AbacusNext® rids today’s professionals of security concerns and technology burdens by providing Compliance-Ready™, cloud enabled managed solutions, allowing clients to leverage the power of enterprise-class technology without the added complexity and costs associated with deploying and managing software and hardware solutions locally. As an end-to-end solutions provider, our products and services portfolio includes virtual desktop (DaaS), private and hybrid cloud, practice management software (PMS), client resource management (CRM), email hosting services, security endpoint protection, business continuity (BCP), and on-premise solutions. Since 1983, we have delivered hardware, software and infrastructure on a pay-as-you-go model to over 500,000 practicing professionals worldwide, and are recognized by Forbes as one of America’s fastest growing companies. For more information, please visit www.abacusnext.com.
Accenture is a global management consulting, technology services and outsourcing company, with approximately 236,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$25.5 billion for the fiscal year ended Aug. 31, 2011.
Accenture Security Solutions professionals leverage decades of experience, deep industry knowledge and business-process know-how to help protect against threats, minimize risks and enable the adoption of new technologies that promote growth.
Adallom is a SaaS security company founded in 2012 by alumni of the Israeli Intelligence Corps. We focus on evolving the way enterprises secure information in SaaS by monitoring all activity, detecting unauthorized access, and protecting users in real time. Adallom is the only SaaS security company to have defeated targeted SaaS attacks in the wild by applying advanced machine learning to real time user activity monitoring. We are members of Microsoft’s MAPP (Microsoft Active Protections Program), and would love to work with you on securing your company’s SaaS investment.
If you’re curious about our name, “Adallom” is an abbreviation of the Hebrew saying “Ad Halom” which literally means “up to here” and in game theory lingo means “the last line of defense.” In the context of SaaS we believe that pre-existing defense mechanisms are ineffective at protecting information in SaaS. So we created a solution that extends the boundaries of enterprise security into the cloud. We moved control, visibility, and detection directly into SaaS, away from devices and perimeters. In the SaaS era, security can’t be bounded. Adallom’s charter is Security Without Boundaries.
AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organizations all over the world including governments, enterprises and carriers and 1,000 blue chip customers.
AEP Networks develops the highest grade security technologies tested and accredited to industry security standards, including CoCo, FIPS 140-2 Level 4 and CAPS. Its extensive portfolio of products and solutions protect the integrity of very sensitive data and are extremely reliable, survivable and resilient.
AEP Networks has also developed the industry’s first remote access Security as a Service offering , CloudProtect, aimed at Managed Service Providers and Cloud Service Providers. The offering secures remote access to the virtual data centers that Service Providers run to host their customers’ applications by securing centralized application access, whether physical or virtualized.
For more information, email us at: [email protected]
Alert Logic®, the leading provider of Security-as-a-Service solutions for cloud, hybrid and on- premises data center infrastructure. Fully managed by a team of experts, the Alert Logic Cloud Defender® suite delivers the deep security insight and continuous protection needed to protect a company’s most sensitive data. Alert Logic provides 24×7 network, system and application protection for over 3,800 organizations worldwide. Built for cloud scale, the Alert Logic ActiveAnalytics platform manages over 5 petabytes of data, analyzes over 400 million events and identifies over 50,000 security incidents monthly that are managed by our security operations center.
Appian delivers an enterprise platform for digital transformation that makes it easy for organizations to move fast and revolutionize the customer experience. Powered by industry leading Business Process Management (BPM) and Case Management capabilities, Appian’s low-code approach radically accelerates the time it takes to build and deploy powerful, modern applications, on-premises or in the cloud. The world’s most innovative organizations use Appian to revolutionize their customer experiences, transform their business operations, and master global risk and compliance. For more information, visit www.appian.com.
The leader in active cyber defense, Armor offers customer-centric security outcomes for retail and eCommerce enterprises, healthcare organizations, payment leaders and financial institutions. Armor protects highly sensitive data for the most security-conscious companies in the world – regardless of where the data is located. With its proven cybersecurity approach and proprietary cloud infrastructure built specifically for security, compliance and performance, responsible businesses choose Armor to reduce their risk.
Aspect helps enterprises break down the walls between people, processes, systems and data sources, allowing organizations to unite around the customer journey. By developing fully native contact center interaction management, workforce optimization and self-service capabilities within a single customer engagement center, we enable dynamic, conversational interactions and create a truly frictionless omni-channel customer experience. Leveraging the agility of our worldwide cloud infrastructure and over 40 years of industry ingenuity, Aspect conveniently and easily connects questions to answers while helping enterprises keep service levels high and operational costs contained. For more information, visit www.aspect.com.
For athenahealth clients, being on a cloud-based service means benefiting from the collective clinical and payer knowledge of 29,000 providers on our growing network. This includes continuously tracking and updating payer and clinical rules, formulary requirements, and managing pay-for-performance and other quality programs to secure maximum incentives. athenahealth’s suite of integrated, cloud-based services includes:
- athenaCollector® – a medical billing and practice management solution that reduces administrative red tape and allows medical groups to efficiently assess, plan, and improve practice performance while increasing revenue. It’s easy to use, saves time and dramatically improves the bottom line. Practices are able to track and access information on any claim, create simple, robust reports and get instant data for every business decision.
- athenaClinicals® – a Stage 1 Meaningful Use-certified electronic health record that delivers greater clinical control and insights to medical practices while boosting efficiency and revenue potential.
- athenaCommunicator®– automated messaging, live operator services, and a patient web portal that keeps medical groups competitive, compliant and accessible.
- athenaCooordinator℠ – a care coordination service for order transmission, insurance pre-certification and patient registration among physicians and hospitals, surgical centers and imaging centers.
Being on a cloud-based service in the health care information technology space means we can exercise our comparative advantage to execute client work at scale, processing clinical documents, posting claims, tracking payments, and more. And it means we have constant visibility into every client’s performance, so we can monitor, benchmark and coach our clients toward peak performance.
Atlassian unleashes the potential in every team. Our products help teams organize, discuss and complete shared work. Today Atlassian is the leading provider of collaboration software for teams at more than 51,000 companies globally, including top brands like Citigroup, eBay, Coca-Cola, Visa, BMW and NASA. We help teams at organizations of all sizes, from start-ups to large companies, and more than 75 percent of Fortune 100 companies are Atlassian customers.
Atlassian’s portfolio of products includes JIRA for team planning and project management, Confluence for team content creation and sharing, HipChat for team messaging and communications, Bitbucket for team code sharing and management and JIRA Service Desk for team services and support applications. Hundreds of third-party applications are built on top of Atlassian products and the company supports dozens of integration partners.
Atos SE (Societas Europaea) is a leader in digital services with 2014 pro forma annual revenue of circa € 11 billion and 93,000 employees in 72 countries. Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Cyber-security solutions, as well as transactional services through Worldline, the European leader in the payments and transactional services industry. With its deep technology expertise and industry knowledge, the Group works with clients across different business sectors: Defense, Financial Services, Health, Manufacturing, Media, Utilities, Public sector, Retail, Telecommunications, and Transportation.
Atos is focused on business technology that powers progress and helps organizations to create their firm of the future. The Group is the Worldwide Information Technology Partner for the Olympic & Paralympic Games and is listed on the Euronext Paris market. Atos operates under the brands Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, and Worldline.
Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. Avaya Breeze Platform™ enables third parties to create and customize business applications for competitive advantage. The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.
Barracuda is a well-known leader in data security and protection. Barracuda’s cloud security solutions have been specifically engineered for Amazon Web Services, Google Cloud Platform, and Microsoft Azure. Barracuda is Azure certified, provides security competencies in AWS, and lead the market in terms of overall cloud firewall sales. Customers turn to Barracuda because they enable them to extend data security and protection in the cloud and to bridge their on-premises solutions as they continue their cloud journey. As part of the shared security responsibility models, Barracuda products complement existing public cloud services and provide simple, seamless interfaces to protect environments whether they are in-cloud, on-premises or hybrid configurations.
Behavox is an enterprise compliance software company providing holistic employee surveillance solutions. Our platform allows Senior Management, Risk & Compliance Officers to detect cases of market abuse, insider threat, collusion and reckless behavior in real time. Through the combination of cutting-edge technology, thought leadership and industry collaboration, we have created a Risk and Compliance ecosystem which transforms the way that firms conduct surveillance and supervise risk within their business. Our platform is designed to highlight specific types of conduct as defined by the culture of each institution.
We provide an effective and scalable solution that delivers compliance with finance regulations such as Dodd Frank, MAR, FCPA, SMR & MIFID II. By linking structured internal communication (voice, email, chat etc) data with other internal unstructured data (GPS, browser history etc), users can discover, visualise and quantify relationships between people, organizations and content. In addition to this, the Behavox machine learning algorithms compare this data to a series of proprietary scenarios developed by our regulatory experts, which can also be configured to meet existing and future institutional policies.
Bell is Canada’s largest communications company, providing consumers and business customers with wireless, TV, Internet, home phone and business communications services. Bell Media is Canada’s premier multimedia company, with leading assets in television, radio, out of home and digital media. Bell is wholly owned by Montréal’s BCE Inc. (TSX, NYSE: BCE). For more information, please visit http://Bell.ca.
Founded in 2004, BH Consulting is an award-winning independent advisory firm specialising in information security consulting, cybersecurity, cloud security, risk assessment, cloud forensics, and training. BH Consulting is recognised internationally as a leader in cybersecurity by Kennedy Consulting Research & Advisory, and has won numerous awards in recognition of its excellence and professionalism.
Bitglass is a “cloud access security broker” and the leader in total data protection. Bitglass enables enterprises to adopt cloud-based applications without having to sacrifice the security of their data. The company’s data protection suite delivers innovative technologies that transcend the network perimeter to deliver end-to-end data protection for the enterprise – in the cloud, on mobile devices and anywhere on the Internet. As industries like Healthcare and Finance begin adopting cloud apps, companies within them must comply with strict data protection regulations. Bitglass helps enterprises remain compliant while giving their enterprise IT teams the visibility and control they need and their employees the mobility and privacy they require. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. The company is based in Silicon Valley and backed by venture capital from NEA and Norwest.
Blue Coat Systemshttp://www.bluecoat.com/
Founded in 1996, Blue Coat provides industry leading web security to more than 15,000 customers worldwide, including 88% of the Fortune® Global 500.
