[February 20, 2014] |
|
RSA Conference USA 2014 Exhibitor Profiles (M Through Z)
SAN FRANCISCO --(Business Wire)--
RSA Conference USA 2014, the world's largest information security event,
takes place February 24 - 28, 2014 at the Moscone Center in San
Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles M
through Z.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|
|
|
|
Company:
|
|
|
MobileIron
|
Booth:
|
|
|
2439
|
Web:
|
|
|
www.mobileiron.com
|
The leader in Mobile IT, MobileIron was purpose-built to secure and
manage mobile apps, content, and devices for global companies.
Available as an on-premise or cloud solution, MobileIron was the
first to deliver key innovations such as multi-OS mobile device
management (MDM), mobile application management (MAM), and BYOD
privacy controls. For more information, please visit
www.mobileiron.com.
|
|
|
|
|
Company:
|
|
|
Narus, Inc.
|
Booth:
|
|
|
2715
|
Web:
|
|
|
http://narus.com/
|
Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is
a pioneer in cybersecurity data analytics. The company's patented
advanced analytics help enterprises, carriers and government
customers proactively identify and accelerate the resolution of
cyber threats. Using incisive intelligence culled from visual
interactive and underlying data analytics, Narus nSystem identifies,
predicts and characterizes the most advanced security threats,
giving executives the visibility and context they need to make the
right security decisions, right now, by letting them know what's
happening, why, and what to do about it. Narus boosts the ROI from
existing IT investments.
|
|
|
|
|
Company:
|
|
|
NPCore
|
Booth:
|
|
|
2413
|
Web:
|
|
|
http://www.npcore.com
|
NPCore, founded in 2008 in South Korea, is a premier network
security solution provider, offering information security products
such as ZombieZERO, for various customers in financial institutions,
municipal offices, colleges, and small & mid-size companies.
ZombieZERO is the only defense solution for the new APT (Advanced
Persistent Threat) attack by offering behavior based security
functions.
|
|
|
|
|
Company:
|
|
|
Ntrepid Corporation
|
Booth:
|
|
|
327
|
Web:
|
|
|
ntrepidcorp.com
|
Ntrepid's Cyber Operations product suite has been enabling
enterprises to securely conduct their online activities for nearly
20 years. From IP management tools to secure virtual browsing
environments, our technologies and diverse global points of presence
facilitate online research, investigations and data collection,
while protecting identities and minimizing the spread of malware.
|
|
|
|
|
Introducing Passages by Ntrepid, a secure browser designed to
mitigate malware and attribution concerns faced when conducting
research and online activities. Passages isolates web browsing
within a virtual machine and uses patented identity control
technology to mask users true location and other identifying
information. Learn more at GetPassages.com.
|
|
|
|
|
Company:
|
|
|
NXP Semiconductors
|
Booth:
|
|
|
1341
|
Ticker Symbol & Exchange:
|
|
|
Nasdaq: NXPI
|
Web:
|
|
|
www.nxp.com
|
NXP Semiconductors N.V. (Nasdaq: NXPI) provides High Performance
Mixed Signal (HPMS) and Standard Product solutions that leverage its
leading RF, Analog, Power Management, Interface, Security and
Digital Processing expertise. It is a global semiconductor company
with operations in more than 25 countries.
|
|
|
|
|
NXP is #1 in the overall, worldwide Identification market. NXP ID
leads the way with complete solution expertise, world-class security
and superior contactless performance. It delivers trusted mobile
smart life solutions that authenticate identities, secure
transactions and provide convenient interactions. These
multi-application solutions are delivered without compromising
security features, quality, convenience or design productivity.
|
|
|
|
|
Company:
|
|
|
OASIS Interoperability Showcase
|
Booth:
|
|
|
1909
|
Web:
|
|
|
https://www.oasis-open.org/events/rsa/2014
|
Eleven companies demonstrate products that support the OASIS KMIP
and PKCS #11 standards for encrypting data at rest, in-transit, and
in the cloud. Cryptosense, Cryptsoft, Dell, Feitian, HP, IBM, P6R,
Oracle, SafeNet, Thales e-Security, and Vormetric show
standards-compliant enterprise key managers, storage appliances,
HSMs, security tokens, and cryptographic toolkits all
interoperating. See how the KMIP and PKCS #11 standards give CIOs,
CSOs, and CTOs the freedom to select best-of-breed solutions.
