Connect Collaborate Influence Confirmed Exhibitors/Sponsors · Confirmed Exhibitors/Sponsors ......

7
Confirmed Exhibitors/Sponsors AppCheck Ltd provides a leading web application and external infrastructure vulnerability scanning tool (automated penetration testing tool), that allows its users to automate the discovery of security flaws within their network perimeter quicker, easier and more accurately. AppCheck bridges the gap between manual and automated penetration testing by offering a unique scripting solution which maps and tests user work flows, thus ultimately mapping a much larger attack surface and identifying more flaws. The solution also gives logical and easy to follow remedial steps. Alienvault Belkin Bob’s Business is a cyber security awareness training and innovative phishing simulation provider on a mission to help you bridge the knowledge gap between IT and end users. By using relatable animated scenarios, your employees learn the practical information security skills they need to create long-lasting behavioural change. With Bob’s Business you can be sure of a fully managed solution driven by a modular approach that aims to educate the end user in small steps, one module at a time. Having gained the ISO 27001 certification, you can trust that Bob’s Business understands compliance requirements and how their solution can support your organisation in developing a secure culture. Beyond Networks: How to get to tomorrow, today Connect Collaborate Influence

Transcript of Connect Collaborate Influence Confirmed Exhibitors/Sponsors · Confirmed Exhibitors/Sponsors ......

Confirmed Exhibitors/Sponsors

AppCheck Ltd provides a leading web application and external infrastructure vulnerability scanning tool (automated penetration testing tool), that allows its users to automate the discovery of security flaws within their network perimeter quicker, easier and more accurately.AppCheck bridges the gap between manual and automated penetration testing by offering a unique scripting solution which maps and tests user work flows, thus ultimately mapping a much larger attack surface and identifying more flaws. The solution also gives logical and easy to follow remedial steps.

Alienvault

Belkin

Bob’s Business is a cyber security awareness training and innovative phishing simulation provider on a mission to help you bridge the knowledge gap between IT and end users. By using relatable animated scenarios, your employees learn the practical information security skills they need to create long-lasting behavioural change.With Bob’s Business you can be sure of a fully managed solution driven by a modular approach that aims to educate the end user in small steps, one module at a time.Having gained the ISO 27001 certification, you can trust that Bob’s Business understands compliance requirements and how their solution can support your organisation in developing a secure culture.

Beyond Networks: How to get to tomorrow, todayConnect Collaborate Influence

Bomgar is the leader in Secure Access solutions that empower businesses. Bomgar’s leading privileged access management and secure remote support solutions help security, IT and support professionals improve productivity and security by enabling secure, controlled connections to any system or device, anywhere in the world. www.bomgar.com

Cyberark

The Cyber Policy Centre is an independent public policy centre devoted exclusively to the consideration of cyber as a socio-technical phenomenon, set up to provide much-needed fresh thinking about Cyber issues. The need for good new law, policy and regulation around cyber is becoming ever more pressing. Cyber has thrown up a series of questions with a profound impact on the conduct of business by multinational enterprises across the global economy, and questions that go to the heart of the future of the nature and conduct of liberal democracy. Our aim is to facilitate and develop a sophisticated and productive debate to help shape future policy making. We are an independent, non-partisan, politically non-aligned organisation. We apply rigorous research and critical scholarship to the commercial, legal, policy and regulatory implications around the cyber phenomenon.

DellEMC is working together with the Ministry of Defence, Systems Integrators/Central & Local Govt./Emergency Services and Healthcare to simplify the acquisition of secure, agile solutions tailored for the demands of defending national interests.

Govt. departments require flexible, agile solutions that deliver the best possible value for money. In reducing complexity and costs, DellEMC has developed a number of vertical solutions within the Govt. & Defence sector (including Rugged mobility solutions).

With cybersecurity now a major battleground for the UK, security is at the heart of all DellEMC solutions, providing the protection necessary to combat threats together with a range of services to monitor networks, 24/7.

Gemalto's SafeNet Identity and Data Protection solutions are trusted by the largest and most respected brands around the world to protect their data, identities, and intellectual property. As the world leader in digital security, Gemalto ensures the authenticity of your banking transactions, safeguards your health records, protects the purchase of your morning cup of coffee, and helps organizations to control risk, manage security, and maintain compliance.

https://safenet.gemalto.com/

IBM

With GDPR looming, IT teams are relied upon to secure systems, information and transmission of personal data. Thousands of organisations rely on Ipswitch to enable data transfers and achieve compliance for regulations such as GDPR. MOVEit Managed File Transfer secures data in transit and at rest, whilst providing reporting and audit trails to mitigate risks of fines. https://www.ipswitch.com

IP Performance have been delivering specialised infrastructure solutions and integrating complex network systems since 1994.

