OnDemand Training - Best Special Offers of the Year Ending Soon - Learn More

Network Security 2017

Las Vegas, NV | Sun, Sep 10 - Sun, Sep 17, 2017
This event is over,
but there are more training opportunities.

Exhibitors

Our events incorporate external vendor partners showcasing some of the best security solutions available. Take advantage of the opportunity to interact with the people behind the products and learn what they have to offer you and your organization.

Solutions Expo

  • Tuesday, September 12
    • 12:00 pm - 1:30 pm
    • 5:30 pm - 7:30 pm

Interested in our Solutions Expo but not registered for a course? Sign up here


Platinum Sponsors

RiskIQ

http://www.riskiq.com/

RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint and to map their adversaries' infrastructure. RiskIQ's external threat management platform, powered by a global proxy network, virtual user technology, and threat analysis engine enables organizations to get an actionable and timely picture of both their own and their adversaries infrastructure proactively defending against threats targeting their websites, mobile applications, brands, customers, and employees.

RiskIQ is the only complete external threat management solution purpose-built to address the growing threats in all digital channels-web, mobile, and social. Leading financial institutions, insurance providers and consumers, and B2B brands use RiskIQ to protect themselves and their users from code-level threats, malware, phishing, social media attacks and fraud.

RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com.


Gold Sponsors

Anomali

https://www.anomali.com/

Anomali® delivers intelligence-driven cybersecurity solutions. Organizations rely on Anomali to harness threat data, information, and intelligence to make effective cybersecurity decisions that reduce risk and strengthen defenses. Anomali solutions enable collaboration and sharing of threat information among trusted ISACs and enterprises worldwide. For more information, visit us at www.anomali.com.


Cylance

http://www.cylance.com/

Cylance is a next generation, endpoint protection, product company, specializing in advanced threat security that detects and stops zero-day malware and APT attacks. Using advanced math and machine learning, coupled with the understanding of a hacker's mindset, Cylance provides a proactive, preventive approach to security.


Forcepoint LLC

https://www.forcepoint.com

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people's intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.


Forescout Technologies BV

http://www.forescout.com

Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environment and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device, as well as continuous posture assessment. As of December 31, 2018, 3,300 customers in over 80 countries rely on Forescouts infrastructure-agnostic solution to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity. Learn how at www.forescout.com.


Immutable Systems

https://www.brkt.com/


LogRhythm

http://www.logrhythm.com

LogRhythm is a world leader in NextGen SIEM, empowering organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats. The LogRhythm NextGen SIEM Platform combines user and entity behavior analytics (UEBA), network traffic, and behavior analytics (NTBA) and security orchestration, automation, and response (SOAR) in a single end-to-end solution. LogRhythm's Threat Lifecycle Management (TLM) workflow serves as the foundation for the AI-enabled security operations center (SOC), helping customers measurably secure their cloud, physical, and virtual infrastructures for both IT and OT environments. Built for security professionals by security professionals, the LogRhythm NextGen SIEM Platform has won many accolades, including being positioned as a Leader in Gartner's SIEM Magic Quadrant.


Minerva Labs

http://www.minerva-labs.com/

Minerva is an endpoint security solution provider that protects enterprises from today's stealthiest attacks, those designed to evade existing defenses. By creating a virtual reality that controls how malware perceives its environment, Minerva causes malware to disarm itself, blocking threats before the need to engage costly security resources. www.minerva-labs.com


Qualys

http://www.qualys.com

Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions that help organizations streamline and consolidate their security and compliance solutions and build security into digital transformation. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously across global IT assets.


SecurityZONES

http://www.securityzones.net/


Sophos Inc.

http://www.sophos.com

Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from todays most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques.


Spamhaus

https://www.spamhaus.org/


Terbium Labs

https://terbiumlabs.com/


Silver Sponsors

Bricata

http://www.bricata.com/


Corelight

https://www.corelight.com/

From the Acropolis to the edge of space, defenders have sought the high ground in order to see farther and turn back attacks. Corelight delivers a commanding view of your network so you can outsmart and outlast adversaries. We capture, interpret, and connect the data that means everything to defenders.


CrossMatch

www.crossmatch.com


Datacom Systems, Inc.

datacomsystems.com


InfoArmor

https://www.infoarmor.com/


Kaspersky Lab

http://www.kaspersky.com


Pwnie Express

https://www.pwnieexpress.com

Pwnie Express provides an end-to-end security assessment solution that delivers real-time wired and wireless asset discovery, continuous vulnerability scanning, pentesting, risk trending and alerting. It provides sensors for individual locations and an enterprise-class Pwn Pulse solution using its sensors combined with central management for scalable continuous intelligence across remote locations.


VMRay

https://www.vmray.com/

VMRay Analyzer combines rapid reputation scoring of files with a unique agentless hypervisor-based monitoring approach for deep analysis. With this combination VMRay Analyzer delivers rapid threat detection at scale coupled with the most comprehensive dynamic threat analysis in the industry. www.VMRay.com


Interested in becoming an exhibitor? Learn more about all our vendor opportunities.