than 15 industries. The company is headquartered in Overland Park, Kansas. For more information on LockPath and the Keylight platform, visit lockpath.com. Follow LockPath on LinkedIn and on Twitter at @LockPath and @KeylightGRC for the latest in industry, company and product news.

McKesson

http://www.mckesson.com/en_us/McKesson.com/

McKesson is dedicated to delivering the vital medicines, supplies and information technologies that enable the health care industry to provide patients better, safer care.

McKesson is made up of many businesses, all serving the health care industry. Our businesses fall into one of two primary categories:

Distribution solutions. We are the largest pharmaceutical distributor in North America, distributing one-third of the medicines used every day. We supply more than 40,000 U.S. pharmacy locations, from Wal-Mart to the Department of Veterans Affairs to community pharmacies and hospitals.

Technology solutions. We develop and install health care information technology systems that eliminate the need for paper prescriptions and paper medical records. Our software and hardware are used in more than 70% of the nation’s hospitals with more than 200 beds.

MetricStream

http://www.metricstream.com/

MetricStream is a market leader in enterprise-wide Governance, Risk, Compliance (GRC) and Quality Management Solutions. MetricStream solutions are used by leading global corporations in diverse industries such as Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-tech and Manufacturing to manage their risk management programs, quality management processes, regulatory and industry-mandated compliance and other corporate governance initiatives. MetricStream’s customers include Procter & Gamble, UBS, Societe Generale, Pfizer, Philips, Cummins, Kellogg’s, Mondelez International, SanDisk, and NetApp. MetricStream also owns and operates www.ComplianceOnline.com portal – the largest GRC advisory network and one of the largest GRC communities. MetricStream is headquartered in Palo Alto, California, USA (www.metricstream.com).

Microsoft

http://www.microsoft.com/cloud

Microsoft provides the most comprehensive approach to cloud computing, so that you can harness the full power of the cloud on your terms. Whether in your datacenter, with a service provider, or from a Microsoft’ datacenter and whether in a private cloud using HyperV™, a public cloud with Windows Azure™, or software as a service environment with Office365 Microsoft provides the flexibility and control to consume IT as a service in a way that best meets your unique business needs. Visit www.microsoft.com/cloud to find out more.

nCircle

http://www.ncircle.com/

nCircle is the leading provider of IT risk and security performance management solutions. Organizations of all sizes use nCircle solutions to automate compliance, reduce risk and achieve higher levels of security and operational efficiency. nCircle has won numerous awards for growth, innovations, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information is available at www.ncircle.com, http://benchmark.ncircle.com, and http://purecloud.ncircle.com.

NetApp

http://www.netapp.com/

NetApp creates innovative storage and data management solutions that accelerate business breakthroughs and deliver outstanding cost efficiency. Our dedication to principles of simplicity, innovation, and customer success has made us one of the fastest-growing storage and data management providers today. Customers around the world choose us for our “go beyond” approach and broad portfolio of solutions for server-to-storage virtualization, business applications, data protection, and more. Our solutions provide nonstop availability of critical business data and simplify business processes so companies can deploy new capabilities with confidence and get to revenue faster than ever before. Discover our passion for helping companies around the world go further, faster at www.netapp.com.

Netskope

http://www.netskope.com/

Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.

Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.

NetWitness

http://www.netwitness.com/

NetWitness helps organizations in over 160 countries dramatically improve their ability to defend against advanced threats. NetWitness NextGen is the only network monitoring product on the market today that allows users to: analyze and model hundreds of terabytes of live network traffic in real-time; generate automated, comprehensive analyses that can be easily understood by both cyber analysts and non-technical personnel, and integrate third party threat feeds and create actionable network intelligence. Based upon a dedicated and extensible full packet capture and session analysis infrastructure that can be used within enterprise cloud and virtual environments, NextGen performs both rules-based and interactive session analysis across the entire network protocol stack, up to the application layer. NetWitness NextGen is designed for organizations to address concurrent problems of insider threat management, data leakage protection, network forensics and incident response, compliance verification, network e-discovery, designer malware and zero-day threat detection. NetWitness customers include Defense, National Law Enforcement and Intelligence Agencies, Top US and European Banks, Critical Infrastructure, and Global 1000 organizations. NetWitness has offices in the U.S. and the U.K., and partners throughout North and South America Europe, the Middle East, and Asia. Download a freeware version of NetWitness and see what you’ve been missing on your network: http://download.netwitness.com.

New Relic

http://newrelic.com/

New Relic is a software analytics company that makes sense of billions of metrics about millions of applications in real time. New Relic’s comprehensive SaaS-based solution provides one powerful interface for web and native mobile applications and consolidates the performance monitoring data for any chosen technology in an environment. There are thousands of active customer accounts using New Relic’s cloud solution every day to optimize more than 200 billion metrics for 3 million applications. New Relic is pioneering a new category called Software Analytics.

