Secure Your Seat for SANS Northern VA Spring- Tysons 2019. Save $350 thru 12/19.

SANS Affiliate Directory

Premier Affiliate Members

Affiliate Member
Product Categories
The most damaging cyber threats today rely on social engineering and identify deception. Spear phishing, business email compromise, ransomware and other targeted attacks are so successful because they prey on human weakness. The Agari Email Trust Platform is the only solution that neutralizes social engineering and stops email attacks at the gateway before they can reach the inbox.
Authentication, Cloud Security, Risk/Compliance, Threat Intelligence
AlienVault has simplified the way organizations detect and respond to threats. Our award-winning approach combines essential security controls into a single all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault's Open Threat Exchange, the world's largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Cloud Security, SIEM, Threat Intelligence
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali's approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.
Threat Intelligence, Forensics
Authentic8 is redefining how the browser is used to access sensitive web data. Silo, our flagship product, is a cloud browser that isolates local computers from dangerous web content. Silo helps manage login credentials, access controls, and data use policies. Silo is built fresh at session start and destroyed at session end, ensuring users remain secure, compliant, and anonymous online. Toolbox, an add-on to Silo, provides a mis-attributed platform for research and analysis. With Toolbox, researchers can access websites from local IP addresses, spoof their browsing platform, and collect data without revealing their identity or exposing their resources.
Cloud Security, Privilege Management/Access Control, Threat Intelligence, Incident Response and Forensics
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker's every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share.
Endpoint Security, Incident Response
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure.
Threat Intelligence, Forensics
Endgame's leading endpoint security platform enables enterprises to close the protection gap against advanced adversaries by preventing advanced attacks and detecting and eliminating resident attacks. Endgame transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, dramatically reduces time, and cost associated with incident response and compromise assessment.
Threat Intelligence, Forensics
F5 makes apps go faster, smarter, safer for the world's largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control.
Application Security, Cloud Security, Managed Security Services
Print security is about more than just your printers. It's about helping secure your entire network from data theft by handling threats as they happen. Only HP Enterprise printers offer built-in malware protection, including runtime intrusion detection and HP Sure Start, the industry's only self-healing BIOS.
Information Technology and Services
LogRhythm's security intelligence and analytics platform enables organizations to detect, respond to, and neutralize cyber threats.
Network Defense, Network Monitoring, SIEM
Malwarebytes next-gen technology protects businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions.
Threat Intelligence, End Point Security
Remediant delivers on our promise of Securing Innovation through market-leading cybersecurity products. Our flagship product, SecureONE, brings CISOs, Data Center Managers and IT Security professionals the control and insight they need over privileged access -- the #1 attack vector in security breaches. Built by IT Security professionals for IT Security professionals, SecureONE eliminates critical attack vectors while providing deep audit logging and unparalleled usability.
Privilege Management/Access Control, Authentication
More than 30,000 customers worldwide - including nearly half the global Fortune 500 - rely on RSA's business-driven security strategies through threat detection and response, identity and access management, and governance, risk and compliance solutions. Armed with the industry's most powerful tools, enterprises can better focus on growth, innovation and transformation in today's volatile business environment.
Network Monitoring, SIEM, Endpoint Monitoring
SecurityMatters, a global leader in OT network protection technology, is now part of ForeScout. ForeScout Technologies, Inc. helps make the invisible visible. Our company focuses on providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology integrates with disparate security tools to help organizations accelerate incident response, break down silos, automate workflows and optimize existing investments. Learn more at
Network Defense, Network Monitoring, Vulnerability Assessment, Security Assessments, ICS/SCADA Security
Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit or connect with us on Facebook, Twitter, and LinkedIn.
Application Security, Cloud Security, Encryption, End Point Security, Network Defense/Monitoring, Risk/Compliance, Threat Intelligence, Vulnerability Assessment
More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage and use, Sophos' award-winning encryption, endpoint security, Web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.
Cloud Security, End Point Security, Network Defense
ThreatConnect unites cybersecurity people, processes and technologies behind a cohesive intelligence-driven defense. Built for security teams at all maturity levels, the ThreatConnect platform enables organizations to benefit from their collective knowledge and talents; develop security processes; and leverage their existing technologies to identify, protect and respond to threats in a measurable way.
Risk/Compliance, Threat Intelligence, Network Defense, and Vulnerability Assessment

SANS Affiliate Members

Product Categories: Privilege Management, Access Control

Product Categories: Information Services

Product Categories: End Point Security, Network Defense, Network Monitoring, Policy Auditing/Management, Risk/Compliance, SIEM, Threat Intelligence

Product Categories: Endpoint Security

Product Categories: Endpoint Security, Forensics, Threat Intelligence

Product Categories: End point security, Threat Intelligence

Product Categories: File Integrity, Risk Compliance, Threat Intelligence

Product Categories: Security Assessments, Security Operations, CISO Strategic Consulting, Security Program Transformation, Penetration Testing, Threat Emulation, ICS/SCADA Security Consulting

Product Categories: Threat Intelligence

Product Categories: Network Monitoring, Risk / Compliance, Vulnerability Assessment

Product Categories: Incident Response

Product Categories: Security Consultants

Product Categories: Threat Intelligence, Vulnerability Assessment, Network Defense

Product Categories: Insider Threat Detection, End Point Security, Forensics, Threat Intelligence, Risk / Compliance, Policy Auditing/ Management

Product Categories: End Point Security, Forensics, Threat Intelligence, Risk / Compliance, Policy Auditing/ Management