In 2011 Blue Coat introduced the web security module also known as ThreatPulse. ThreatPulse is a cloud-delivered service that gives you all the benefits of real-time security without the need to update appliances, servers or user desktops. This Internet-delivered security service offers complete protection against web-borne threats by leveraging Blue Coat’s proven security technology as well as the WebPulse cloud community of over 75 million users.
With extensive web application controls and granular reporting features, IT administrators can instantly create and apply new policies to all users, including roaming workers using external networks. Just as important, you can identify and categorize new web content in real time with 99+% accuracy. Blue Coat cloud service is backed by our guaranteed 99.999% uptime agreement
Bluedon is a trusted provider of network security solution, enables organizations to simplify network security and make their online business reliable. Over 10,000 customers worldwide run systems on Bluedon’s high performance network security solutions, including China’s large state-owned enterprises, Fortune 500 companies, famous education and financial institutions and telecom operators. Bluedon is headquartered in Guangzhou in China, and has always been providing top-ranking network security products and best practice services, helping customers protect their data and information since founded in 1999. Bluedon’s products cover four categories, Security Gateway, Network Activity Audit, Security Management and Web Security. Specifically, IDS, UTM, BSM, Database Security Audit and Security Operation Center have been highly commended with outstanding performance by customers from different areas. With Bluedon’s cloud security solution, your organization enjoys productivity and flexibility that cloud brings to you. For more information, please visit http://www.bluedon.com.
Box provides a secure, scalable content sharing and collaboration platform that both users and IT love and adopt, including 92% of the Fortune 500. Box’s dynamic, flexible content management solution empowers users to share and access content from anywhere, while providing IT enterprise-grade security and oversight into how content moves throughout their organizations. Content on Box can be shared internally and externally, accessed through iPad, iPhone, Android and PlayBook applications, and extended to partner applications such as Google Apps, NetSuite and Salesforce. Headquartered in Los Altos, CA, Box is a privately held company and is backed by venture capital firms Andreessen Horowitz, Bessemer Venture Partners, Draper Fisher Jurvetson, Emergence Capital Partners, Meritech Capital Partners, NEA, Scale Venture Partners, and U.S. Venture Partners, and strategic investors salesforce.com and SAP.
CaixaBank is a financial group, leader within the Spanish market, comprising a banking and insurance business, as well as undertaking investments in international banks and in leading service sector companies. The Group’s essence – and what sets it apart from others – is its level of implication and unswerving commitment to society. CaixaBank is committed to banking based on corporate values of quality, confidence and social commitment. CaixaBank has the largest customer base in Spain – 14 million people – and is the main bank for 1 in every 4 Spanish customers. The bank has the most extensive network in Spain, with over 5,000 branches and nearly 9,500 ATMs, complemented by a mobile and online banking service of the highest quality.
CaixaBank is also the tenth largest bank in the Eurozone in terms of market capitalisation.
Cendyn is a cloud-based software and services provider that develops integrated technology platforms for driving sales and marketing performance in the travel and hospitality industry. The Cendyn Hospitality Cloud offers the most complete set of innovative software and services in the industry, covering hotel marketing, guest engagement, group sales, and event management. With offices in Boca Raton, Atlanta, Boston, San Diego, Toronto, Whistler, London and Singapore, Cendyn proudly serves more than 30,000 clients in 143 countries with enterprise spend levels in excess of $1 billion. For more information on Cendyn, visit www.cendyn.com.
Centrify is the leader in securing enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 500.
CEPREI Certification Bodyhttp://www.ceprei.org
CEPREI HQ No.110 Dongguan Zhuang RD. Guangzhou, P.R.China Telephone: +86-20-87236606 C-STAR@ceprei.org As a leading provider of management system certification body in China and the first Executive Member of CSA in Asia, CEPREI Certification Body Provides information security related professional services such as ISO20000 & ISO27001 certification, risk assessment, IT governance, Business Continuity Management etc. Also, newly launched C-STAR assessment scheme is provided to help our client fully understand cloud security issues they’re facing and how to put the appropriate controls in place. CEPREI Certification Body with unique legal status is a registrar authorized and accredited by national department and/or accreditation bodies home and abroad, to conduct third-party certification. It grew out of Inspection Division of China Electronic Product Reliability and Environmental Research Institute （the Fifth Electronic Institute） established in 1956, which is the first scientific research organization at national level engaged in product quality and reliability research in China. As early as 1979, CEPREI Certification Body introduced the concept of Certification into China. Ever since then CEPREI has issued more than ten thousand certificates of various types to its clients. It sets foot in all administrative regions in mainland China and other countries and regions including Hongkong Special Administration Region, Taiwan, USA, German, Holland, Denmark, Australia, Japan, Korea, Malaysia, Thailand and Singapore. As one of the most authoritative accreditation bodies in the world, America National Standard Institute-Registrar Accreditation Board (ANAB) has authorized CEPREI Certification Body to issue ISO9000, ISO14000 and ISO27001 certificates with ANAB logo since 2001. The certificate will be helpful for your products and services in improving reputation and enhancing competitiveness home and abroad.
CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive data discovery, protection – search strong encryption, tokenization, data loss prevention, key management, and malware detection – and activity and anomaly monitoring services.
CipherCloud has experienced exceptional growth and success with over 2.6 million business users, across 25 countries, and in more than 11 industries.
The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as salesforce.com, Box, and Microsoft Office 365.
CipherCloud, named as SC Magazine’s 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud
Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control.
Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device.
With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.
Clearmanage is a cloud computing and cloud security service provider, with more than 8years’ experience specializing in providing cloud services, cloud infrastructure and hosting, and advance security solution and services for government and enterprises.
Clearmanage worked with our reseller partners,to provide secure IaaS, PaaS and SaaS Cloud Service and security cloud services to government agencies for more than 6years. We have been the team behind several Singapore government Cloud Service bulk tender withour partners.Some of our commercial cloud service partners leverage on our solution and infrastructure to provide innovative cloud services to their clients.
We operate across multiple data centers, which includes Uptime Institute certified Tier III certified data center,to ensure reliability and continuity. We are one of the first in Singapore to be certified for SS 584 MTCS level 3, capable of hosting client with sensitive information & highly confidential business data, and we are certified for ISO 27001:2013 and CSA Star Gold.
Contact your favorite IT partners to learn more about our service or contact us at email@example.com.
Cloud Technology Partnershttp://www.cloudtp.com
Cloud Technology Partners (CTP) is the premier cloud services and software company for enterprises moving to AWS, Google, Microsoft and other leading cloud providers. From strategy to operations, CTP accelerates end-to-end cloud adoption with the best implementation services, software and intellectual property available on the market. CTP’s comprehensive framework for cloud adoption and dedicated software development capabilities help clients achieve business results faster, no matter where they are in their cloud transformation. Visit cloudtp.com to learn more.
CloudLock is a leading cloud data security company that provides enterprise class solutions designed to give organizations control over their data in the public cloud, without invasive in-band technology, complicated overhead, or unanswered regulatory risk. Many of the world’s largest companies and institutions trust CloudLock’s approach of directly integrating with their SaaS applications, which makes robust security controls immediately available at a fraction of the cost and complexity of other alternatives.
CloudLock helps organizations:
- Extend their DLP policies to SaaS applications such as Google Apps and Salesforce
- Implement a robust discovery/classification/control security framework in the public cloud
- Enforce the principles of people-centric security, greatly reducing their risk of data exfiltration or breach without driving users into unsanctioned (often called “shadow IT”) systems
- Apply risk appropriate controls, including selective encryption, across their most sensitive data
For more information, please visit us at cloudlock.com
CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company’s Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.
Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Coalfire’s approach addresses each businesses’ specific vulnerability challenges, developing a long-term strategy to prevent security breaches and data theft. Coalfire provides advisory and assessment services for cyber security and compliance in DoD SRG, FISMA/FedRAMP, HIPAA/HITRUST, PCI DSS, PCI PA-DSS, ISO 27001, SOC and technical testing services such as penetration testing, social engineering and forensics. Coalfire has offices throughout the United States and Europe.
CradlePoint solutions are part of the leading-edge 4G networks in the world. Our complete networking and cloud-management solutions help enterprises deliver better ROI and lower-cost of management. Regardless of the application, CradlePoint is delivering greater network security, better management, and better value than any other available systems on the market. CradlePoint is the leading provider of cloud-managed 3G/4G LTE networking solutions for distributed enterprises. CradlePoint solutions provide uncompromised mobile broadband performance while delivering proven network system interoperability. CradlePoint’s broad family of high-performance routers are designed for deployment in mission-critical applications that require 24×7 connectivity. With both integrated wireless WAN and non-integrated versions, the solutions are ideal for distributed operations and emerging industries that require either remote connectivity or multi-WAN redundancy. Founded in 2006, CradlePoint has shipped nearly a million devices and offers products certified and promoted by major worldwide carriers.
CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture. CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 27 billion events per day from millions of sensors deployed across more than 170 countries, uniquely providing crowdsourced protection for the entire customer community.
Cryptzone secures the enterprise with dynamic, context aware security solutions that protect critical services, applications and content from internal and external threats. For over a decade, enterprises have turned to Cryptzone to galvanize their Cloud and network security with responsive protection and access intelligence. More than 450 public sector and enterprise customers, including some of the leading names in technology, manufacturing and consumer products trust Cryptzone to keep their data and applications secure.
2007 in Fremont of California, the company now has many branches with its national sales networks in many cities, such as Hongkong and Shanghai, Beijing in China. We provide products and services to 1000 customers across all industries, including many Fortune 500, large and middle-sized organizations. Since 2009, the DBAPPSecurity Ltd., a Leading company focusing on Web Application security and database security technologies. Founded in company’s revenue has being grown more than 50% per year.
DBAPPSecurity focuses its efforts on research and development and has a professional team with years of experience in developing and implementing data security and web application security solutions. The company owns some of the world leading technology patterns, and is dedicated to offer web application security and database security solutions. DBAPPsecurity’s customers include government organizations as well as leading companies from various industries such as finance, energy, education, medical and e-commerce industry.
Digi International (www.digi.com) is making wireless M2M easy by developing reliable products and solutions to connect and securely manage local or remote electronic devices over the network or utilizing our cloud technology; the iDigi Device Cloud. The iDigi Device Cloud is the intelligent platform choice for today’s and tomorrow’s device application solutions within any industry. Designed by a team with decades of experience in device network solutions, the iDigi Device Cloud provides the reliability, scalability, performance and security your solution needs
For more information, visit the iDigi Web site at www.idigi.com, or call 877-912-3444.