New World Telecom

http://www.newworldtel.com

New World Telecommunications Limited (NWT), a member of New World Development Company Limited (HK Stock Code: 17), is a pioneering telecom service provider in Hong Kong. Being a customer-focused company, NWT is dedicated to offering top-quality international voice and innovative data services for its customers in Hong Kong and overseas.

NWT’s Cloud Enterprise Solution (CES) is an Infrastructure-as-a-Service (IaaS) to virtualise IT or network resources on a cloud computing platform and perform multiple applications. Our CES is a perfect integration of state-of-the-art facilities and equipments, carrier-grade network and connectivity, professional network supports and monitoring, as well as many ready-to-use or customized features.

Our Cloud Computing Services obtained both ISO/IEC 20000-1:2011 and ISO/IEC 27001:2005 certifications, offering customers high quality services that meet international standards.

For details, please visit http://www.newworldtel.com.

Nixu

http://www.nixu.com/

Nixu Corporation is a cybersecurity company. We work to improve our clients’ cybersecurity in solution areas of Corporate IT, Digital Business and Industrial Internet. Our clients trust Nixu in projects where developing, implementing or assessing of information security is a must. We ensure the confidentiality of our clients’ data, business continuity and ease-of-access to digital services through planning and mitigation of cybersecurity risks.

Blog: http://www.nixu.com/blog
Twitter: @nixutigerteam

Nokia

http://www.nokia.com

Nokia is a global leader in the technologies that connect people and things. Powered by the innovation of Nokia Bell Labs and Nokia Technologies, the company is at the forefront of creating and licensing the technologies that are increasingly at the heart of our connected lives.

With state-of-the-art software, hardware and services for any type of network, Nokia is uniquely positioned to help communication service providers, governments, and large enterprises deliver on the promise of 5G, the Cloud and the Internet of Things.

Novell

http://www.novell.com/home/

With over 20 years of experience, Novell is a leader in identity management and security solutions. Novell delivers a web-based identity and access management solution that is based on open standards. Novell’s solution provides out-of-the-box integration with leading enterprise identity stores, comprehensive compliance reporting of all user activity, centralized just-in-time provisioning and much more.

For security specifically, Novell offers an innovative web-based security service for Cloud Providers e.g. Saas applications more secure and manageable for the enterprise. It extends beyond simple sso functionality to provide enterprises the ability to extend their identities, policies, audits and workflow from the enterprise to the cloud infrastructure.

NSFOCUS

http://www.nsfocus.com/

NSFOCUS is a leading provider of vulnerability assessment, Web Application Firewall (WAF), Network Intrusion Prevention System (NIPS), Anti-DoS, content security gateway, and etc. Powered by its 10+ years of security vulnerability research, NSFOCUS has been the major contributor of security vulnerability research at the industry by freely sharing and resolving over tens vulnerabilities from critical applications.In conjunction with security hardware appliances and software, NSFOCUS has been delivering security services through Security As A Service (SaaS), including web reputation service, vulnerability assessment, Anti-DDoS and etc. Its customers come from government, finance, telco operators, ISP, power providers, etc.

NTT I³

http://www.ntti3.com/

NTT Innovation Institute Inc. (NTT I³, pronounced NTT I Cube) is a new R&D center of NTT Group, the global leader of information and communication technology (ICT) services. NTT I³ aims to accelerate the global development of the NTT Group, through open innovation, by leveraging its Silicon Valley location and tapping into the rich talent pool of the valley. Our best practices in North America will be formulated into modular intellectual properties and rolled out globally, to NTT’s Global marketplace.

Currently, NTT I³ focuses on “Global Cloud Services” as the cornerstone of NTT’s business operations. NTT I³ is developing modularized intellectual properties based on a deep understanding and analysis of the latest market needs in the areas of security and cloud computing. These intellectual properties are designed to best satisfy various, ever-evolving market needs in a globally scalable and cost competitive manner.

Carrying on the world renown NTT R&D heritage, NTT I³ strives to set a new global standard of agility, quality, and value creation in pursuit of open service innovation.

Okta

http://www.okta.com/

Okta is an enterprise grade identity management service that is built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta enterprises can simply and securely manage access to cloud, mobile and on premises applications across employees, partners and customers.

Accessible via an intuitive, consumer Web interface or a broad set of RESTful web services, Okta provides directory services, single sign-on, strong authentication, provisioning, workflow, and analytics as a complete, integrated solution. Okta offers identity management from the cloud on a secure, reliable, SOC2 Type II audited platform that covers all of the applications, directories, identity systems, devices, organizations and people that are a part of today’s IT reality. Whether it is in the cloud, on a mobile device, or behind your firewall Okta’s got it covered.

