For 30 years, Boldon James has been a leader in data classification & secure messaging solutions, helping organisations manage sensitive information securely and in compliance with legislation and standards. Boldon James Classifier enables users to apply visual & metadata labels to messages, documents & files to enforce information assurance policies and orchestrate multiple security technologies such as DLP and Digital Rights Management. Boldon James is a wholly-owned subsidiary of QinetiQ plc, a FTSE 250 company, with offices worldwide.
CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments.
Created to protect the most high-risk organizations in the world, Cyberbit’s battle-hardened cybersecurity solutions detect, analyse and respond to the most advanced, complex and targeted threats. A subsidiary of defence systems provider Elbit Systems Ltd. (NASDAQ: ESLT), Cyberbit is committed to making that available to sensitive organizations struggling to protect their customers, their intellectual property, their revenue and their brands in the face of sophisticated threats and a security talent shortage. Cyberbit solutions empower enterprises to detect advanced threats in seconds, protect critical infrastructure, automate security operations center (SOC) workflows and train staff. With machine learning, big data and continuous technology advancements, Cyberbit maximizes protection against today’s signature-less threats and arms organizations for tomorrow’s new dimension of attack.
Deep Identity is an innovation leader in providing comprehensive and unique solution to address identity governance and administration (IGA), compliance management and data governance requirements. It offers a layered approach that enables better visibility and controls, ultimately automating compliance management in a cost effective manner. It provides business with the relevant reporting and analytics to improve IT security, maintain compliance and eventually minimize business risk. Deep Identity has been rated consistently very well by leading industry and technology analysts for its innovation and niche solution offering.
FireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day exploits, and APT tactics. FireEye's solutions supplement traditional and next-generation firewalls, IPS, antivirus and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry's only solution that detects and blocks attacks across both Web and email threat vectors as well as latent malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats. Based in Milpitas, California, FireEye is backed by premier financial partners including Sequoia Capital, Norwest Venture Partners, and Juniper Networks.
Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies - cloud, mobility, Internet of Things (IoT), and others - through a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies involved in managing a collection of point security products.
Fox-IT was founded in 1999 as a consultancy firm for forensic expertise. Within the first few years of operations, Fox-IT was asked by a large telecommunications operator to deliver a service based on network monitoring. This led to one of the first Security Operations Centres in Europe. From these beginnings, Fox-IT has developed into Europe’s largest specialized cyber security company with over 250 cyber security experts working on several continents. Having been involved in many confidential, high-profile incident response cases, Fox-IT continuously uses its experience from its professional services to improve its managed security services and the underlying Cyber Threat Management platform to enhance prevention, detection and response to known and unknown cyber threats.
Gemalto expertise spans the entire process of creating digital security solutions for our clients and their customers. We enable digital services and networks by offering a secure and seamless chain of software, products, platforms and services. This chain of trust helps organizations to protect what matters, where it matters by ensuring strong identities and secure data from the edge to the core. To protect the edge of the network we develop secure software and operating systems which we embed in many kinds of device, like SIM cards, banking cards, tokens, electronic passports and ID cards. Once we've personalized them and loaded them with data, we deploy platforms and services to manage and protect them as well as the sensitive data they hold throughout their life-cycle.
With Headquarters in Singapore, i-Sprint has expanded rapidly across Asia Pacific. We now have direct presence and active authorized partners across China (Zhuhai, Beijing, Shenzhen, Chengdu), Hong Kong, Taiwan, Malaysia, Thailand, Vietnam, Japan, and the United States. As of 2014, i-Sprint Group has two major strategic investors: ASL/Teamsun Group (which is listed in Hong Kong Stock Exchange and Shanghai Stock Exchange) and Great Ally Investments, a wholly-owned subsidiary of the Peregrine Greater China Capital Appreciation Fund, L.P. i-Sprint's own unique brand of security products, intellectual properties and patents are designed to exceed global financial services regulatory requirements. In order to capitalize the fast growing Identity, Credential and Access Management (ICAM) market, i-Sprint proactively delivers innovative product features via our product offerings in Identity Protection, Cloud Protection, Mobile Protection and Data Protection.
Network Critical was established in 1997 by Alastair Hartrup to fulfil a market need for a better way to access network data traffic. Today, Network Critical is the leader in Access Technology Solutions, with award-winning, innovative products designed for the compliance era. A global company, Network Critical leads the network monitoring industry with constant innovation and unique modular design. Our technology ensures 100% continuous network visibility and ZERO packet loss. Our products eliminate any concerns of downtime while adapting to the configuration of your network and scaling alongside growth.
Founded in 2001, Outpost24 is a vulnerability management company providing best-in-class solutions to help users identify and mitigate weaknesses in their network. Outpost24 offers real-time vulnerability alerts and solution-based reports that facilitate the instant recognition of imminent threats. With more than 40 locations worldwide, Outpost24 collectively scans over 400 million IP addresses weekly and detects more than 12 thousand vulnerabilities on a daily basis. More than 2000 companies around the world trust Outpost24 to protect their internal and external network security; from government entities, to financial institutions; and from global retailers to telecommunication providers.
Penta Security Systems Inc.
Penta Security Systems Inc. is Korea-based leading provider of application security software and core technology, with more than 1,000 installed customers. Established in July 1997, Penta Security Systems holds the highest level of technology expertise and abundant experience in key areas of information security. Incorporated in 2009, its Japanese subsidiary Penta Security Systems K.K is now focusing its efforts on satisfying the application-level security needs and requirements of organizations throughout Japan and globally.
SSH Communications Security
Founded in 1995, SSH Communications is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the "Fortune 10", trust our Information Integrity Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. We operate in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company holds 15 patents and its shares are quoted on the NASDAQ OMX Helsinki.