Digiware S.A. is the expert provider of comprehensive strategies generation in information security for America. With 20 years of experience, it protects organizations against security risks involved technological growth; in turn, aware of the enormous challenge facing the areas of information security today rests on the definition, implementation and maintenance of strategic programs for information security, that integrate with business objectives.
Proactive protection Digiware S.A., under the model of Resources of Security Intelligence – RIS, provides the visibility needed to boards, governing bodies, personal risk, operational, technological and security, to deal with the risks of dynamic information.
Dimension Data accelerates the ambitions of its clients by delivering exceptional value through its great people. As an organization we’re inspired by teamwork, innovation, diversity, and integrity. We’re driven by professional excellence and always place our clients at the centre of everything we do. As a global leader in the provision and management of specialist IT infrastructure solutions and services, let us bring your ambitious ideas to life and accelerate your success.
Millions of people trust Dropbox to easily and reliably store, sync, and share their documents, photos, and videos across devices and platforms. Dropbox for Business helps organizations around the world collaborate effectively and increase productivity. And it brings IT admins the functionality, controls, and visibility they need to ensure the safety of their company data. Dropbox has been designed to keep users’ data safe, employing a sophisticated infrastructure, enterprise-grade security, layers of encryption, and detailed security, privacy, and compliance policies and procedures. To learn more about Dropbox for Business, www.dropbox.com/business.
Druva is the leader in cloud data protection and information management, leveraging the public cloud to offer a single pane of glass to protect, preserve and discover information – dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva’s award-winning solutions intelligently collect data, and unify backup, disaster recovery, archival and governance capabilities onto a single, optimized data set. As the industry’s fastest growing data protection provider, Druva is trusted by over 4,000 global organizations and protects over 25 PB of data. Learn more at www.druva.com and join the conversation at www.twitter.com/druvainc.
With more than 40 years of experience, DTCC is the premier post-trade market infrastructure for the global financial services industry. From operating facilities, data centers and offices in 16 countries, DTCC, through its subsidiaries, automates, centralizes and standardizes the processing of financial transactions, mitigating risk, increasing transparency and driving efficiency for thousands of broker/dealers, custodian banks and asset managers. Industry owned and governed, the firm simplifies the complexities of clearing, settlement, asset servicing, data management and information services across asset classes, bringing increased security and soundness to the financial markets. In 2016, DTCC’s subsidiaries processed securities transactions valued at more than U.S. $1.5 quadrillion. Its depository provides custody and asset servicing for securities issues from over 130 countries and territories valued at U.S. $49.2 trillion. DTCC’s Global Trade Repository maintains approximately 40 million open OTC positions per week and processes over one billion messages per month. To learn more, visit us at www.dtcc.com or connect with us on LinkedIn, Twitter, YouTube and Facebook.
Duo Security is a cloud-based trusted access provider protecting the world’s fastest-growing companies and thousands of organizations worldwide, including Dresser-Rand Group, Etsy, NASA, Facebook, K-Swiss, The Men’s Wearhouse, Paramount Pictures, Random House, SuddenLink, Toyota, Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at www.duo.com.
Engility launched Cloud ASCEND™, an end-to-end solution for enterprise cloud architecture, migration and optimization. Developed for the unique requirements of highly secure government enterprises, particularly within the Department of Defense and Intelligence Community, Cloud ASCEND brings a data-driven approach to customers that helps realize the benefits of cloud computing and enterprise modernization.
- Cloud ASCEND™ is Engility’s mission-driven solution for enterprise cloud architecture, migration and optimization for the national security community.
- More than migration – it’s engineered digital transformation and governance.
- The tool designs scalable, secure and resilient cloud and hybrid enterprise architectures.
- It also migrates and operates in the cloud with automated optimization to ensure mission performance and maximum return on investment.
For more information, please visit: https://www.engilitycorp.com/cloudascend/
Ericsson is the world’s leading provider of communications technology and services. We are enabling the Networked Society with efficient real-time solutions that allow us all to study, work and live our lives more freely, in sustainable societies around the world.
Our offering comprises services, software and infrastructure within Information and Communications Technology for telecom operators and other industries. Today more than 40 percent of the world’s mobile traffic goes through Ericsson networks and we support customers’ networks servicing more than 2.5 billion subscribers.
We operate in 180 countries and employ more than 100,000 people. Founded in 1876, Ericsson is headquartered in Stockholm, Sweden.
Evident.io delivers a Security-as-a-Service platform to simplify the management of risk, compliance, and threat-detection in cloud-computing environments. We democratize the security capabilities of the billion-dollar cloud companies, and make them accessible to the cloud adopters of every size and industry. The Evident platform continuously evaluates your cloud resources to detect changes in risk, compliance, and security posture — delivering the transparency and control you need to defend against today’s pervasive security threats. Our customers range from the very early startup with no dedicated security staff, all the way up to the Fortune 500 businesses with multi-million dollar security budgets. One message has been consistent: cloud security needs a continuous solution — and that solution is Evident.
EY CertifyPoint HQ Antonio Vivaldistraat 150 1083 HP Amsterdam The Netherlands firstname.lastname@example.org://www.ey.com/certifypoint International offices Founded in 2002, EY CertifyPoint is an accredited independent and impartial certification institute with experienced auditors all over the world certifying some of the top international organizations. Being related to the global EY organization, EY CertifyPoint is able to provide you with a local contact person in nearly every country world-wide. For more information, please visit http://www.ey.com/certifypoint.
F5 makes apps go faster, smarter, safer for the world’s largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control. For more information, go to f5.com and follow us on twitter @F5Networks.
With a nearly 30 year heritage in shaping the enterprise security industry, Fischer continues its history of technology leadership and innovation by bringing to market a cloud-based Identity Services Platform that truly simplifies Identity Management, scales seamlessly from the SMB to the largest enterprise, and can be implemented either as a traditional software-as-a product deployment or via any outsourced delivery model. Fischer’s solutions provide organizations of all sizes with greater choice in how they derive the benefits of Identity Management, but without risk or compromise. For more information, please visit: www.fischerinternational.com
Fishtech Labs is a technology accelerator focused on finding and creating solutions for our clients that deliver operational efficiencies and improved security posture. So you don’t have to be, we are immersed in the changing security and emerging technology landscape specific to Cloud, IoT, SDN, and Virtualization. We identify gaps and appropriate solutions for our clients’ maximum advantage. As innovation experts, our team takes a consultative approach to evaluate each client’s objectives, benefits, and risks that may be mitigated with next-generation solutions. For more information, visit us at http://fishtechlabs.com or contact us by email at email@example.com
Five9, a provider of cloud contact center software, brings the power of the cloud to thousands of customers worldwide and facilitates more than three billion customer interactions annually. Since 2001, Five9 has helped organizations of every size transition from premise-based software to the cloud. With extensive expertise, technology, and an ecosystem of partners, Five9 helps businesses take advantage of their secure, reliable, scalable cloud contact center software to create exceptional customer experiences, increase agent productivity and deliver tangible business results. The purpose-built, highly scalable and secure Five9 Virtual Contact Center cloud platform delivers a comprehensive suite of easy-to-use applications that enable the breadth of contact center-related customer service, sales and marketing functions. For more information, visit www.five9.com.
Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec
FTI Technology helps clients manage the risk and cost of e-discovery with confidence. From forensic data collection to fully managed document review services, we collaborate with our clients to deliver strategic solutions tailored to their unique legal requirements. With keen focus on the productivity and defensibility of document review, our clients rely on us to cost-effectively handle matters ranging from internal investigations to large-scale litigation with global e-discovery requirements.
Best known for its market-leading scalability and performance, Ringtail® software equips legal teams with powerful review and analysis capabilities, the ability to search across millions of documents in seconds, and the most flexible production capabilities available. And Ringtail is the only document review platform featuring both linear and visual review tools to dramatically improve the speed and consistency of review teams. Ringtail SaaS is built to deliver the promised efficiency and savings of cloud computing while meeting the unique legal requirements of e-discovery transforming the way e-discovery projects are managed.
Our electronic discovery professionals understand the technical intricacies and legal implications of data preservation and collection as well as the international protection and privacy issues that apply to electronic documents in these contexts. We can help design and implement defensible strategies to preserve, collect and analyze electronically stored information (ESI) regardless of format, language or location.
For more information visit www.FTITechnology.com/saas
As the world’s third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents.
For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu’s IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu’s White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security.
As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/
Gemalto is the global leader in digital security, with 2016 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world. Our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things. For more information, please visit: http://www.gemalto.com
Datang Gohigh Security (Zhejiang) Information Technology Co., Ltd. (hereinafter referred to as ” GohighSec “) was established in 2015 with registered capital of 10 million RMB Yuan. Is engaged in trusted computing, trusted cloud computing and information security technology and product research and development, production and sales of professional firms. The main products are universal trusted x86 servers, trusted storage, trusted network equipment, trusted cloud platform software and trusted industry solutions. GohighSec with independent intellectual property rights of trusted computing server and trusted cloud computing technology as the foundation, integration of trusted computing industry chain, leading to provide end-to-end product and solution, in order to realize information security escort.
Gohigh Data Networks Technology Co., Ltd (hereinafter referred to as Gohigh) is a high-tech enterprise which has integrated data industry-related technologies, products and resources from Datang Telecom Technology & Industry Group. Gohigh has been listed on Shenzhen Stock Market in 2003 (Stock Code SZ. 000851), and it is one of the two listed domestic companies of Datang Group.
GohighSec is a subsidiary of Gohigh. With research and development base in Beijing and Yiwu city, Zhejiang province. In Beijing, Shanghai, Nanjing, Jinan, Guangzhou, Chengdu have branch offices and service agencies.
Google’s cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements.
For more information, please visit http://www.google.com/apps/intl/en/business/index.html
Our core competences include IT security consulting, data protection, IT infrastructure architecture, quality assurance and managed services. We work in an interdisciplinary, proactive and expedient way. You can expect autonomy, rock-solid reliability and the ability to think outside the box from us.
Our mission is a reduced workload and business process optimization, so that you, as our client, cut costs, stress and attain your business objectives faster.
Any time you require rapid and competent help with an IT project, we should have a chat. We would be happy to show you how you can gain the maximum benefit from our work and increase your productivity.
HERE Technologies enables people, enterprises and cities around the world to harness the power of location and create innovative solutions that make our lives safer and more efficient. We transform information from devices, vehicles, infrastructure and other sources into real-time location services that play a key role in how we move, live and interact with one another.