Enterprises everywhere including Activision, Allergan, BMC Software, Comcast, Colorox, Groupon, Informatica, LinkedIn, Purolator, Shortel and SAP are using Okta to increase security, improve user productivity, reduce IT costs, and ensure compliance.

The Okta team has built and deployed many of the world’s leading on-demand and enterprise software solutions from companies including Salesforce.com, PeopleSoft, Microsoft, BMC, Arcsight, Sun, and HP. Okta is backed by premiere venture investors Andreessen Horowitz, Greylock Partners, and Khosla Ventures.

OnBase

http://www.onbase.com/OnBaseCloud

For more than 20 years, Hyland has been dedicated to meeting organizations’ needs for document and process management with OnBase, an enterprise content management (ECM) solution. As OnBase has evolved through consistent product innovation, it remains focused on automating business processes that depend on documents, content and people to operate more effectively. OnBase is the pioneer of ECM in the cloud. Since 2000, the OnBase Cloud has been empowering more than 600 organizations around the world to better manage the content that surrounds their processes. The OnBase Cloud connects people to the content, data and processes they need to make more informed decisions – without additional infrastructure needs. Employee productivity increases as they spend less time searching for paper and dedicate more time to providing quality service to customers. For more information about OnBase cloud-based and hosted solutions, please visit www.onbase.com/OnBaseCloud

OneLogin

http://www.onelogin.com/

OneLogin is the innovator in enterprise identity management and provides the industry’s most comprehensive solution for managing user identities in the cloud and behind the firewall. Unique capabilities like Federated Cloud Search and OneLogin for iPad extend the genius of single sign-on (SSO), break down SaaS data silos, and increase productivity. OneLogin comes pre-integrated with more applications, authentication methods, directories, VPNs and SAML tools, so you can get up and running in minutes with no professional services required. IT regains control over web application access, LOB owners quickly on- and off-board team members, and end-users enjoy easy access to all their apps. OneLogin has over 700 customers in 35 countries across the globe. Try our free forever plan with three cloud apps and an unlimited number of users. This plan includes single sign-on for web, mobile and iPad, directory integration, and multi-factor authentication. http://www.onelogin.com/signup/

Palerra

https://www.palerra.com/

Palerra designed LORIC to provide continuous compliance, threat visibility, and incident response for an organization’s entire cloud footprint (SaaS, PaaS, and IaaS) in a single platform. It automates all steps of the security lifecycle to enable organizations to keep pace with the rapidly increasing volume of cloud usage as well as the velocity of change in the threat landscape. LORIC does so without any hardware or software, and does not impact the native user experience for cloud usage. Palerra is a privately held company funded by Norwest Venture Partners and Wing Venture Partners. It is headquartered in Santa Clara, CA. Learn more at https://www.palerra.com/ and continue the conversation on Twitter at @palerrainc

Palo Alto Networks

http://www.paloaltonetworks.com/

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.

Perspecsys

http://www.perspecsys.com/

The Perspecsys Cloud Data Protection Gateway allows organizations to protect their sensitive business data when using popular cloud applications such as Oracle CRM On Demand and salesforce.com. Any information that leaves an enterprise’s environment and enters the cloud can be tokenized or encrypted (using strong FIPS 140-2 encryption modules), ensuring that data remains undecipherable when it is being processed or stored in the cloud. Companies use Perspecsys to ensure compliance with Data Residency regulations or to satisfy requirements associated with sector specific regulations such as PCI DSS, HIPAA, SARBOX, and GLBA. A key benefit of the solution is its ability to preserve end-user functionality, such as the ability to Search or Sort, on data-fields that have been tokenized or encrypted (even when using FIPS 140-2 cloud encryption).

Perspecsys’ solution integrates easily into an enterprise SaaS implementation. Installed inside of an organization or at its IaaS provider (such as Fujitsu or Amazon AWS), Perspecsys’ software resides transparently between the application and its users, intercepting critical data before it is passed to the application in the cloud, and replacing it with a random token or encrypted value that is meaningless when viewed outside the Perspecsys Cloud Data Protection Gateway.

Find out today how Perspecsys can make your organization more secure. Click here to schedule a demo.

PGP

http://www.symantec.com/business/theme.jsp?themeid=pgp

PGP Corporation is a global leader in email and data encryption software for enterprise data protection. Based on a unified key management and policy infrastructure, the PGP® Encryption Platform offers the broadest set of integrated applications for data security. PGP® platform-enabled applications allow organizations to meet current needs and expand as security requirements evolve. From the datacenter, to the endpoint and beyond, PGP® solutions protect data whether it is at rest, in motion or in use.

Ping Identity

https://www.pingidentity.com/

Ping Identity provides cloud identity security solutions to more than 800 of the world’s largest companies, government organizations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers 45 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners using open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity for simple, proven and secure cloud identity management for customers and employees through single sign-on, federated identity management, mobile identity security, API security, social media integration and centralized access control. Visit pingidentity.com to learn more.