|
|
|
|
|
Company:
|
|
|
Oberthur Technologies
|
Booth:
|
|
|
609
|
Web:
|
|
|
ww.oberthur.com
|
OT is a world leader in digital security solutions for the mobility
space. OT has always been at the heart of mobility, from the first
smart cards to the latest contactless payment technologies which
equip millions of smartphones. Present in the Payment,
Telecommunications and Identity markets, OT offers end-to-end
solutions in the Smart Transactions, Mobile Financial Services,
Machine-to-Machine, Digital Identity and Transport & Access Control
fields. OT employs over 6 000 employees worldwide, including 600 R&D
people. With more than 50 sales offices across 5 continents and 10
facilities, OT's international network serves clients in 140
countries.
|
|
|
|
|
For more information: www.oberthur.com.
|
|
|
|
|
Company:
|
|
|
Okta
|
Booth:
|
|
|
1938
|
Web:
|
|
|
www.okta.com
|
Okta is an enterprise-grade identity management service, built from
the ground up in the cloud and designed to address the challenges of
a cloud, mobile and interconnected business world. Okta integrates
with existing directories and identity systems, as well as thousands
of on-premises, cloud-based and mobile applications, to enable IT to
securely manage access anywhere, anytime and from any device. More
than 550 enterprises worldwide use Okta to increase security and
employee productivity, as well as lower IT costs and improve
compliance.
|
|
|
|
|
The company is based in San Francisco, CA and is backed by venture
capital firms Andreessen Horowitz, Greylock Partners, Khosla
Ventures and Sequoia Capital. For more information, please visit
www.okta.com.
|
|
|
|
|
Company:
|
|
|
OpenDNS
|
Booth:
|
|
|
South Expo 252
|
Web:
|
|
|
www.opendns.com
|
OpenDNS delivers enterprise threat protection to reduce the risk and
impact of security breaches. Unlike on-premises appliances that lack
coverage for eroding network perimeters, OpenDNS' cloud-delivered
platform protects all devices, anywhere, any time without
sacrificing performance or manageability. OpenDNS' security
intelligence leverages a unique satellite view of the Internet and
uses big data, analytics and visualization techniques to predict and
block attacks before they happen. The OpenDNS Global Network is the
world's largest Internet security network and secures over 50
million active users daily through 22 globally distributed data
centers.
|
|
|
|
|
Company:
|
|
|
Prevalent Networks
|
Booth:
|
|
|
1038
|
Web:
|
|
|
http://www.prevalentnetworks.com/
|
Prevalent Networks is an IT security innovator that develops proven
technologies and services to help organizations reduce and monitor
threats and risks posed by third-party vendors.
|
|
|
|
|
Company:
|
|
|
Procera Networks Inc.
|
Booth:
|
|
|
2321
|
Ticker Symbol & Exchange:
|
|
|
PKT
|
Web:
|
|
|
http://www.proceranetworks.com/index.php
|
Procera Networks Inc. (NASDAQ: PKT) delivers Internet Intelligence
solutions to service providers and network equipment manufacturers
for analytics and enforcement of broadband traffic worldwide.
Procera's solutions provide actionable intelligence and policy
enforcement to ensure a high quality experience for any Internet and
network connected device. For more information, visit
http://www.proceranetworks.com or follow Procera on Twitter at
@ProceraNetworks. Procera Networks will showcase its next-generation
Deep Packet Inspection engine, NAVL, alongside two of its technology
partners, Napatech and Intel in Booth #2321. Procera's NAVL offers
industry leading, high performance Deep Packet Inspection technology
for integration into third party platforms.
|
|
|
|
|
Company:
|
|
|
RSA
|
Booth:
|
|
|
3021
|
Web:
|
|
|
www.EMC.com/RSA
|
RSA, The Security Division of EMC, is the premier provider of
security, risk, and compliance-management solutions for business
acceleration. RSA helps the world's leading organizations succeed by
solving their most complex and sensitive security challenges. These
challenges include managing organizational risk, safeguarding mobile
access and collaboration, proving compliance, and securing virtual
and cloud environments. Combining business-critical controls in
identity assurance, encryption & key management, SIEM, Data Loss
Prevention, and Fraud Protection with industry-leading GRC
capabilities and robust consulting services, RSA brings visibility
and trust to millions of user identities, the transactions that they
perform, and the data that is generated.
