Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
CISO Forum - Dallas 2013 - Sponsors



We would like to thank the following sponsors for their thought leadership and support of the May 2013 CISO Executive Forum.



AccessData Group has pioneered digital investigations for 25+ years and is the maker of FTK, SilentRunner and the CIRT security framework. CIRT is the first software solution to integrate computer forensics, network forensics, malware analysis, large-scale auditing and remediation into a single platform. It reduces incident response time, facilitates compliance auditing and continuous monitoring, and provides automated malware triage and analysis. www.accessdata.com


Code 42 Software has been protecting the world’s information since 2001. Its enterprise backup solution, CrashPlan PROe, provides people-friendly, enterprise-tough backup. Engineered with laptops in mind, PROe is continuous backup that won’t slow you down, and its self-service restores free up IT. The cross-platform, multi-destination solution is used by thousands of companies around the world to safeguard their data. Download your free, 30-day trial today at https://www.crashplan.com/enterprise/download.html. And for more information visit www.code42.com or www.crashplanproe.com.


Coverity is the trusted standard for companies that need to protect their brands and bottom lines from software failures. Over 1,100 Coverity customers use Coverity's development testing suite of products to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches, or catastrophic failure. www.coverity.com




IBM offers security solutions for data security, identity and access management, application, mobile, cloud, endpoint management, network security and more. IBM InfoSphere Guardium data security software is an integrated platform for monitoring, auditing, protecting data integrity and enforcing compliance of trusted information. IBM solutions reduce risk and build confidence for better business decisions. www.ibm.com


Boston-based Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect businessesagainst advanced threats and prevent data breach. Hundreds of organizations and millions of end users rely on Trusteerto protect critical endpoint applications on computers and mobile devices from advanced malware and spear-phishingattacks. Trusteer’s Cybercrime Prevention Architecture combines multi-layer security software with real-time threatintelligence to stop emerging threats that are invisible to legacy security solutions. www.trusteer.com




WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s agship product family, is the most accurate and cost-eective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks. www.whitehatsec.com


Wombat Security Technologies combats cyber security threats with uniquely effective and engaging software-based training solutions for employees. The training solutions have been shown to reduce employee susceptibility to attack over 80%, and are in use today by small to medium businesses, Fortune 1000 companies and various government agencies. www.wombatsecurity.com

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

12/6/2016 » 12/7/2016
Threat Intelligence Summit 2016

12/6/2016
ISSA Pre-Professional Virtual Meet-Up: What Should your Toolbox Look Like?

12/8/2016
December 2016 CISO Mentoring Webinar Series

12/9/2016
Financial SIG Quarterly Webinar

12/10/2016
SecureMiami




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information