Pivotal

http://pivotal.io/

Pivotal’s cloud native platform drives software innovation for many of the world’s most admired brands. With millions of developers in communities around the world, Pivotal technology touches billions of users every day. After shaping the software development culture of Silicon Valley’s most valuable companies for over a decade, today Pivotal leads a global technology movement transforming how the world builds software.

Qihoo 360

http://www.360.cn

Qihoo 360 Technology Co. Ltd. (Qihoo 360) is a leading Internet company in China as measured by its active user base.  Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users.  With friendly and interactive user experience and leading cloud-based Internet security technologies, Qihoo 360’s products are trusted by massive and loyal users who enjoy Qihoo 360’s real-time protection for their daily online activities.   Recognizing security as a fundamental need of all Internet and mobile users, Qihoo 360 has built the large user base by offering comprehensive, effective and user-friendly Internet and mobile security products and services to protect users’ computers and mobile devices against malware and malicious websites.  Qihoo 360’s products and services are supported by the cloud-based security technology, which Qihoo 360 believes is one of the most advanced and robust technologies in the Internet security industry. Qihoo 360 also provides users with two very important secure access points to Internet: web browsers and app store.  Qihoo 360 currently monetizes the massive user base primarily through offering online advertising and Internet value-added services.    Founded in September 2005, Qihoo 360 is now a big family with more than 4,500 employees. On March 30th 2011, Qihoo 360 was listed on NYSE under the ticker “QIHU” as the first Chinese security company. Today Qihoo 360’s market cap reaches approximately $10 billion. All these incredible achievements have been reached by Qihoo 360’s hard-working and creative team only within 8 years.

Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users in China.

Qualys

http://www.qualys.com/

Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions ­ delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.

QuantumCTek

http://www.quantum-info.com/en.php/

QuantumCTek Co., Ltd. is the first and biggest provider of multi-protocol network security products and services based on quantum technology, in China. The company produces state-of-the-art quantum communication systems and series of innovative opt-electronic units with the commercial applications for the financial industry, government organizations and other enterprises, as well as the research applications for the scientific societies.

Initially founded by the Chinese leading quantum physics research group from Hefei National Laboratory for Physical Science at Micro-scale (HFNL), University of Science and Technology of China (USTC), the company is continually transferring cutting-edge scientific and technical achievements into mature commercial products, making great efforts to promote wide-range applications of quantum technology and forming the Chinese quantum industry.

Quintessence Labs

www.quintessencelabs.com

QuintessenceLabs is a global leader in quantum security, with offices located in Australia and the United States and a growing UK presence. At the forefront of the commercial development of quantum security solutions, we deliver unique high-value cybersecurity and information assurance capabilities.

These include:     

  • the world’s fastest true random number generator
  • advanced, interoperable, key and policy manager
  • integrated encryption solutions for on premise or in-cloud implementations

Our Security Products integrate seamlessly into existing systems, while building a strong foundation for future data security systems. By centralizing the management and control of data-security policy and harnessing quantum science properties to strengthen data security solutions, QuintessenceLabs solutions uniquely maximize security, increase ROI from existing assets and reduce data-security complexities.

Rackspace

http://www.rackspace.com/

The Rackspace Cloud provides on-demand and scalable website, application and storage hosting backed by Fanatical Support®. Through an integrated suite of cloud solutions – Cloud Sites™, Cloud Files™ and Cloud Servers™ – The Rackspace Cloud enables astute developers and IT managers to trade the hassles, upfront investments and high costs for a hosting environment that scales easily when traffic fluctuates.

For more information about The Rackspace Cloud, visit www.rackspacecloud.com or call 1-877-934-0409.

Rapid7

http://www.rapid7.com/

Rapid7® is the leading provider of security risk intelligence solutions. Rapid7’s integrated vulnerability management and penetration testing products, NeXpose® and Metasploit®, empower organizations to obtain accurate, actionable and contextual intelligence into their threat and risk posture. Rapid7’s solutions are being used by more than 1,600 enterprises and government agencies, while the Company’s free products are downloaded more than one million times per year and enhanced further by over 125,000 security community users and contributors. Rapid7 has been recognized as one of the fastest growing security companies worldwide by Inc. Magazine and is backed by Bain Capital Ventures. For more information about Rapid7, please visit http://www.rapid7.com.

Raytheon

http://www.raytheon.com/

Raytheon Company, with 2011 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. With a history of innovation spanning 90 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services. With headquarters in Waltham, Mass., Raytheon employs 71,000 people worldwide. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter at @raytheon.

Ribose

http://www.ribose.com

Ribose helps individuals and organizations worldwide work together effectively and securely through its social collaboration platform. By focusing on the “whole of collaboration”, Ribose has taken online social collaboration to a new level. Whether planning simple events or running complex projects, you will find that Ribose makes it easy, effective and genuinely fun. Ribose is free to use: http://www.ribose.com.