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity solutions and services to enterprise organizations. Herjavec Group delivers SOC 2 Type 2 certified managed security services globally supported by a state-of-the-art, PCI compliant, Security Operations Centre (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with leadership positions across a wide range of functions including consulting, professional services & incident response. Herjavec Group has offices globally including head offices in Toronto (Canada), New York City (USA), Reading (United Kingdom) and Sydney (Australia).
Herjavec Group’s Managed Security Services practice defends enterprise level organizations globally from increasingly sophisticated, targeted cybercrime threats. Core managed services include: Security Information and Event Management, Intrusion Prevention and Detection, Application Security, Next Generation Firewall Management, Endpoint Protection, Data Loss Prevention, Web Proxy and URL Filtering and Vulnerability Management. Herjavec Group’s managed security service practice relies on two custom built technology pillars:
Herjavec Group Threat Framework – The Threat Framework allows dynamic and evolving threat modelling to be applied within any organizational environment. Herjavec Group focuses on meaningful security use cases to proactively identify attacks by applying the Framework to onboarded technologies & threat intelligence products in the customer’s environment. The Threat Framework covers key attack categories including Authentication, Targeted Attacks, Malware, DDOS and Traffic Anomalies.
Herjavec Group’s Analytics Platform – Herjavec Group’s Analytics Platform filters threat intelligence and customer data into actionable, relevant alerts. Alerts enriched using Herjavec Group’s Threat Framework are processed through the Platform, which automatically performs additional enriching functions including IP reputation look up, geo mapping, alert trending & deduplication, prior to preparing a readable output for Herjavec Group’s security analysts to review and action accordingly.
For more additional information or to engage a security specialist please visit www.herjavecgroup.com
Hewlett Packard Enterprisehttps://www.hpe.com/
HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible. HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits. With 90+ learning centers worldwide, numerous partner facilities and customer’s onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements. Visit HP: www.hp.com/learn Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video
HID Global® is the leading provider for innovative products, solutions and services that help organizations create, manage and use secure identities. Trusted by millions of customers around the world, HID Global provides comprehensive solutions to secure facilities, assets, networks and cloud resources.
HID Global will be the market leader for trusted identity solutions by providing seamless access and IP at the door solutions complemented by our Cloud Services. HID Global is dedicated to ensuring that when customers purchase Genuine HID products and solutions, they are purchasing absolute confidence in performance, value and service. HID Global is an ASSA ABLOY Group brand.
HKBN Enterprise Solutions Limitedhttp://hkbnes.net
Who We Are
HKBN is Hong Kong’s largest provider of residential high-speed fibre broadband service (symmetrical 100Mbps to 1000Mbps) by number of subscriptions, and a rapidly growing enterprise solutions provider. We offer a diverse portfolio of premier telecom solutions to personal and enterprise markets, including broadband, mobile, entertainment, voice communications, cloud solutions, data facilities and system integration.
We built and own one of the most extensive fibre optic networks in Hong Kong, which covers over 2.2 million residential homes passed, representing approximately 81% of Hong Kong’s total residential units, and more than 2,200 commercial buildings. In 2004, we successfully built the largest Metro Ethernet network in the world. In 2005, we became the first Internet Service Provider in Hong Kong to offer 1,000Mbps residential Fibre-to-the-Home service. In 2013, we completed our acquisition of Y5ZONE Limited and further extended our Wi-Fi business development. In 2016, we further strengthened our Enterprise Solutions business with the acquisition of New World Telephone Holdings Limited’s telecommunications and online marketing solutions business. For more information, please visit http://hkbnes.net.
Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world’s population. Huawei’s vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.
IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM’s capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: – understand threats and vulnerabilities in terms of business impact – respond to security events with security controls that optimize business results – prioritize and balance your security investments. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today’s business climate. IBM’s cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.
ID Quantique (IDQ)http://www.idquantique.com/
ID Quantique (IDQ) is the world leader in quantum-safe crypto solutions designed to protect data for the long-term future. The company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution solutions and services to the financial industry, enterprises and government organisations globally. IDQ also commercializes a quantum random number generator, which is the reference in the gaming and lottery industries. Additionally, IDQ is a leading provider of optical instrumentation products; most notably photon counters and related electronics. The company’s innovative photonic solutions are used in both commercial and research applications.
iManage is the leading provider of Work Product Management solutions for legal, accounting and financial services firms and the corporate departments they serve worldwide. Every day iManage helps professionals streamline the creation, sharing, governance and security of their work product. Over 3,000 organizations around the world—including more than 1,800 law firms—rely on iManage to help them deliver great client work. Headquartered in Chicago, iManage is a management-owned company. For more information, visit us at www.imanage.com, on twitter @manageinc or on LinkedIn.
We develop technology that incorporates profound contact center business and operation knowledge gathered during more than 15 years of successful implementations. We also provide consulting and professional services adhering to the best practices in the industry.
This allows us to deliver highly customized solutions, hosted either in your own datacenter or cloud-based, which are specially designed to reduce costs, improve service processes and provide a superior experience to your customers.
Informatica is a leading independent software provider focused on delivering transformative innovation for the future of all things data. Organizations around the world rely on Informatica to realize their information potential and drive top business imperatives. The Informatica Platform is an intelligent data platform, which includes data integration, data quality, master data management, data archiving and data security capabilities, to empower customers to transform raw, possibly unsafe, data into great data for more accurate insights and more effective decisions. More than 5,800 enterprises depend on Informatica to fully leverage their information assets residing on-premise, in the Cloud and on the internet, including social networks. For more information, call +1 650-385-5000 (1-800-653-3871 in the U.S.), or connect with Informatica at LinkedIn, @Informatica on Twitter and Facebook.
Infosys is a global leader in consulting, technology and outsourcing solutions with US$8.25 billion in annual revenues and 160,000+ employees. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. Infosys has a dedicated Enterprise Security & Risk Management (ESRM) unit with strong credentials in Security consulting and implementation services using majority of the industry’s leading products. Infosys’ security services spans across all aspects of Information Security & Compliance for enterprises including Governance, Risk Compliance (SOX/BASEL2/ HIPAA, PCI etc.), Identity & Access Management, Infrastructure security (Endpoint security, Network, Ethical hacking, Penetration testing etc.) and Application and Data security. Infosys has 1000+ consultants in Enterprise Security space. Infosys Cloud Security service offerings consists of a broad range of services tailored to suit the specific client context. It enable clients adopt Cloud and leverage the benefits of Cloud in a secure manner. Our Cloud Security services caters to private, public or hybrid cloud platforms and provides defense in depth security posture by applying relevant security controls across perimeter, internal network, endpoint devices, applications and data layers. Infosys also offers Managed Security Services through a highly flexible and customizable Security Operations Center (SOC) for managing and monitoring Cloud security. For further details you can contact firstname.lastname@example.org
As a leading total solution and service provider of cloud computing, Inspur is capable of providing total solution at IaaS, PaaS and SaaS levels. With high-end servers, mass storages, and cloud operating system and information security technology, Inspur offers advanced cloud computing infrastructure platform for its customers. Based on Inspur’s information softwares for government, enterprise and industry, as well as terminal products and solutions, this platform provides comprehensive support to the construction of smart government, and enterprise cloud and vertical industry cloud.
InstaSafe Technologies Pvt Ltdhttp://www.instasafe.com
Instasafe Technologies (www.instasafe.com) is a leading Cloud based Security-as-a-Service solution provider delivering comprehensive and uncompromising protection to mobile and remote workers enabling them to safely and securely access enterprise apps, email and web from anywhere on any network. Instasafe’s flagship product, Instasafe Secure Access (ISA) offers a hardware free, zero configuration, self-service style, fully redundant, Security-as-a-Service solution that can be deployed in minutes and scaled instantly as per customer requirement.
Instasafe Web Security (IWS) offers a hardware free, cloud based security solution that is easy to deploy and manage, is scalable and helps you control your bandwidth consumption while protecting your organisation from web threats.
For more information, visit http://www.instasafe.com.
Intel Security is comprised of a portfolio of client & data center cloud security products that use API Management at the cloud edge and trusted execution technology within the datacenter to provide a secure client to cloud connection. Learn more about Intel’s cloud security products at www.intel.com/content/www/us/en/cloud-for-all/cloud-for-all.html.
Intility is a complete, cloud-based platform for Workplace-as-a-Service and digitization. The Intility platform is an enabler for companies to utilize information technology more efficiently, increasing their productivity and reaching their business goals.
The Intility platform is continually upgraded with new functionality and supports an increasing number of integrated cloud services such as Microsoft Azure, Office 365, Amazon Web Services and Salesforce.
Intility is currently utilized by more than 500 companies.
KPMG LLP is an audit, tax and advisory services firm that specializes in delivering business, technical, regulatory/tax, assurance, security, and management guidance to clients considering the cloud.
Since LeadSec was engaged in the information security industry in 1999, it has grown as a leading enterprise engaged in China’s information security industry by taking “building China’s new Great Wall of information security” as our own responsibility under the wholehearted support from the LeadSec family and kind help from mass users. We own numerous core techniques in the information security area and have successively applied for over 50 patents. We own 10 categories of over 370 models of full series firewalls, VPN, UTM, IDS, IPS, anti-virus gateways, security isolation gatekeepers, security management systems, etc in total and are the enterprise with the fullest information security product lines in China. As a core technical supporting unit responsible for the national information security notification, we have been involved in preparation of Guidance to the implementation of E-government information security classified protection, the Guide on implementation of classified security protection of information systems, the Risk assessment guidelines for information security, etc, and have undertaken multiple major pilot test projects related with national security. As a representative of the nation’s information security enterprises, we have always been taking the head in China’s information security industry.
LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC) and information security (InfoSec) software. The company’s flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. LockPath serves a client base of global organizations ranging from small and midsize companies to Fortune 10 enterprises in more than 15 industries. The company is headquartered in Overland Park, Kansas. For more information on LockPath and the Keylight platform, visit lockpath.com. Follow LockPath on LinkedIn and on Twitter at @LockPath and @KeylightGRC for the latest in industry, company and product news.
McKesson is dedicated to delivering the vital medicines, supplies and information technologies that enable the health care industry to provide patients better, safer care.
McKesson is made up of many businesses, all serving the health care industry. Our businesses fall into one of two primary categories:
Distribution solutions. We are the largest pharmaceutical distributor in North America, distributing one-third of the medicines used every day. We supply more than 40,000 U.S. pharmacy locations, from Wal-Mart to the Department of Veterans Affairs to community pharmacies and hospitals.