|
|
|
|
|
Company:
|
|
|
Seccuris Inc.
|
Booth:
|
|
|
2520
|
Web:
|
|
|
http://www.seccuris.com
|
Seccuris has been helping clients with business-driven information
security solutions through professional consulting and managed
services since 1999. We're the alternative because we help you
uncover known and unknown risks that threaten not only your
technology, but also your entire enterprise. Then we work with you
to design exactly what you need; whether it's Enterprise Security
Architecture, Information Assurance Audits, IT Risk Management and
Compliance, Security Response Services or our OneStone™ Information
Assurance Portal. That way you can make effective risk-based
decisions at every level. Call us at (866) 644-8442 to discuss the
right solution for your needs.
|
|
|
|
|
Company:
|
|
|
Security Mentor
|
Booth:
|
|
|
532
|
Web:
|
|
|
https://www.securitymentor.com/
|
Security Mentor®, pioneer of security awareness training that
employees love to take, enables companies in every industry to
reduce risk by creating a more secure workforce. Interactive, highly
engaging lessons teach critical security skills in an
easy-to-understand, fun format. Our Brief, Frequent, Focused™
training model of 10-minute lessons delivered monthly fits
employees' busy schedules and keeps security top of mind. Training
is served from Security Mentor's Cloud LMS or provided as
SCORM-compliant modules. Founded in 2008, customers range from
Fortune 500 enterprises to local and state governments, including
the State of Michigan. To learn more, request a demo at
www.securitymentor.com.
|
|
|
|
|
Company:
|
|
|
Seculert
|
Booth:
|
|
|
127
|
Web:
|
|
|
www.seculert.com
|
Seculert provides enterprises comprehensive protection from advanced
persistent threats and malware. Its integrated platform technology
analyzes malware communications, traffic logs, and suspicious files
to identify both known and unknown advanced threats. Seculert's
proven cloud-based technology leverages crowdsourcing and Big Data
analytics to identify and block attacks as they develop. Founded in
2010, Seculert has offices in the U.S., the U.K. and Israel. For
more information, visit www.seculert.com.
|
|
|
|
|
Company:
|
|
|
Secure Access Technologies Inc.,
|
Booth:
|
|
|
2434 South Hall
|
Web:
|
|
|
www.SecureAccessTechnologies.com
|
Secure Access Technologies Inc. (SAT) is a Menlo Park, CA based
start-up that provides the strongest data security on the market
today with stepped-up authentication and real-time proximity
monitoring.
|
|
|
|
|
SAT uses the user's smart phone with SAT MobileID to protect data on
mobile devices and computers.
|
|
|
|
|
The user authenticates only once to any application on any device
when SAT MobileID is in proximity. When the user walks away, the
data locks automatically.
|
|
|
|
|
SAT partnered with RSA and MobileIron and has more than 10 patents
issued. Breakthrough security and user experience. For more
information, visit www.secureaccesstechnologies.com.
|
|
|
|
|
Company:
|
|
|
Shape Security
|
Booth:
|
|
|
2001
|
Web:
|
|
|
shapesecurity.com
|
Shape Security is a startup in Mountain View, California that has
created a completely new approach to website defense. Its flagship
product, the ShapeShifter, is the world's first botwall: an advanced
technology that disables the attack capability of malware, botnets,
and scripts. This results in a comprehensive defense against the
most serious website breaches, for which there are no other existing
solutions. Shape is backed by top investors including Kleiner
Perkins, Google Ventures, and Eric Schmidt. It is led by
cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley
Networks, Palo Alto Networks, VMware, and Google.
|
|
|
|
|
Company:
|
|
|
Sims Recycling Solutions
|
Booth:
|
|
|
2421
|
Ticker Symbol & Exchange:
|
|
|
ASX: SGM
|
Web:
|
|
|
us.simsrecycling.com
|
Sims Recycling Solutions (us.simsrecycling.com), the global leader
in electronics reuse and recycling, offers customers comprehensive
recycling services out of our 52 owned and operated sites across the
globe.