RSA

http://www.rsasecurity.com/

RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance.

RSA offers industry-leading solutions in identity assurance and access management, encryption, security information management and anti-fraud protection, bringing trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.

Saba

http://www.saba.com/

Saba delivers a cloud-based intelligent talent management solution used by leading organizations worldwide to hire, develop, engage and inspire their people. With machine learning at its core, Saba Cloud offers proactive, personalized recommendations on candidates, connections and content to help employees and businesses lead and succeed. It is purpose-built on a highly scalable platform that exceeds industry security and reliability standards. Saba has more than 31 million users and 2,200 customers across 195 countries and 37 languages. Learn more about intelligent talent management at www.saba.com.

Saviynt

http://www.saviynt.com

Saviynt is an innovative leader in providing application, data and infrastructure access governance and intelligence platform for Cloud and Enterprise. Saviynt uniquely delivers IGA 2.0 by integrating advanced usage & risk analytics with fine-grained privilege management. Saviynt’s completely managed IDaaS platform ensures a worry free adoption of Identity, Governance & Administration (IGA) services to secure critical enterprise assets. For more information, visit www.saviynt.com.

ServiceNow

http://www.servicenow.com

ServiceNow is changing the way people work.

With a service‑orientation toward the activities, tasks and processes that make up day‑to‑day work life, we help the modern enterprise operate faster and be more scalable than ever before. Customers use our service model to define, structure and automate the flow of work, removing dependencies on email and spreadsheets to transform the delivery and management of services for the enterprise. ServiceNow enables service management for every department in the enterprise including customer service, IT, human resources, facilities, field service and more. We deliver a ‘lights‑out, light‑speed’ experience through our enterprise cloud – built to manage everything as a service.

To find out how, visit www.servicenow.com.

Sierra Wireless

http://www.sierrawireless.com/

Sierra Wireless offers industry-leading mobile computing and machine-to-machine (M2M) communications products and solutions that connect people, devices, and applications over cellular networks. Wireless service providers, equipment manufacturers, enterprises and government organizations around the world depend on us for reliable wireless technology. We offer 2G, 3G and 4G wireless modems and gateways as well as a comprehensive suite of software, tools, and cloud services that ensure our customers can successfully bring wireless applications to market. For more information about Sierra Wireless, visit www.sierrawireless.com.

Skyhigh Networks

http://www.skyhighnetworks.com/

Skyhigh Networks’ mission is to help CIOs securely enable productivity and innovation within their businesses. As the “Cloud Visibility and Enablement Company”, we help companies embrace cloud services with appropriate levels of security, compliance, and governance, while lowering risk and cost. Over 100 customers, including BMC Software, Cisco, Creative Artists Agency, Diebold, and DirecTV use Skyhigh’s unparalleled cloud visibility, usage analytics, and policy enforcement to support their “Cloud Adoption Lifecycle” (i.e. Discover – Analyze – Secure) today. Specifically:

  • Skyhigh shines a light on Shadow IT by giving the organization a comprehensive view into its use of all cloud services
  • Skyhigh delivers an objective risk assessment for each identified service to quickly identify data, business and legal risks of these services.
  • Skyhigh analyzes the use of all cloud services to identify opportunities for IT to enable employees by subscribing to specific services, to reduce risk and costs by consolidating and better managing subscriptions, and to highlight anomalous behavior that may indicate a security breach, data leak, or compliance violation.
  • Skyhigh enforces the organization’s policies on the use of specific cloud services by controlling access, encrypting data with customer managed keys, preventing sensitive data from being disclosed (e.g., PII, PHI), and provides a live log of all accesses to specific cloud services.
  • Skyhigh enables secure mobile access to approved cloud services without requiring any agent, footprint, or other friction to the end user.

Spanning

http://spanning.com/

Spanning Cloud Apps, the most trusted provider of SaaS backup and recovery, prevents data loss with automated backup and accurate restores for Google Apps and Salesforce.com. Spanning Backup is a powerful, reliable enterprise-grade solution trusted by thousands of businesses and educational institutions. Visit: www.spanning.com and follow @SpanningBackup.

Symantec

http://www.symantec.com/index.jsp

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Tata Communications

http://www.tatacommunications.com/

Tata Communications is a global company with its roots in the emerging markets. Headquartered in Mumbai and Singapore, it has more than 8,000 employees across 38 countries. The $3.2 billion company is listed on the Bombay Stock Exchange and the National Stock Exchange of India and is the flagship telecoms arm of the $103.3 billion Tata group.

Tata Consultancy Services

http://www.tcs.com

Tata Consultancy Services (TCS) is a global leader in IT services, digital and business solutions that partners with its clients to simplify, strengthen and transform their businesses. We ensure the highest levels of certainty and satisfaction through a deep-set commitment to our clients, comprehensive industry expertise and a global network of innovation and delivery centers.