Technology solutions. We develop and install health care information technology systems that eliminate the need for paper prescriptions and paper medical records. Our software and hardware are used in more than 70% of the nation’s hospitals with more than 200 beds.
MetricStream is a market leader in enterprise-wide Governance, Risk, Compliance (GRC) and Quality Management Solutions. MetricStream solutions are used by leading global corporations in diverse industries such as Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-tech and Manufacturing to manage their risk management programs, quality management processes, regulatory and industry-mandated compliance and other corporate governance initiatives. MetricStream’s customers include Procter & Gamble, UBS, Societe Generale, Pfizer, Philips, Cummins, Kellogg’s, Mondelez International, SanDisk, and NetApp. MetricStream also owns and operates www.ComplianceOnline.com portal – the largest GRC advisory network and one of the largest GRC communities. MetricStream is headquartered in Palo Alto, California, USA (www.metricstream.com).
Microsoft provides the most comprehensive approach to cloud computing, so that you can harness the full power of the cloud on your terms. Whether in your datacenter, with a service provider, or from a Microsoft’ datacenter and whether in a private cloud using HyperV™, a public cloud with Windows Azure™, or software as a service environment with Office365 Microsoft provides the flexibility and control to consume IT as a service in a way that best meets your unique business needs. Visit www.microsoft.com/cloud to find out more.
nCircle is the leading provider of IT risk and security performance management solutions. Organizations of all sizes use nCircle solutions to automate compliance, reduce risk and achieve higher levels of security and operational efficiency. nCircle has won numerous awards for growth, innovations, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information is available at www.ncircle.com, http://benchmark.ncircle.com, and http://purecloud.ncircle.com.
NetApp creates innovative storage and data management solutions that accelerate business breakthroughs and deliver outstanding cost efficiency. Our dedication to principles of simplicity, innovation, and customer success has made us one of the fastest-growing storage and data management providers today. Customers around the world choose us for our “go beyond” approach and broad portfolio of solutions for server-to-storage virtualization, business applications, data protection, and more. Our solutions provide nonstop availability of critical business data and simplify business processes so companies can deploy new capabilities with confidence and get to revenue faster than ever before. Discover our passion for helping companies around the world go further, faster at www.netapp.com.
Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.
NetWitness helps organizations in over 160 countries dramatically improve their ability to defend against advanced threats. NetWitness NextGen is the only network monitoring product on the market today that allows users to: analyze and model hundreds of terabytes of live network traffic in real-time; generate automated, comprehensive analyses that can be easily understood by both cyber analysts and non-technical personnel, and integrate third party threat feeds and create actionable network intelligence. Based upon a dedicated and extensible full packet capture and session analysis infrastructure that can be used within enterprise cloud and virtual environments, NextGen performs both rules-based and interactive session analysis across the entire network protocol stack, up to the application layer. NetWitness NextGen is designed for organizations to address concurrent problems of insider threat management, data leakage protection, network forensics and incident response, compliance verification, network e-discovery, designer malware and zero-day threat detection. NetWitness customers include Defense, National Law Enforcement and Intelligence Agencies, Top US and European Banks, Critical Infrastructure, and Global 1000 organizations. NetWitness has offices in the U.S. and the U.K., and partners throughout North and South America Europe, the Middle East, and Asia. Download a freeware version of NetWitness and see what you’ve been missing on your network: http://download.netwitness.com.
New Relic is a software analytics company that makes sense of billions of metrics about millions of applications in real time. New Relic’s comprehensive SaaS-based solution provides one powerful interface for web and native mobile applications and consolidates the performance monitoring data for any chosen technology in an environment. There are thousands of active customer accounts using New Relic’s cloud solution every day to optimize more than 200 billion metrics for 3 million applications. New Relic is pioneering a new category called Software Analytics.
Nixu Corporation is a cybersecurity company. We work to improve our clients’ cybersecurity in solution areas of Corporate IT, Digital Business and Industrial Internet. Our clients trust Nixu in projects where developing, implementing or assessing of information security is a must. We ensure the confidentiality of our clients’ data, business continuity and ease-of-access to digital services through planning and mitigation of cybersecurity risks.
Phone number: +358 9 478 1011
Nokia is a global leader in the technologies that connect people and things. Powered by the innovation of Nokia Bell Labs and Nokia Technologies, the company is at the forefront of creating and licensing the technologies that are increasingly at the heart of our connected lives.
With state-of-the-art software, hardware and services for any type of network, Nokia is uniquely positioned to help communication service providers, governments, and large enterprises deliver on the promise of 5G, the Cloud and the Internet of Things.
With over 20 years of experience, Novell is a leader in identity management and security solutions. Novell delivers a web-based identity and access management solution that is based on open standards. Novell’s solution provides out-of-the-box integration with leading enterprise identity stores, comprehensive compliance reporting of all user activity, centralized just-in-time provisioning and much more.
For security specifically, Novell offers an innovative web-based security service for Cloud Providers e.g. Saas applications more secure and manageable for the enterprise. It extends beyond simple sso functionality to provide enterprises the ability to extend their identities, policies, audits and workflow from the enterprise to the cloud infrastructure.
NSFOCUS is a leading provider of vulnerability assessment, Web Application Firewall (WAF), Network Intrusion Prevention System (NIPS), Anti-DoS, content security gateway, and etc. Powered by its 10+ years of security vulnerability research, NSFOCUS has been the major contributor of security vulnerability research at the industry by freely sharing and resolving over tens vulnerabilities from critical applications.In conjunction with security hardware appliances and software, NSFOCUS has been delivering security services through Security As A Service (SaaS), including web reputation service, vulnerability assessment, Anti-DDoS and etc. Its customers come from government, finance, telco operators, ISP, power providers, etc.
NTT Innovation Institute Inc. (NTT I³, pronounced NTT I Cube) is a new R&D center of NTT Group, the global leader of information and communication technology (ICT) services. NTT I³ aims to accelerate the global development of the NTT Group, through open innovation, by leveraging its Silicon Valley location and tapping into the rich talent pool of the valley. Our best practices in North America will be formulated into modular intellectual properties and rolled out globally, to NTT’s Global marketplace.
Currently, NTT I³ focuses on “Global Cloud Services” as the cornerstone of NTT’s business operations. NTT I³ is developing modularized intellectual properties based on a deep understanding and analysis of the latest market needs in the areas of security and cloud computing. These intellectual properties are designed to best satisfy various, ever-evolving market needs in a globally scalable and cost competitive manner.
Carrying on the world renown NTT R&D heritage, NTT I³ strives to set a new global standard of agility, quality, and value creation in pursuit of open service innovation.
NTT Security is the specialized security company of NTT Group. With embedded security we enable Group companies (Dimension Data, NTT Communications and NTT Data) to deliver resilient business solutions for clients’ digital transformation needs. NTT Security has 10 SOCs, seven R&D centers, over 1,500 security experts and handles hundreds of thousands of security incidents annually across six continents.
NTT Security ensures that resources are used effectively by delivering the right mix of consulting and managed services for NTT Group companies – making best use of local resources and leveraging our global capabilities. NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest ICT companies in the world. Visit nttsecurity.com to learn more.
Okta is an enterprise grade identity management service that is built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta enterprises can simply and securely manage access to cloud, mobile and on premises applications across employees, partners and customers.
Accessible via an intuitive, consumer Web interface or a broad set of RESTful web services, Okta provides directory services, single sign-on, strong authentication, provisioning, workflow, and analytics as a complete, integrated solution. Okta offers identity management from the cloud on a secure, reliable, SOC2 Type II audited platform that covers all of the applications, directories, identity systems, devices, organizations and people that are a part of today’s IT reality. Whether it is in the cloud, on a mobile device, or behind your firewall Okta’s got it covered.
Enterprises everywhere including Activision, Allergan, BMC Software, Comcast, Colorox, Groupon, Informatica, LinkedIn, Purolator, Shortel and SAP are using Okta to increase security, improve user productivity, reduce IT costs, and ensure compliance.
The Okta team has built and deployed many of the world’s leading on-demand and enterprise software solutions from companies including Salesforce.com, PeopleSoft, Microsoft, BMC, Arcsight, Sun, and HP. Okta is backed by premiere venture investors Andreessen Horowitz, Greylock Partners, and Khosla Ventures.
Onapsis is the pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.
Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, Deloitte, E&Y, IBM, KPMG and PwC, as well as cloud providers including Amazon Web Services and Virtustream.
For more than 20 years, Hyland has been dedicated to meeting organizations’ needs for document and process management with OnBase, an enterprise content management (ECM) solution. As OnBase has evolved through consistent product innovation, it remains focused on automating business processes that depend on documents, content and people to operate more effectively. OnBase is the pioneer of ECM in the cloud. Since 2000, the OnBase Cloud has been empowering more than 600 organizations around the world to better manage the content that surrounds their processes. The OnBase Cloud connects people to the content, data and processes they need to make more informed decisions – without additional infrastructure needs. Employee productivity increases as they spend less time searching for paper and dedicate more time to providing quality service to customers. For more information about OnBase cloud-based and hosted solutions, please visit www.onbase.com/OnBaseCloud
We are at the beginning of a perfect storm. Three main factors are converging. The world wants to be more connected. There is a massive explosion and churn of infrastructure, application and data. And, threat volume and sophistication are continuing to grow exponentially each and every day.
The world needs us today more than ever. We are an enabler, delivering a path forward rather than focusing purely on defense. We help organizations manage risk, compliance and security. But, we also help them to balance ideal with realities and maturity. We are unique. We deliver security programs that combine products and services, people, processes, strategies and tactics.
Our premier relationships and know-how allow us to bring together Optiv offerings with those from the vendor community. We are focused on assembling the right solution for each client’s specific needs and applying it to their business priorities.
We are a trusted partner. We understand it all. We do it all and can help clients execute. We focus on our clients’ success without an agenda.
Thousands of customers worldwide trust OutSystems, the number one low-code platform for rapid application development. Engineers with an obsessive attention to detail crafted every aspect of the OutSystems platform to help organizations build enterprise-grade apps and transform their business faster. With OutSystems, you visually develop your entire application, easily integrate with existing systems, and add your own custom code when you need it. Visit us at www.outsystems.com, or follow us on Twitter @OutSystems or LinkedIn at www.linkedin.com/company/outsystems.