|
|
|
|
|
Our customers rely on our global reach, expertise, and
infrastructure to secure their data, process their electronic
equipment in an environmentally responsible manner, protect their
reputations, and eliminate their compliance risks.
|
|
|
|
|
In North America, Sims operates 14 sites enabling us to offer
services anywhere you do business.
|
|
|
|
|
Company:
|
|
|
Skybox Security
|
Booth:
|
|
|
South Expo 715
|
Web:
|
|
|
http://www.skyboxsecurity.com/
|
Skybox Security, Inc. provides the most powerful risk analytics for
cyber security, giving security management and operations the tools
they need to eliminate attack vectors and safeguard business data
and services. Skybox solutions provide a context-aware view of the
network and risks that drives effective vulnerability and threat
management, firewall management, and continuous compliance
monitoring. Organizations in Financial Services, Government, Energy,
Defense, Retail, and Telecommunications rely on Skybox Security
every day for automated, integrated security management solutions
that lower risk exposure and optimize security management processes.
|
|
|
|
|
Company:
|
|
|
Software Diversified Services
|
Booth:
|
|
|
2508
|
Web:
|
|
|
www.sdsusa.com
|
Software Diversified Services (SDS) now provides all sales, support,
and development for E-Business Server encryption and security
software. SDS's E-Business Server is based on the McAfee product
formerly marketed under the E-Business Server name, which McAfee has
licensed to SDS.
|
|
|
|
|
SDS's commitment means this enterprise-scale encryption server will
remain a trusted tool for years to come.
|
|
|
|
|
SDS teams the E-Business Server with its other security tools:
VitalSigns for FTP automates secure file transfer; in collaboration
with software from SSH Corporation, it encrypts data in transit.
|
|
|
|
|
Since 1982, SDS has provided software to hundreds of customers
worldwide, including Global 500 companies.
|
|
|
|
|
Company:
|
|
|
SOLARFLARE
|
Booth:
|
|
|
2220
|
Web:
|
|
|
www.solarflare.com
|
Solarflare is the leading provider of application-intelligent
networking I/O software and hardware that accelerate, monitor and
secure network data. In January, Solarflare launched SolarSecure to
provide a new level of server protection to mission-critical
networks vulnerable to cyber security breaches. Without any need for
additional hardware, Solarflare enables enterprises to implement
security policies to guard servers at the network level. Solarflare
protects hosts by implementing policies from the Norse Live Threat
Intelligence dark list in the Solarflare DDOS filter engine. Visit
Solarflare Booth #2220 to see the Solarflare+Norse demonstration of
"Self-Protecting, Hardened Hosts."
|
|
|
|
|
Company:
|
|
|
SolarWinds
|
Booth:
|
|
|
2507
|
Ticker Symbol & Exchange:
|
|
|
NYSE: SWI
|
Web:
|
|
|
www.solarwinds.com
|
SolarWinds provides powerful and affordable IT management software
to customers worldwide from Fortune 500 enterprises to small
businesses. In all of our market areas, our approach is consistent.
We focus exclusively on IT pros and strive to eliminate the
complexity that they have been forced to accept from traditional
enterprise software vendors. SolarWinds delivers on this commitment
with unexpected simplicity through products that are easy to find,
buy, use and maintain while providing the power to address any IT
management problem on any scale.
|
|
|
|
|
Company:
|
|
|
Solutionary / NTT Group Security Company
|
Booth:
|
|
|
1615
|
Ticker Symbol & Exchange:
|
|
|
NTT
|
Web:
|
|
|
www.solutionary.com
|
Solutionary, a leading managed security services provider (MSSP),
focuses on delivering managed security services, security consulting
services and global threat intelligence. Solutionary services
protect traditional and virtual IT infrastructures, cloud
environments and mobile data. Clients are able to optimize security
programs, make informed decisions, achieve compliance, and reduce
costs. The Solutionary Security Engineering Research Team (SERT)
researches the global threat landscape, providing actionable threat
intelligence, enhanced threat detection and mitigating controls.