TCS has been recognized by Brand Finance as one of the Big 4 Global IT Services Brands. Our continued industry-leading growth is a testament to the certainty our clients experience every day.

Telecom Italia

http://www.telecomitalia.com

Telecom Italia is one of the most important telecommunications and ICT operators in Italy as well as being a major telco provider in Latin America.

In the domestic market the Group provides fixed and mobile telecommunications, internet and media services, office systems and solutions for businesses, research and development.

Telecom Italia has an extensive network consisting of the latest transmission technologies ranging from fibre optics to xDSL; it provides fibre optic back-bones in Europe and South America.

Moreover, by leveraging its back-bone and network capacity Telecom Italia it is able to provide cloud computing service platforms to customers ensuring end-to-end security and quality performance.

Tenet Health

https://www.tenethealth.com/

Tenet Healthcare Corporation is a diversified healthcare services company with more than 125,000 employees united around a common mission: to help people live happier, healthier lives. Through its subsidiaries, partnerships and joint ventures, including United Surgical Partners International (USPI), the company operates 80 general acute care hospitals, 18 short-stay surgical hospitals and over 400 outpatient centers in the United States, as well as nine facilities in the United Kingdom. Tenet’s Conifer Health Solutions subsidiary provides technology-enabled performance improvement and health management solutions to hospitals, health systems, integrated delivery networks (IDN), physician groups, self-insured organizations and health plans. Tenet also operates six health plans.

Thales e-Security

http://www.thales-esecurity.com/

Thales e-Security is a leading global provider of information security providing data encryption solutions to the financial services, manufacturing, government and technology sectors. With a 40 year unrivalled track record of protecting corporate and government information, Thales solutions protect our customers most sensitive data and is used by four of the five largest energy and aerospace companies, government networks around the world, and secures more than 80 percent of the worldwide payment transactions. Thales e-Security has offices in Japan, Hong Kong, United Kingdom and the United States and is represented in over 90 countries around the world. For more information, visit www.thales-esecurity.com

ThousandEyes

http://www.thousandeyes.com/

ThousandEyes provides IT performance management for the cloud era. With the adoption of cloud applications, enterprises are becoming heavily reliant on networks outside of their control. This creates new challenges in troubleshooting performance issues, both inside and outside the corporate network. ThousandEyes provides detailed visibility beyond the corporate network perimeter, identifies the root cause of performance problems with cloud applications and enables distributed collaboration to resolve problems quickly.

Trend Micro

http://www.trendmicro.com/aws

With over two decades of expertise in Endpoint, Messaging and Web Security, Trend Micro provides individuals, and organizations of all sizes, with smarter security solutions that protect against a wide range of insidious threats and combined attacks including viruses, spam, phishing, spyware, botnets and other Web threats, such as data-stealing malware. Trend Micro develops, delivers, and supports proactive cloud-based solutions designed to safeguard critical information and protect personal and corporate reputations. As an industry leader in security intelligence, Trend Micro’s mission is to secure the exchange of digital information by providing the most flexible and customizable Internet Content Security solutions available.

Trintech

http://www.trintech.com/

Trintech is the leading provider of financial software solutions for the Record-to-Report process. Over 800 clients in 100 countries – including half of the Fortune 50 and the FTSE 100 – rely on our solutions to optimize resources, reduce costs, manage risk and monitor activities across the entire finance organization worldwide. Trintech’s Cloud-based Cadency™ software automates the entire R2R cycle – including account reconciliation, close management, compliance, and financial reporting. Trintech’s offices are located in the United States, the United Kingdom, The Netherlands, Australia, France, Ireland and the Nordics, with partners in South Africa, Latin America and across the Asia Pacific region. www.trintech.com.

TÜV Austria

https://www.tuv.at/

Certification Competence Center
TÜV AUSTRIA Deutschland GmbH (TAD)
Tel: +49 (0)711 7223360140
Fax: +49 (0)711 7223360149
Internet: www.tuv-ad.de
E-Mail: service@tuv-ad.de
Falkenweg 1 D- 70794 Filderstadt

The TÜV AUSTRIA Deutschland GmbH (TAD) represents the offical Certification-Office of the TÜV AUSTRA GROUP concerning the certification of management-systems for IT-Security like ISO 27001 or CSA STAR. The TÜV AUSTRIA Group is an international group of companies with branches in more than 40 countries and with 1,400 employees worldwide. Services range from testing elevators and pressure equipment, plant safety, training & further education, medical devices, electric engineering, environmental protection, IT security, loss adjustment, certifications, calibrations, technical due diligence, legal compliance checks, and product testing through to the testing of stage and photovoltaic systems as well as wind turbines.