Palerra designed LORIC to provide continuous compliance, threat visibility, and incident response for an organization’s entire cloud footprint (SaaS, PaaS, and IaaS) in a single platform. It automates all steps of the security lifecycle to enable organizations to keep pace with the rapidly increasing volume of cloud usage as well as the velocity of change in the threat landscape. LORIC does so without any hardware or software, and does not impact the native user experience for cloud usage. Palerra is a privately held company funded by Norwest Venture Partners and Wing Venture Partners. It is headquartered in Santa Clara, CA. Learn more at https://www.palerra.com/ and continue the conversation on Twitter at @palerrainc
Palo Alto Networkshttp://www.paloaltonetworks.com/
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.
PeopleDoc is on a mission to make the difficult job of HR easier. The PeopleDoc HR Service Delivery platform helps HR teams more easily answer employee requests on demand, automate employee processes, and manage compliance across multiple locations. PeopleDoc cloud solutions include case management, process automation and employee file management.
100% software as a service, PeopleDoc solutions integrate with existing HR systems, can be implemented in 8-12 weeks, and are designed for agile ongoing use by HR teams serving diverse workforces. PeopleDoc serves more than 500 clients with employees in 165 countries in nine languages with a 100% customer retention rate. More information is available at www.people-doc.com.
The Perspecsys Cloud Data Protection Gateway allows organizations to protect their sensitive business data when using popular cloud applications such as Oracle CRM On Demand and salesforce.com. Any information that leaves an enterprise’s environment and enters the cloud can be tokenized or encrypted (using strong FIPS 140-2 encryption modules), ensuring that data remains undecipherable when it is being processed or stored in the cloud. Companies use Perspecsys to ensure compliance with Data Residency regulations or to satisfy requirements associated with sector specific regulations such as PCI DSS, HIPAA, SARBOX, and GLBA. A key benefit of the solution is its ability to preserve end-user functionality, such as the ability to Search or Sort, on data-fields that have been tokenized or encrypted (even when using FIPS 140-2 cloud encryption).
Perspecsys’ solution integrates easily into an enterprise SaaS implementation. Installed inside of an organization or at its IaaS provider (such as Fujitsu or Amazon AWS), Perspecsys’ software resides transparently between the application and its users, intercepting critical data before it is passed to the application in the cloud, and replacing it with a random token or encrypted value that is meaningless when viewed outside the Perspecsys Cloud Data Protection Gateway.
Find out today how Perspecsys can make your organization more secure. Click here to schedule a demo.
PGP Corporation is a global leader in email and data encryption software for enterprise data protection. Based on a unified key management and policy infrastructure, the PGP® Encryption Platform offers the broadest set of integrated applications for data security. PGP® platform-enabled applications allow organizations to meet current needs and expand as security requirements evolve. From the datacenter, to the endpoint and beyond, PGP® solutions protect data whether it is at rest, in motion or in use.
Pivotal’s cloud native platform drives software innovation for many of the world’s most admired brands. With millions of developers in communities around the world, Pivotal technology touches billions of users every day. After shaping the software development culture of Silicon Valley’s most valuable companies for over a decade, today Pivotal leads a global technology movement transforming how the world builds software.
PrecisionLender is a pricing management platform used by thousands of relationship managers at banks ranging in size from less than $1 billion to greater than $1 trillion. Andi®, PrecisionLender’s virtual pricing analyst, uses artificial intelligence to glean insights from the thousands of deals priced daily in the platform. Delivering the right information at the right time helps bankers create a better experience for their customers. For more information, visit www.PrecisionLender.com.
PRO Unlimited, through its purely vendor-neutral Managed Services Program (MSP) and Vendor Management Software (VMS) solutions, helps organizations address the costs, risks, and quality issues associated with managing a contingent workforce. A pioneer and innovator in the VMS and MSP space, PRO offers solutions for e-procurement and management of contingent labor, 1099/co-employment risk management, and third-party payroll for client-sourced contract talent.
For further information, visit PRO at http://www.prounlimited.com, and follow us on Twitter @ProUnlimited.
Qihoo 360 Technology Co. Ltd. (Qihoo 360) is a leading Internet company in China as measured by its active user base. Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users. With friendly and interactive user experience and leading cloud-based Internet security technologies, Qihoo 360’s products are trusted by massive and loyal users who enjoy Qihoo 360’s real-time protection for their daily online activities. Recognizing security as a fundamental need of all Internet and mobile users, Qihoo 360 has built the large user base by offering comprehensive, effective and user-friendly Internet and mobile security products and services to protect users’ computers and mobile devices against malware and malicious websites. Qihoo 360’s products and services are supported by the cloud-based security technology, which Qihoo 360 believes is one of the most advanced and robust technologies in the Internet security industry. Qihoo 360 also provides users with two very important secure access points to Internet: web browsers and app store. Qihoo 360 currently monetizes the massive user base primarily through offering online advertising and Internet value-added services. Founded in September 2005, Qihoo 360 is now a big family with more than 4,500 employees. On March 30th 2011, Qihoo 360 was listed on NYSE under the ticker “QIHU” as the first Chinese security company. Today Qihoo 360’s market cap reaches approximately $10 billion. All these incredible achievements have been reached by Qihoo 360’s hard-working and creative team only within 8 years.
Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users in China.
Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.
QuantumCTek Co., Ltd. is the first and biggest provider of multi-protocol network security products and services based on quantum technology, in China. The company produces state-of-the-art quantum communication systems and series of innovative opt-electronic units with the commercial applications for the financial industry, government organizations and other enterprises, as well as the research applications for the scientific societies.
Initially founded by the Chinese leading quantum physics research group from Hefei National Laboratory for Physical Science at Micro-scale (HFNL), University of Science and Technology of China (USTC), the company is continually transferring cutting-edge scientific and technical achievements into mature commercial products, making great efforts to promote wide-range applications of quantum technology and forming the Chinese quantum industry.
QuintessenceLabs is a global leader in quantum security, with offices located in Australia and the United States and a growing UK presence. At the forefront of the commercial development of quantum security solutions, we deliver unique high-value cybersecurity and information assurance capabilities.
- the world’s fastest true random number generator
- advanced, interoperable, key and policy manager
- integrated encryption solutions for on premise or in-cloud implementations
Our Security Products integrate seamlessly into existing systems, while building a strong foundation for future data security systems. By centralizing the management and control of data-security policy and harnessing quantum science properties to strengthen data security solutions, QuintessenceLabs solutions uniquely maximize security, increase ROI from existing assets and reduce data-security complexities.
Quzara.com is a high-growth cyber security start-up geographically situated within the technical corridor of the DC metropolitan area in Reston, Virginia. Quzara’s focus areas are on Cloud Security, Enterprise Security and FedRAMP Certification. Additional services range from performing technical assessments for application migration to cloud managed services for vulnerability assessments.
The Rackspace Cloud provides on-demand and scalable website, application and storage hosting backed by Fanatical Support®. Through an integrated suite of cloud solutions – Cloud Sites™, Cloud Files™ and Cloud Servers™ – The Rackspace Cloud enables astute developers and IT managers to trade the hassles, upfront investments and high costs for a hosting environment that scales easily when traffic fluctuates.
For more information about The Rackspace Cloud, visit www.rackspacecloud.com or call 1-877-934-0409.
Rapid7 (NASDAQ:RPD) is trusted by IT and security professionals around the world to manage risk, simplify modern IT complexity, and drive innovation. Rapid7 analytics transform today’s vast amounts of security and IT data into the answers needed to securely develop and operate sophisticated IT networks and applications. Rapid7 research, technology, and services drive vulnerability management, penetration testing, application security, incident detection and response, and log management for more than 6,300 organizations across more than 120 countries, including 39% of the Fortune 1000. To learn more about Rapid7 or join our threat research, visit www.rapid7.com.
Raytheon Company, with 2011 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. With a history of innovation spanning 90 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services. With headquarters in Waltham, Mass., Raytheon employs 71,000 people worldwide. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter at @raytheon.
Ribose helps individuals and organizations worldwide work together effectively and securely through its social collaboration platform. By focusing on the “whole of collaboration”, Ribose has taken online social collaboration to a new level. Whether planning simple events or running complex projects, you will find that Ribose makes it easy, effective and genuinely fun. Ribose is free to use: http://www.ribose.com.
RiskVision, formerly Agiliance, founded in late 2005, is the leading independent provider of Security and Operational Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. RiskVision ™ enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, RiskVision customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by RiskVision’s configurable platform and applications, with a broad library of technology integrations, and GRC content. RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. RiskVision’s Cloud Risk Management Service implements the CSA GRC Stack and Threat Matrix in RiskVision to provide an assessment and risk management toolkit for enterprises, cloud providers, security solution providers and IT auditors. At the heart of this service is RiskVision’s Common Control Framework (CCF) which maps the CSA Cloud Controls Matrix to NIST, ISO, and COBIT frameworks along with PCI and HiTech/HIPAA regulations, to output SAS 70 II and SSAE 16 reports.Customers have a broad set of product delivery options and a comprehensive set of managed and implementation services to address all phases of deployment. Customers can also access the RiskVision Cloud on Demand to provide beta product feedback, test new patches and upgrades, run proof of concepts (POCs), and provide community contributions such as workflows and reports, as well as attend half-yearly RiskVision advisory councils.
RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance.
RSA offers industry-leading solutions in identity assurance and access management, encryption, security information management and anti-fraud protection, bringing trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.
Saba delivers a cloud-based intelligent talent management solution used by leading organizations worldwide to hire, develop, engage and inspire their people. With machine learning at its core, Saba Cloud offers proactive, personalized recommendations on candidates, connections and content to help employees and businesses lead and succeed. It is purpose-built on a highly scalable platform that exceeds industry security and reliability standards. Saba has more than 31 million users and 2,200 customers across 195 countries and 37 languages. Learn more about intelligent talent management at www.saba.com.
Safe-T Data (www.safe-t.com) is the provider of solutions designed to mitigate attacks on business-critical services and data for a wide range of industries, including: financial, healthcare, government, etc. Safe-T’s High-risk Data Security (HDS) Solution mitigates data threats: un-authorized access to data, services, networks, or APIs; as well as data related threats, including data exfiltration, leakage, malware, ransomware, and fraud.
Companies and Governments around the world trust Safe-T to secure their data, services, and networks from insider and external data threats. Focused on providing security solutions for the enterprise market, Safe-T enables organizations to benefit from enhanced productivity, efficiency, heightened security, and improved regulatory compliance.