Experienced, certified Solutionary security experts act as an
extensions of clients' internal teams, providing industry-leading
client service to global enterprise and mid-market clients across
all industries.
|
|
|
|
|
Company:
|
|
|
Thales e-Security
|
Booth:
|
|
|
909
|
Web:
|
|
|
www.thales-esecurity.com
|
Thales e-Security is a leading global provider of data encryption
and cyber security solutions to the financial services, high
technology, manufacturing, government and technology sectors. Thales
is showcasing its high assurance cryptographic solutions for
protecting big data, public key infrastructures (PKIs), cloud and
mobile payments at this year's RSA Conference. As organizations
increasingly rely on cryptography as part of their data protection
strategy and to protect their critical systems, the trustworthiness
of these crypto systems becomes paramount, particularly in light of
recent concerns over back doors, poorly implemented crypto systems
and the increasing burdens arising from privacy mandates. Thales can
help organizations re-assess and re-evaluate their crypto security
and key management infrastructure and deliver solutions that ensure
their integrity and trustworthiness.
|
|
|
|
|
Company:
|
|
|
ThreatTrack Security, Inc.
|
Booth:
|
|
|
1901
|
Web:
|
|
|
www.threattracksecurity.com
|
ThreatTrack Security specializes in helping organizations identify
and stop Advanced Persistent Threats (APTs), targeted attacks and
other sophisticated malware that are designed to evade the
traditional cyber-defenses deployed by enterprises, and small and
medium-sized businesses (SMBs) around the world. The company
develops advanced cybersecurity solutions that analyze, detect and
remediate the latest malicious threats, including its ThreatSecure
advanced malware protection platform, ThreatAnalyzer malware
behavioral analysis sandbox, VIPRE business and consumer antivirus
software, and ThreatIQ real-time threat intelligence service.
|
|
|
|
|
Company:
|
|
|
Thycotic Software
|
Booth:
|
|
|
415
|
Web:
|
|
|
www.thycotic.com
|
Thycotic Software deploys smart, reliable, IT security solutions
that empower companies to control and monitor privileged account
credentials and identity access for administrators and end-users. A
member of the Inc. 5000, Thycotic is recognized as the fastest
growing, privately held PAM provider in the USA. Secret Server
manages passwords and identity access across a company's entire IT
infrastructure. Thycotic also provides end-user password rest and
self-service AD group management tools. Trusted by over 2,500
organizations worldwide - including members of the Fortune 500,
enterprises, government agencies, technology firms, universities,
non-profits, and managed service providers. To learn more, please
visit www.thycotic.com.
|
|
|
|
|
Company:
|
|
|
TIBCO Software, INC
|
Booth:
|
|
|
1709
|
Ticker Symbol & Exchange:
|
|
|
TIBX
|
Web:
|
|
|
www.tibco.com/loglogic
|
TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure
software for companies to use on-premise or as part of cloud
computing environments. The TIBCO LogLogic® product line provides
organizations with security, compliance and IT optimization through
enterprise-class log management and predictive intelligence for big
data which enables companies to achieve the Two-Second Advantage® -
the ability to capture the right information at the right time and
act on it preemptively for a competitive advantage. Learn more at
www.tibco.com/loglogic.
|
|
|
|
|
Company:
|
|
|
TITUS
|
Booth:
|
|
|
801
|
Web:
|
|
|
www.titus.com
|
TITUS solutions enable organizations to classify, protect and
confidently share information, and meet regulatory compliance
requirements by identifying and securing unstructured data. TITUS
Classification Suite includes the leading email, document and file
classification and marking solutions that enhance data loss
prevention by involving end users in identifying sensitive
information. TITUS solutions are trusted by over 2 million users
within more than 600 organizations in 60 countries around the world.