TÜV Rhineland

http://tuv.com

Headquarters TÜV Rheinland AG Am Grauen Stein 51105 Cologne, Germany TÜV Rheinland Asia Pacific Competence Center for Cloud Solutions 25 International Business Park #05-105 German Centre Singapore 609916 Tel: + 65 6562 8750 Ext 3357 Fax: + 65 6562 8759 cloudserviceasia@tuv.com International offices TÜV Rheinland Group is a global leader in independent inspection services, founded more than 140 years ago with more than 19,300 employees. TÜV Rheinland provides ICT services for companies and institutions for more than 15 years and supports organizations from the private and public sector with comprehensive consulting and solution expertise in IT, cyber security and telecommunications through digital transformation processes. To find the office closest to you visit www.tuv.com.

Ultimate Software

http://www.ultimatesoftware.com/

Ultimate Software is a leading cloud provider of people management solutions. The company’s award-winning UltiPro solution provides a comprehensive approach to manage the employee life cycle, from recruitment to retirement, and includes features for talent acquisition and hiring; onboarding; payroll; HR compliance; online benefits enrollment and management; performance management and reviews, succession management; career development; business intelligence; real-time reporting; time and attendance; plus role-based access for executives, managers, administrators, and employees. In 2012, Ultimate Software was ranked #25 on FORTUNE Magazine’s list of the Best Companies to Work For.

Universal Compute Xchange (UCX)

http://ucxchange.com/

UCX has created an electronic spot exchange to help Enterprise Organizations and Cloud Service providers manage their financial IT Infrastructure risk exposure by trading the cloud as a commodity. UCX has created the first centralized, transparent exchange that brings both enterprise organizations and cloud service providers together to engage in price discovery, trade execution and the physical delivery of compute resources using one standard unit of measure, providing “apples to apple” comparisons, operational agility, market and capital efficiencies.

Vaultive

http://www.vaultive.com/

Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive has developed a set of advanced encryption techniques to allow for processing of encrypted data residing in the cloud including search, sort and index — while enterprise IT retains control of the encryption keys. Optimized for Microsoft® Office 365 and Hosted Exchange, the Vaultive platform supports best practices for encryption in use, while maintaining the benefits of cloud computing.

Founded in 2009 by a team of information security veterans, Vaultive’s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service.

Virtustream

http://www.virtustream.com/

Virtustream, an EMC Federation company, is the enterprise-class cloud service and software provider trusted by enterprises worldwide to migrate and run their mission-critical applications in the cloud. For enterprises, service providers and government agencies, Virtustream’s xStream management platform and Infrastructure-as-a-Service (IaaS) meets the security, compliance, performance, efficiency and consumption-based billing requirements of complex production applications in the cloud – whether private, public or hybrid.

Vodafone

https://vodafone.com/

Vodafone Cloud & Hosting cover all aspects of data centre, server, security and storage infrastructure; from design and build to management and operation. We help CIOs and IT departments reduce costs, focus their resources and drive business strategy.

Vormetric

http://www.vormetric.com/

Vormetric is the leader in enterprise systems encryption and key management for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to encrypt any file, any database, any application, anywhere it reside. Vormetric achieves strong encryption without sacrificing application performance or creating key management complexity. The most security conscious organizations and government agencies in the world, including 7 of the Fortune 10, have standardized on Vormetric to provide strong, easily manageable data security. For more information visit www.vormetric.com.

Wallix

http://www.wallix.com/

WALLIX is a software company offering privileged access management solutions for large and medium sized enterprises, public organizations and cloud service providers. Our mission is to help our customers protect their critical IT assets including data, servers, terminals and connected devices through a single tool, the Wallix AdminBastion (WAB) Suite, which provides them with the most effective route to security and compliance by reducing their biggest security risk – privileged access to IT – in the shortest possible time. With an unobtrusive architecture, full multi-tenancy, and virtual appliance packaging, WAB Suite is the easiest solution in its category to implement, use and manage. Praised by SC Magazine as a “unique approach to the entire privileged account management problem”, the solution received a five-star rating as well as the mention “Best Buy”. Its best of breed features which include password management, web access portal, access control and comprehensive session monitoring and recording can be deployed easily and securely on premise or in a hybrid cloud environment.

Thanks to an all in one solution which provides businesses with the ability to meticulously trace super users’ activity on their most sensitive accounts, WAB Suite secures firms’ biggest IT security risks in the shortest possible time. Its simple deployment feature enables companies to integrate the solution in their infrastructure as fast as possible, leading to a more effective protection of sensitive data. This element led an analyst to conclude that the product offered “the fastest route to compliance”.

Weaver

http://weaver.com/

Weaver’s IT Advisory Services focuses on delivering performance-enhancing consultation that simultaneously addresses IT and business agendas. We work directly with CIOs and others to create a more risk-aware, effective IT organization that can nimbly drive process efficiencies throughout companies and better support and deliver transformational business change. From cloud computing to mobile payment information, data integrity and information security have never been more crucial. With a range of specialized IT advisory services, Weaver helps organizations distinguish IT as the strategic advantage companies need to succeed in the age of big data.