Safe-T operates in North America, APAC, Africa, Europe, and Israel.
Beijing Sansec Technology Development Co.,Ltd. is a company focusing on encryption based information security solutions. Sansec is a member of the National Cryptography Standardization Technical Committee, and has participated the formulation of more than 10 standards. Sansec’s cryptographic products, such as PCI-E attached HSM(Hardware Security Module), financial HSM, Network attached HSM, encrypted storage gateway, key management systems, have got a large market share in China. With the rapid development of cloud computing, Sansec have developed high performance PCIE-HSM that supports virtualization, Cloud HSM/Cloud Cryptographic Services platform, encrypting gateway/middleware that supports various data types, etc. These products can be integrated to provide protections for the whole life cycle of the data in cloud. We believe cryptographic based security technology will be more and more important for cloud computing. We will provide customized encryption solutions for the cloud applications, and we are transforming into a cloud security service provider. Sansec’s logo is in the attachment in ai format.
Saviynt is an innovative leader in providing application, data and infrastructure access governance and intelligence platform for Cloud and Enterprise. Saviynt uniquely delivers IGA 2.0 by integrating advanced usage & risk analytics with fine-grained privilege management. Saviynt’s completely managed IDaaS platform ensures a worry free adoption of Identity, Governance & Administration (IGA) services to secure critical enterprise assets. For more information, visit www.saviynt.com.
The SecurityScorecard Security Risk Benchmarking platform ingests millions of relevant threat intelligence signals to help organizations predict and mitigate security risk against their enterprise, their third-parties and benchmark against their industry peers.
SecurityScorecard helps enterprises gain operational command of their third-party security risk through continuous and passive monitoring of third party security hygiene in areas like application security, patching cadence, network security and passwords exposed. SecurityScorecard helps customers collaborate with their third parties in to decrease risk associated with their ecoysystem.
ServiceNow is changing the way people work.
With a service‑orientation toward the activities, tasks and processes that make up day‑to‑day work life, we help the modern enterprise operate faster and be more scalable than ever before. Customers use our service model to define, structure and automate the flow of work, removing dependencies on email and spreadsheets to transform the delivery and management of services for the enterprise. ServiceNow enables service management for every department in the enterprise including customer service, IT, human resources, facilities, field service and more. We deliver a ‘lights‑out, light‑speed’ experience through our enterprise cloud – built to manage everything as a service.
To find out how, visit www.servicenow.com.
Skyhigh Networks, the world’s leading Cloud Access Security Broker (CASB), enables enterprises to safely adopt SaaS, PaaS and IaaS cloud services, while meeting their security, compliance and governance requirements. With more than 600 enterprise customers globally, Skyhigh provides organizations the visibility and management for all their cloud services, including enforcement of data loss prevention policies; detecting and preventing internal and external threats; encrypting data with customer-controlled keys; and implementing access-control policies.
Spanning Cloud Apps, the most trusted provider of SaaS backup and recovery, prevents data loss with automated backup and accurate restores for Google Apps and Salesforce.com. Spanning Backup is a powerful, reliable enterprise-grade solution trusted by thousands of businesses and educational institutions. Visit: www.spanning.com and follow @SpanningBackup.
SSH Communications Securityhttps://www.ssh.com
As the creators of the SSH protocol which is used in nearly every network today, we understand the need to balance access with security. Our platform based approach to address controls and management for Secure Shell access as well as encrypted traffic monitoring provides the only solutions on the market that address; security, compliance and operational efficiency in today’s complex enterprise environments. Please visit ssh.com or reach us directly at email@example.com
StatPro is a global provider of award winning portfolio analytics solutions for the investment community. The Group’s cloud-based platform provides vital analysis of portfolio performance, attribution, risk and compliance. This multi-asset class analytics platform helps StatPro’s clients increase assets under management, improve client service, meet tough regulations and reduce costs.
The Group’s integrated and global data coverage includes over 3.2 million securities such as equities, bonds, mutual funds, FX rates, futures, options, OTCs, sector classifications and much else besides. StatPro also covers most families of benchmarks including MSCI, FTSE, Russell, NASDAQ and the open source Freedom Index.
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.
As a holding company, her founding shareholders are well-recognized leaders in their own field of work. The Chairman’s family owns one of the largest container shipping companies in the world. Another shareholder founded and world’s largest contract electronics manufacturer and the third-largest information technology company by revenue. There are also shareholders that were once early stage investor of one of the largest Internet companies in China and one of the largest FMCG group in Greater China region or had worked as a country’s Trade Ambassador to many countries.
Since 2008, the founding shareholders have watched the adoption of cloud computing with interested. Together, the founding shareholders believe that the future will be built upon cloud computing where the cloud will be leveraged to build a larger ambient computing environment that is pervasive, ubiquitous and sometimes, intelligent. In an ambient intelligence world, devices work in concert to support people in carrying out their everyday life activities, tasks and rituals in an easy, natural way using information and intelligence that is hidden in the network connecting these devices.
As such, TanoSecure was founded by these entrepreneurs who believe that it is time for them to contribute back to the society and leave behind a legacy that will be impactful to mankind for years to come.
Tata Communications is a global company with its roots in the emerging markets. Headquartered in Mumbai and Singapore, it has more than 8,000 employees across 38 countries. The $3.2 billion company is listed on the Bombay Stock Exchange and the National Stock Exchange of India and is the flagship telecoms arm of the $103.3 billion Tata group.
Tata Consultancy Serviceshttp://www.tcs.com
Tata Consultancy Services (TCS) is a global leader in IT services, digital and business solutions that partners with its clients to simplify, strengthen and transform their businesses. We ensure the highest levels of certainty and satisfaction through a deep-set commitment to our clients, comprehensive industry expertise and a global network of innovation and delivery centers.
TCS has been recognized by Brand Finance as one of the Big 4 Global IT Services Brands. Our continued industry-leading growth is a testament to the certainty our clients experience every day.
Telecom Italia is one of the most important telecommunications and ICT operators in Italy as well as being a major telco provider in Latin America.
In the domestic market the Group provides fixed and mobile telecommunications, internet and media services, office systems and solutions for businesses, research and development.
Telecom Italia has an extensive network consisting of the latest transmission technologies ranging from fibre optics to xDSL; it provides fibre optic back-bones in Europe and South America.
Moreover, by leveraging its back-bone and network capacity Telecom Italia it is able to provide cloud computing service platforms to customers ensuring end-to-end security and quality performance.
Tencent Cloud Computing (Beijing) Limitedhttps://www.qcloud.com/
Tencent Cloud is committed to provide high-quality cloud services including cloud computing, cloud data and cloud operations for enterprises and entrepreneurs. Based on the years of massive cloud-based business technology, it covers many areas such as infrastructure to ne operation, platforms to ecological capacity, games, videos, mobile applications, nance, government and etc. Also industry solutions, and building cloud servers, cloud database, audio, video and a series of entertaining products are Tencent cloud’s coverage.
腾讯云基于腾讯多年来海量业务的技术锤炼，从基础架构到精细化运营，从平台实力到生态能力建 设，通过游戏、视频、移动应用、金融、政企等行业解决方案和云服务器、云数据库、音视频等一 系列明星产品服务的打造，致力于为企业和创业者提供集云计算、云数据、云运营于一体更优质的 云端服务体验，成为全球领先的云服务提供商。
Tenet Healthcare Corporation is a diversified healthcare services company with more than 125,000 employees united around a common mission: to help people live happier, healthier lives. Through its subsidiaries, partnerships and joint ventures, including United Surgical Partners International (USPI), the company operates 80 general acute care hospitals, 18 short-stay surgical hospitals and over 400 outpatient centers in the United States, as well as nine facilities in the United Kingdom. Tenet’s Conifer Health Solutions subsidiary provides technology-enabled performance improvement and health management solutions to hospitals, health systems, integrated delivery networks (IDN), physician groups, self-insured organizations and health plans. Tenet also operates six health plans.
Thales e-Security is a leading global provider of information security providing data encryption solutions to the financial services, manufacturing, government and technology sectors. With a 40 year unrivalled track record of protecting corporate and government information, Thales solutions protect our customers most sensitive data and is used by four of the five largest energy and aerospace companies, government networks around the world, and secures more than 80 percent of the worldwide payment transactions. Thales e-Security has offices in Japan, Hong Kong, United Kingdom and the United States and is represented in over 90 countries around the world. For more information, visit www.thales-esecurity.com
ThousandEyes provides IT performance management for the cloud era. With the adoption of cloud applications, enterprises are becoming heavily reliant on networks outside of their control. This creates new challenges in troubleshooting performance issues, both inside and outside the corporate network. ThousandEyes provides detailed visibility beyond the corporate network perimeter, identifies the root cause of performance problems with cloud applications and enables distributed collaboration to resolve problems quickly.
With over two decades of expertise in Endpoint, Messaging and Web Security, Trend Micro provides individuals, and organizations of all sizes, with smarter security solutions that protect against a wide range of insidious threats and combined attacks including viruses, spam, phishing, spyware, botnets and other Web threats, such as data-stealing malware. Trend Micro develops, delivers, and supports proactive cloud-based solutions designed to safeguard critical information and protect personal and corporate reputations. As an industry leader in security intelligence, Trend Micro’s mission is to secure the exchange of digital information by providing the most flexible and customizable Internet Content Security solutions available.
Trintech is the leading provider of financial software solutions for the Record-to-Report process. Over 800 clients in 100 countries – including half of the Fortune 50 and the FTSE 100 – rely on our solutions to optimize resources, reduce costs, manage risk and monitor activities across the entire finance organization worldwide. Trintech’s Cloud-based Cadency™ software automates the entire R2R cycle – including account reconciliation, close management, compliance, and financial reporting. Trintech’s offices are located in the United States, the United Kingdom, The Netherlands, Australia, France, Ireland and the Nordics, with partners in South Africa, Latin America and across the Asia Pacific region. www.trintech.com.
Certification Competence Center
TÜV AUSTRIA Deutschland GmbH (TAD)
Tel: +49 (0)711 7223360140
Fax: +49 (0)711 7223360149
Falkenweg 1 D- 70794 Filderstadt
The TÜV AUSTRIA Deutschland GmbH (TAD) represents the offical Certification-Office of the TÜV AUSTRA GROUP concerning the certification of management-systems for IT-Security like ISO 27001 or CSA STAR. The TÜV AUSTRIA Group is an international group of companies with branches in more than 40 countries and with 1,400 employees worldwide. Services range from testing elevators and pressure equipment, plant safety, training & further education, medical devices, electric engineering, environmental protection, IT security, loss adjustment, certifications, calibrations, technical due diligence, legal compliance checks, and product testing through to the testing of stage and photovoltaic systems as well as wind turbines.
