Utilising its expertise operating at the heart of the internet infrastructure for over 20 years running the .UK domain, Nominet's cyber security solutions protect governments and global enterprises from constant attack. Analysing DNS traffic for known and unknown bad in real time to predict, detect and block cyber threats, NTX uses machine learning to reduce risk on your network and eliminates threats such as malware, phishing, data theft and DNS hijacking before they cause harm. Easy to deploy, NTX narrows the window of compromise, identifying malicious domains, on average, one week faster than other network security solutions.
The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world.
With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 global corporations and government agencies, including NYC Health + Hospitals; KPMG; Kaiser Permanente; Latham & Watkins; National Park Service; Umpqua Bank; Tyler Technologies; and the National Institute for Standards and Technology (NIST).
OneTrust is the #1 most widely used privacy, security and third-party risk technology platform trusted by more than 3,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s three primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, and OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange.
Our mission at HoxHunt is to enable everyone to protect themselves from cybercrime. We want to turn employees from a company’s weakest link into the strongest asset against cyber attacks. Our gamified platform trains employees against phishing attacks in a fun and engaging way. We are backed by the leading investors in the space Dawn Capital, Icebreaker.vc and F-Secure founders Risto Siilasmaa’s First Fellow Partners. We’re working globally with the most demanding customers in various industries.
Proofpoint protects people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises. Our solutions stop 99% of attachment-based attacks. And every day, we detect and block advanced threats and compliance risks in more than 600 million emails, more than 7 million mobile apps, and hundreds of thousands of social-media accounts.We also help customers share large files securely and protect sensitive information as it’s sent, stored, and archived.
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions in real time and applies advanced machine learning to help security and IT teams investigate threats, ensure the delivery of critical applications, and protect their investment in the cloud. With ExtraHop, the world's leading enterprises have the complete visibility, real-time detection, and guided investigation they need to rise above the noise and drive their business forward.
Founded in 2013 by mathematicians from the University of Cambridge and government cyber intelligence experts in the US and the UK, Darktrace is recognized today as the world’s leading AI company for cyber security. With deep expertise in mathematics and machine learning, as well as operational experience defending critical national assets, our founding team started Darktrace to empower organizations to defend their systems against the most sophisticated cyber-threat. Darktrace’s pioneering technology, the Enterprise Immune System, applies AI to the cyber defense challenge for the first time, and has proven itself successful in detecting cyber-threats that existing, legacy systems cannot.
Secure Code Warrior was co-founded by Pieter Danhieux and Matias Madou Ph.D., two globally recognized security experts. Through their combined security experience as developers, researchers, trainers and consultants, Pieter and Matias had experienced the negative impact of insecure code and were frustrated by the industry's focus on simply finding vulnerabilities, rather than fixing or preventing them in the first place. Both recognized that improving secure coding skills and outcomes would add a powerful layer of cyber protection for companies and would help them make better code, faster. Developers didn’t need to become security experts per se, but they could be empowered positively to be the first line of defence for their organization.
At Agari, we take a stand against these cybercriminals with a bold mission: we protect digital communications to ensure humanity prevails over evil. Agari uses predictive AI to model identity at Internet scale and prevent the next zero-day attack. By focusing on sender identity and behavior versus the attack type itself, Agari models the good to protect you from the bad, ensuring that no threat—new or existing—hits your inbox. We believe that email should be safe. We believe that email should be secure. We believe that you should have the confidence to open, click, and trust everything in your inbox.
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside. By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
Over the next 10 years, digital transformation is expected to unlock an estimated $10 trillion of value for business and wider society. Davos 2019 has clearly established security as a strategic contribution for unlocking that value, putting a safe digital transformation at the heart of three major drivers; Education, Ecosystem, and Technology. Learn how Fortinet is delivering unprecedented value on those three domains setting new industry standards and helping our customers and partners realizing their digital initiatives.
Guardicore is a data center and cloud security company that protects your organization’s core assets using flexible, quickly deployed, and easy to understand micro-segmentation controls. Our solutions provide a simpler, faster way to guarantee persistent and consistent security — for any application, in any IT environment.