Founded in 1950, Weaver currently has 500+ employees and offices in eight cities across the United States. Weaver is ranked the largest independent accounting firm in the Southwest by Accounting Today magazine. The firm is also ranked the 38th largest firm in the United States and a ‘2015 Best of the Best Firm to Watch’ by INSIDE Public Accounting. Weaver serves a broad range of clients including public and private national and international companies, nonprofit organizations and government entities. In addition to traditional assurance and tax services, Weaver also provides numerous advisory services, including risk advisory, transaction advisory, IT advisory, energy compliance and consulting, forensics and litigation, international tax, property tax, state and local tax, and wealth strategies services. Learn more at http://www.weaver.com.

Willis Towers Watson

https://www.willistowerswatson.com

Willis Towers Watson is a leading global professional services, technology and solutions company that helps organizations improve performance through effective people, risk and financial management. With 16,000 associates around the world, we offer consulting and software solutions in the areas of benefits, talent management, rewards, and risk and capital management.

We are the world’s largest provider of actuarial software. Global organizations, including the world’s largest insurers, rely on Willis Towers Watson solutions to measure value, manage risk, safeguard solvency and improve overall business performance.

A powerful combination of tailored best of breed software solutions integrated with world class advisory services sets our offering apart. We have the ability to support our clients’ end-to-end processes leveraging software as a service and cloud technology with the backing of technical expertise and support enabling them to maximize investment and deliver value.

WinMagic

http://www.winmagic.com/

WinMagic Inc. provides application aware Intelligent Key Management for everything encryption, with robust, manageable and easy-to-use data security solutions. WinMagic’s SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

Wipro

http://www.wipro.com/

Wipro Ltd (NYSE:WIT) is a global information technology, consulting and outsourcing company with 170,000+ workforce serving clients in 175+ cities across 6 continents. The company posted revenues of $7.6 billion for the financial year ended Mar 31, 2015.

Wipro helps customers do business better by leveraging our industry-wide experience, deep technology expertise, comprehensive portfolio of services and vertically aligned business model. Our 55+ dedicated emerging technologies ‘Centers of Excellence’ enable us to harness the latest technology for delivering business capability to our clients.

Wipro is globally recognized for its innovative approach towards delivering business value and its commitment to sustainability. Wipro champions optimized utilization of natural resources, capital and talent. Today we are a trusted partner of choice for global businesses looking to ‘differentiate at the front’ and ‘standardize at the core’ through technology interventions.

Workshare

http://www.workshare.com

Workshare is a leading provider of secure enterprise file sharing and collaboration applications. Workshare allows individuals to easily create, share, and manage high-value content anywhere, on any device. Workshare enhances the efficiency of the collaborative process by enabling content owners to accurately track and compare changes from contributors simultaneously. Workshare also reduces the commercial risk posed by inadvertently sharing confidential or sensitive documents. More than 2 million professionals in 70 countries use Workshare’s award-winning desktop, mobile, tablet, and online applications. For more information visit http://www.workshare.com or follow Workshare on twitter at @workshare.

Xactly

http://xactlycorp.com

Xactly (NYSE:XTLY) is a leading provider of enterprise-class, cloud-based, incentive compensation solutions for employee and sales performance management. We address a critical business need: To incentivize employees and align their behaviors with company goals. Our products allow organizations to make more strategic decisions, increase employee performance, improve margins, and mitigate risk. Our core values are key to our success, and each day we’re committed to upholding them by delivering the best we can to our customers.

Xactly Corporation
300 Park Avenue
Suite 1700
San Jose, CA 95110
1-866-GO-XACTLY

Yammer

https://www.yammer.com/

Yammer (www.yammer.com) is the leading provider of enterprise social networks, enabling organizations to make transformative changes quickly by empowering employees to collaborate across departments, geographies, content and business applications. The basic version of Yammer is free, and customers can pay to upgrade their network to receive additional administrative and security controls, priority customer service and a dedicated customer success manager. Companies and organizations from across the globe, including more than 85 percent of the Fortune 500, are using our award-winning Software-as-a-Service (SaaS) solution to improve employee productivity and engagement. Visit our blog to see how our customers are benefiting from Yammer or our IT Security page for detailed descriptions of our security controls and features.

Zendesk

http://www.zendesk.com/

Zendesk builds cloud software for better customer service, bringing companies and their customers closer together. With Zendesk, companies engage directly and openly with customers, building more meaningful customer relationships that last a lifetime. More than 40,000 customers use Zendesk to provide service to more than 300 million people worldwide. Learn more at www.zendesk.com.

ZScaler

http://www.zscaler.com/

Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.