Our customers include Dell, Nokia, Dow Corning, United States Air
Force, NATO, Pratt and Whitney, Canadian Department of National
Defence, Australian Department of Defence, and the U.S. Department
of Veterans Affairs.
|
|
|
|
|
Company:
|
|
|
TraceSecurity
|
Booth:
|
|
|
2314
|
Web:
|
|
|
www.tracesecurity.com
|
TraceSecurity, a leading pioneer in cloud-based security solutions,
provides IT GRC management solutions that give decision makers a
holistic view of their security posture, enable effective data
protection and automate compliance. TraceSecurity's flagship
software solution, TraceCSO, is the first platform to effectively
transform IT GRC management into a unified and easy-to-use business
application and can be deployed in a matter of weeks. With more than
1,700 customers, TraceSecurity supports organizations in financial
services, healthcare, high-tech, insurance, government, education
and other regulated sectors. Founded in 2004, the company has
executive offices in Silicon Valley and offices in Baton Rouge,
Louisiana.
|
|
|
|
|
Company:
|
|
|
Trend Micro
|
Booth:
|
|
|
2601
|
Ticker Symbol & Exchange:
|
|
|
TSE: 4704; TYO 4704
|
Web:
|
|
|
www.trendmicro.com
|
Trend Micro Incorporated a global leader in security software, rated
number one in server security (IDC, 2013), strives to make the world
safe for exchanging digital information. Built on 25 years of
experience, our solutions for consumers, businesses and governments
provide layered data security to protect information on mobile
devices, endpoints, gateways, servers and the cloud. Trend Micro
enables the smart protection of information, with innovative
security technology that is simple to deploy and manage, and fits an
evolving ecosystem. All of our solutions are powered by cloud-based
global threat intelligence, the Trend MicroT Smart Protection
NetworkT infrastructure, and are supported by over 1,200 threat
experts around the globe. For more information, visit TrendMicro.com.
|
|
|
|
|
Company:
|
|
|
Trustwave
|
Booth:
|
|
|
3527, North Hall
|
Web:
|
|
|
www.trustwave.com
|
Trustwave helps businesses fight cybercrime, protect data and reduce
security risks. With cloud and managed security services, integrated
technologies and a team of security experts, ethical hackers and
researchers, Trustwave enables businesses to transform the way they
manage their information security and compliance programs while
safely embracing business imperatives including big data, BYOD and
social media. More than two million businesses are enrolled in the
Trustwave TrustKeeper® cloud platform, through which Trustwave
delivers automated, efficient and cost-effective data protection,
risk management and threat intelligence. Trustwave is a privately
held company, headquartered in Chicago, with customers in 96
countries. For more information about Trustwave, visit
www.trustwave.com
|
|
|
|
|
Company:
|
|
|
Tufin Technologies
|
Booth:
|
|
|
1821
|
Web:
|
|
|
www.tufin.com
|
Tufin® is the leader in Security Policy Orchestration, automating
and accelerating network infrastructure changes while maintaining
security and compliance. By improving network change processes,
organizations using the Tufin Orchestration SuiteT will have a
positive impact on the business by reducing the time and cost spent
implementing network changes by up to 80 percent. The Tufin
Orchestration Suite helps organizations automate security and
efficiency into day-to-day operations, enabling them to be more
agile and leverage technology to gain a competitive advantage.
Founded in 2005, Tufin serves more than 1,300 customers in
industries from telecom and financial services to energy,
transportation and pharmaceuticals and partners with leading vendors
including Check Point, Cisco, Juniper Networks, Palo Alto Networks,
Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software.
|
|
|
|
|
Company:
|
|
|
Unisys Corporation
|
Booth:
|
|
|
3621
|
Ticker Symbol & Exchange:
|
|
|
NYSE: UIS
|
Web:
|
|
|
http://www.unisys.com/unisys/
|
Unisys is a worldwide information technology company. We provide a
portfolio of IT services, software, and technology that solves
critical problems for clients. We specialize in helping clients
secure their operations, increase the efficiency and utilization of
their data centers, enhance support to their end users and
constituents, and modernize their enterprise applications. To
provide these services and solutions, we bring together offerings
and capabilities in outsourcing services, systems integration and
consulting services, infrastructure services, maintenance services,
and high-end server technology. With approximately 23,000 employees,
Unisys serves commercial organizations and government agencies
throughout the world. For more information, visit
http://www.unisys.com/unisys/.
|
|
|
|
|
Company:
|
|
|
University of Denver
|
Booth:
|
|
|
2133
|
Web:
|
|
|
http://universitycollege.du.edu
|
University College, the college of professional and continuing
studies at the University of Denver, offers cutting-edge master's
degrees and certificates online and on campus in Information Systems
Security. Students receive applied instruction from expert
practitioners as they learn to navigate real-world security
challenges. You will analyze security needs, provide viable
solutions, and develop the breadth of knowledge needed for success
in the global arena of information assurance. The curriculum covers
such topics as network security, physical security, cryptography,
cyber law, computer forensics, and application security. The
University of Denver is a designated Center for Academic Excellence
in Information Assurance Education.