Universal Compute Xchange (UCX)http://ucxchange.com/
UCX has created an electronic spot exchange to help Enterprise Organizations and Cloud Service providers manage their financial IT Infrastructure risk exposure by trading the cloud as a commodity. UCX has created the first centralized, transparent exchange that brings both enterprise organizations and cloud service providers together to engage in price discovery, trade execution and the physical delivery of compute resources using one standard unit of measure, providing “apples to apple” comparisons, operational agility, market and capital efficiencies.
Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive has developed a set of advanced encryption techniques to allow for processing of encrypted data residing in the cloud including search, sort and index — while enterprise IT retains control of the encryption keys. Optimized for Microsoft® Office 365 and Hosted Exchange, the Vaultive platform supports best practices for encryption in use, while maintaining the benefits of cloud computing.
Founded in 2009 by a team of information security veterans, Vaultive’s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service.
Founded in 1996, Venustech is the leading provider of network security products, trusted security management platforms, specialized security services and solutions. Venustech has provided security equipments and solutions for over 30,000 users worldwide, including more than 30 firms of the fortune global 500, over 80% of Chinese banking institutions and over 60% of China’s large state-owned enterprises, as well as all Chinese telecom carriers. Venustech owns the first enterprise-level Postdoctoral Station for network security in the nation, and the certified state-level network security R&D center with over 200 developers. Venustech has applied for hundreds of technical patents and won numerous pioneering achievements in the industry: China’s first IDS hardware product, China’s first distributed vulnerability scanning system, China’s first 10 Gigabit multi-core UTM platform, and realization of significant breakthrough in 10 Gigabit UTM core technology.
Virtustream, an EMC Federation company, is the enterprise-class cloud service and software provider trusted by enterprises worldwide to migrate and run their mission-critical applications in the cloud. For enterprises, service providers and government agencies, Virtustream’s xStream management platform and Infrastructure-as-a-Service (IaaS) meets the security, compliance, performance, efficiency and consumption-based billing requirements of complex production applications in the cloud – whether private, public or hybrid.
Vodafone Cloud & Hosting cover all aspects of data centre, server, security and storage infrastructure; from design and build to management and operation. We help CIOs and IT departments reduce costs, focus their resources and drive business strategy.
Vormetric is the leader in enterprise systems encryption and key management for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to encrypt any file, any database, any application, anywhere it reside. Vormetric achieves strong encryption without sacrificing application performance or creating key management complexity. The most security conscious organizations and government agencies in the world, including 7 of the Fortune 10, have standardized on Vormetric to provide strong, easily manageable data security. For more information visit www.vormetric.com.
WALLIX is a software company offering privileged access management solutions for large and medium sized enterprises, public organizations and cloud service providers. Our mission is to help our customers protect their critical IT assets including data, servers, terminals and connected devices through a single tool, the Wallix AdminBastion (WAB) Suite, which provides them with the most effective route to security and compliance by reducing their biggest security risk – privileged access to IT – in the shortest possible time. With an unobtrusive architecture, full multi-tenancy, and virtual appliance packaging, WAB Suite is the easiest solution in its category to implement, use and manage. Praised by SC Magazine as a “unique approach to the entire privileged account management problem”, the solution received a five-star rating as well as the mention “Best Buy”. Its best of breed features which include password management, web access portal, access control and comprehensive session monitoring and recording can be deployed easily and securely on premise or in a hybrid cloud environment.
Thanks to an all in one solution which provides businesses with the ability to meticulously trace super users’ activity on their most sensitive accounts, WAB Suite secures firms’ biggest IT security risks in the shortest possible time. Its simple deployment feature enables companies to integrate the solution in their infrastructure as fast as possible, leading to a more effective protection of sensitive data. This element led an analyst to conclude that the product offered “the fastest route to compliance”.
Weaver’s IT Advisory Services focuses on delivering performance-enhancing consultation that simultaneously addresses IT and business agendas. We work directly with CIOs and others to create a more risk-aware, effective IT organization that can nimbly drive process efficiencies throughout companies and better support and deliver transformational business change. From cloud computing to mobile payment information, data integrity and information security have never been more crucial. With a range of specialized IT advisory services, Weaver helps organizations distinguish IT as the strategic advantage companies need to succeed in the age of big data.
Founded in 1950, Weaver currently has 500+ employees and offices in eight cities across the United States. Weaver is ranked the largest independent accounting firm in the Southwest by Accounting Today magazine. The firm is also ranked the 38th largest firm in the United States and a ‘2015 Best of the Best Firm to Watch’ by INSIDE Public Accounting. Weaver serves a broad range of clients including public and private national and international companies, nonprofit organizations and government entities. In addition to traditional assurance and tax services, Weaver also provides numerous advisory services, including risk advisory, transaction advisory, IT advisory, energy compliance and consulting, forensics and litigation, international tax, property tax, state and local tax, and wealth strategies services. Learn more at http://www.weaver.com.
Whistic is the best way for tech-enabled companies to manage security risk assessments both internally and with third parties, and allows them to gain visibility into the security gaps within their own organizations, as well as their vendors, customers, and partners. Whistic’s platform simplifies the process of gathering responses to security questionnaires by automating the sending and receiving of assessments, gathering supporting documentation, providing contextual security information, and synthesizing the data into easy to read reports and dashboards.
Willis Towers Watsonhttps://www.willistowerswatson.com
Willis Towers Watson is a leading global professional services, technology and solutions company that helps organizations improve performance through effective people, risk and financial management. With 16,000 associates around the world, we offer consulting and software solutions in the areas of benefits, talent management, rewards, and risk and capital management.
We are the world’s largest provider of actuarial software. Global organizations, including the world’s largest insurers, rely on Willis Towers Watson solutions to measure value, manage risk, safeguard solvency and improve overall business performance.
A powerful combination of tailored best of breed software solutions integrated with world class advisory services sets our offering apart. We have the ability to support our clients’ end-to-end processes leveraging software as a service and cloud technology with the backing of technical expertise and support enabling them to maximize investment and deliver value.
WinMagic Inc. provides application aware Intelligent Key Management for everything encryption, with robust, manageable and easy-to-use data security solutions. WinMagic’s SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.
Wipro Ltd (NYSE:WIT) is a global information technology, consulting and outsourcing company with 170,000+ workforce serving clients in 175+ cities across 6 continents. The company posted revenues of $7.6 billion for the financial year ended Mar 31, 2015.
Wipro helps customers do business better by leveraging our industry-wide experience, deep technology expertise, comprehensive portfolio of services and vertically aligned business model. Our 55+ dedicated emerging technologies ‘Centers of Excellence’ enable us to harness the latest technology for delivering business capability to our clients.
Wipro is globally recognized for its innovative approach towards delivering business value and its commitment to sustainability. Wipro champions optimized utilization of natural resources, capital and talent. Today we are a trusted partner of choice for global businesses looking to ‘differentiate at the front’ and ‘standardize at the core’ through technology interventions.
Workday is a leading provider of enterprise cloud applications for finance and human resources. Founded in 2005, Workday delivers financial management, human capital management, and analytics applications designed for the world’s largest companies, educational institutions, and government agencies. More than 1,000 organizations, ranging from medium-sized businesses to Fortune 50 enterprises, have selected Workday.
Xactly (NYSE:XTLY) is a leading provider of enterprise-class, cloud-based, incentive compensation solutions for employee and sales performance management. We address a critical business need: To incentivize employees and align their behaviors with company goals. Our products allow organizations to make more strategic decisions, increase employee performance, improve margins, and mitigate risk. Our core values are key to our success, and each day we’re committed to upholding them by delivering the best we can to our customers.
300 Park Avenue
San Jose, CA 95110
Yammer (www.yammer.com) is the leading provider of enterprise social networks, enabling organizations to make transformative changes quickly by empowering employees to collaborate across departments, geographies, content and business applications. The basic version of Yammer is free, and customers can pay to upgrade their network to receive additional administrative and security controls, priority customer service and a dedicated customer success manager. Companies and organizations from across the globe, including more than 85 percent of the Fortune 500, are using our award-winning Software-as-a-Service (SaaS) solution to improve employee productivity and engagement. Visit our blog to see how our customers are benefiting from Yammer or our IT Security page for detailed descriptions of our security controls and features.
Zendesk builds cloud software for better customer service, bringing companies and their customers closer together. With Zendesk, companies engage directly and openly with customers, building more meaningful customer relationships that last a lifetime. More than 40,000 customers use Zendesk to provide service to more than 300 million people worldwide. Learn more at www.zendesk.com.
Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.
ZTE Corporation is a global leader in telecommunications and information technology. As part of ZTE’s M-ICT strategy, the company is committed to providing integrated end-to-end innovations to deliver excellence and value to consumers, carriers, businesses and public sector customers around the world to enable increased connectivity and productivity. Founded in 1985, ZTE is listed on both the Hong Kong and Shenzhen Stock Exchanges. In 2015, ZTE achieved an annual revenue to over RMB 100 billion for the first time, with a net profit increase of 21.8% to RMB 3.21 billion, driven by new operations including semiconductors and the Internet of Things.
With the industry’s most comprehensive product range and end-to-end solutions, ZTE offers cutting-edge wireless, access & bearer, value-added services, terminals and managed services to telecommunications carriers, in addition to ICT solutions for enterprises and government agencies. ZTE’s advanced capabilities enable leading telecommunications operators and Fortune 500 enterprises in more than 160 countries to achieve their business objectives and increase competitiveness. In addition, ZTE’s acclaimed AXON, Blade, and SPRO series of smartphones and mobile devices are chosen by consumers around the world.
ZTE believes in technology innovation as a core value of the company, investing more than 10% of annual revenue in R&D. The company has established 20 state-of-the-art R&D centres in Asia, North America and Europe and employs over 30,000 research professionals in the development of next-generation technologies including 5G, the Internet of Things, NFV, SDN, Cloud Computing, Big Data and Smart City. ZTE has filed applications for more than 66,000 patents, with over 24,000 granted. Since 2010, ZTE has been ranked among the world’s Top-3 for patent applications under the Patent Cooperation Treaty (PCT) each year, according to the World Intellectual Property Organization.