The Seven Most Dangerous New Attack Techniques: Summary of the RSA 2017 keynote session featuring top SANS experts
2 Days Left to Save $400 on SANS Pen Test Austin 2017

SANS Affiliate Directory

Premier Affiliate Members

Affiliate Member
Product Categories
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure.
Threat Intelligence, Forensics
Endgame's leading endpoint security platform enables enterprises to close the protection gap against advanced adversaries by preventing advanced attacks and detecting and eliminating resident attacks. Endgame transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, dramatically reduces time, and cost associated with incident response and compromise assessment.
Threat Intelligence, Forensics
F5 makes apps go faster, smarter, safer for the world's largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control.
Application Security, Cloud Security, Managed Security Services
LogRhythm's security intelligence and analytics platform enables organizations to detect, respond to, and neutralize cyber threats.
Network Defense, Network Monitoring, SIEM
Malwarebytes next-gen technology protects businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions.
Threat Intelligence, End Point Security
Remediant delivers on our promise of Securing Innovation through market-leading cybersecurity products. Our flagship product, SecureONE, brings CISOs, Data Center Managers and IT Security professionals the control and insight they need over privileged access -- the #1 attack vector in security breaches. Built by IT Security professionals for IT Security professionals, SecureONE eliminates critical attack vectors while providing deep audit logging and unparalleled usability.
Privilege Management/Access Control, Authentication
More than 30,000 customers worldwide - including nearly half the global Fortune 500 - rely on RSA's business-driven security strategies through threat detection and response, identity and access management, and governance, risk and compliance solutions. Armed with the industry's most powerful tools, enterprises can better focus on growth, innovation and transformation in today's volatile business environment.
Network Monitoring, SIEM, Endpoint Monitoring
More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage and use, Sophos' award-winning encryption, endpoint security, Web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.
Cloud Security, End Point Security, Network Defense
ThreatConnect unites cybersecurity people, processes and technologies behind a cohesive intelligence-driven defense. Built for security teams at all maturity levels, the ThreatConnect platform enables organizations to benefit from their collective knowledge and talents; develop security processes; and leverage their existing technologies to identify, protect and respond to threats in a measurable way.
Risk/Compliance, Threat Intelligence

SANS Affiliate Members

Product Categories: Privilege Management, Access Control

Product Categories: End point security, Threat Intelligence

Product Categories: Network Monitoring, Risk / Compliance, Vulnerability Assessment

Product Categories: Incident Response

Product Categories: Threat Intelligence, Vulnerability Assessment, Network Defense

Product Categories: End Point Security, Forensics, Threat Intelligence, Risk / Compliance, Policy Auditing/ Management