|
|
|
|
|
Company:
|
|
|
Viewfinity
|
Booth:
|
|
|
841
|
Web:
|
|
|
www.viewfinity.com
|
Viewfinity is leveraging its core endpoint protection technology to
meet the increased need for smarter, more agile security solutions,
that not only detect but respond to threats. Our endpoint agent
diligently monitors for and detects suspicious behavior, and
responds by harnessing attacks before they permeate an IT
infrastructure. Our visibility, detection and remediation, along
with purposeful forensics, provide a structure that helps progress
the level of cybersecurity that targets and adapts enterprise IT
security mechanisms. Our endpoint protection encompasses forensics,
prevention, visibility, and remediation, offering advanced
protection against advanced targeted attacks.
|
|
|
|
|
Company:
|
|
|
wolfSSL Inc.
|
Booth:
|
|
|
839
|
Web:
|
|
|
http://www.wolfssl.com
|
wolfSSL, founded in 2004, is an open source Internet security
company whose primary products include the CyaSSL lightweight SSL
library and the yaSSL Embedded Web Server. Primary users are
programmers building security functionality into their applications
and devices. wolfSSL employs the dual licensing model, like MySQL,
offering products under the GPLv2 as well as a standard commercial
license.
|
|
|
|
|
wolfSSL's products are designed to offer optimal performance, rapid
integration, the ability to leverage hardware crypto, and support
for the most current standards. All products are designed with clean
APIs, and are backed by a dedicated and responsive support and
development team.
|
|
|
|
|
Company:
|
|
|
Wontok, Inc.
|
Booth:
|
|
|
2502
|
Web:
|
|
|
www.wontok.com
|
With global operations, Wontok, Inc. (booth # 2502) delivers proven
data security solutions that fill the gaps left by conventional
security offerings. Wontok's added layer of security provides
businesses, government organizations and consumers the confidence
that their online commerce and communications are secure and their
data is safe. During The RSA Conference February 24-28th, Wontok
announces two new malware prevention products targeted for Retailers
and Banks adding on its flagship product, Wontok™ SafeCentral, a
proven endpoint cybersecurity solution that renders malware
inoperable even on already infected PCs running Windows. Please
contact us to arrange an interview with Wontok's CEO, Adam Tegg.
|
|
|
|
|
Company:
|
|
|
Zscaler
|
Booth:
|
|
|
1135
|
Web:
|
|
|
www.zscaler.com
|
Zscaler is transforming enterprise networking and security with the
world's largest Direct-to-Cloud Network, which securely enables the
productivity benefits of cloud, mobile and social technologies
without the cost and complexity of traditional on-premise appliances
and software.
|
|
|
|
|
The Zscaler Direct-to-Cloud Network processes daily more than 12
billion transactions from more than 12 million users in 180
countries across 100 global data centers with near-zero latency.
Learn why more than 4,500 global enterprises choose Zscaler to
enable end-user productivity, enforce security policy and streamline
WAN performance.
|
|
About Business Wire
Business Wire, a Berkshire
Hathaway company, is the global leader in press
release distribution and regulatory
disclosure. Investor relations, public relations, public policy and
marketing professionals rely on Business Wire to accurately distribute
market-moving news and multimedia, host online
newsrooms and IR
websites, build content
marketing platforms, generate social engagements and provide
audience analysis that improves interaction with specified target
markets. Founded in 1961, Business Wire is a trusted source for news
organizations, journalists, investment professionals and regulatory
authorities, delivering news directly into editorial systems and leading
online news sources via its multi-patented simultaneous NX Network.
Business Wire has 32 offices worldwide to securely meet the varying
needs of communications professionals and news consumers.
Learn more at BusinessWire.com
and the BusinessWired
blog; follow updates on Twitter: @businesswire
or on Facebook.
Click
here to subscribe to Mobile Alerts for Business Wire
[ Back To TMCnet.com's Homepage ]
|