We deliver internet/networking services and products as well as professional, certified network management and technical support services - 24 hours a day. IP Performance has built a reputation for technical expertise across a range of technologies, and can demonstrate a history of translating technology into solutions for our customers, improving productivity and efficiency, and delivering a real return on investment.

Our clients range from the largest telecommunication service providers, to blue-chip corporates, to the education and local government sectors.

www.ip-performance.co.uk

When LANDESK and HEAT Software combined in January of 2017, we knew we needed a new company name. For nearly 30 years, LANDESK and HEAT offered user-centered IT solutions designed to

increase user productivity while reducing IT security risk. LANDESK was the only vendor recognised by Gartner in the four areas of client management, endpoint protection, IT service and support, and enterprise mobility management.

Whether you’re looking for systems management, IT asset management solutions, IT service management improvement in the cloud, IT security solutions, or patch management that you can use with or without SCCM, Ivanti stands ready to help.

LEO Society

LogRhythm, a leader in security intelligence and analytics, empowers organisations around the globe to rapidly detect, respond to and neutralise damaging cyber threats. The company’s patented award-win-ning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.LogRhythm is consistently recognised as a market leader. The company has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for four consecutive years, named a ‘Champion’ in Info-tech Research Group’s 2014-15 SIEM Vendor Landscape report, received SC Labs ‘Recommended’ 5-Star rating for SIEM and UTM for 2016 and earned Frost & Sullivan’s 2015 Global Security Information and Event Management (SIEM) Enabling Technology Leadership Award. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region.

Metalogix

NSSL Global Ltd

Paessler AG’s award winning PRTG Network Monitor is a powerful, affordable and easy-to-use Unified Monitoring solution. It is a highly flexible and generic software for monitoring IT infrastructure, already in use at enterprises and organizations of all sizes and industries. Over 150,000 IT administrators in more than 170 countries rely on PRTG and gain peace of mind, confidence and convenience. Founded in 1997 and based in Nuremberg, Germany, Paessler AG remains a privately held company that is recognized as both a member of the Cisco Solution Partner Program and a VMware Technology Alliance Partner. http://www.paessler.com/

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this, we safely enable applications, users and content; deliver visibility, automation and control; and detect and prevent threats at every stage of the attack lifecycle, so organizations can securely and efficiently move their businesses forward.

Panda Security’s Adaptive Defense 360 is the first and only offering to combine next-gen Endpoint Protection (EPP) with an Endpoint Detection and Response (EDR) service for both endpoints and servers.

By continuously monitoring and classifying every application running within the company network, Adaptive Defense 360 is able to protect against all threats including Ransomware, APTs and data theft.

The ability to know only trusted processes are running in your network, and with forensic capabilities in case a breach happens… is a game changer.

Trial Adaptive Defense 360 to see what your existing security is missing

http://www.pandasecurity.com/uk/intelligence-platform/

Qualys, is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Please visit us at www.qualys.com

Radware (NASDAQ: RDWR) is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com

Sophos makes IT security simple with complete solutions that protect networks, servers and devices, wherever they are located. Today, more than 100 million users in 150 countries and a global network of channel partners rely on Sophos for trusted solutions to complex security challenges. Focused on innovation and backed by a global network of SophosLabs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain and manage, enabling organizations to focus on performance and growth. Sophos – Security made Simple.

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics.

Learn more at www.tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.

Verisec/Thales

Veritas Technologies enables organizations to harness the power of their information to drive business success, with solutions designed to serve the world’s most complex, heterogeneous environments. Veritas works with 86 percent of Fortune 500 companies today, helping them improve their data availability and unlock insights to make them more competitive.

From traditional data centers to private, public and hybrid clouds, Veritas helps enterprises protect, identify and manage data regardless of their environment through a comprehensive product strategy and roadmap focused on their needs. Veritas’ products for backup and recovery, business continuity, software-defined storage and information governance help automate information management and reduce manual effort so enterprises can focus on what they do best.

VMware, a global leader in cloud infrastructure and business mobility, helps customers accelerate their digital transformation. VMware enables enterprises to master a software-defined approach to business and IT with its Cross-Cloud Architecture™ and solutions for the data center, mobility, and security. With 2016 revenue of $7.09 billion, VMware is headquartered in Palo Alto, CA and has over 500,000 customers and 75,000 partners worldwide.

York College is ranked Yorkshire’s No. 1 General Further Education College* with first-class resources for post-16 students. We are the leading provider of Apprenticeships, A Levels and Vocational courses in the region, graded Outstanding with Ofsted and provide the highest standards for individual student achievement in an exceptional environment for teaching and learning.

In conjunction with SBL, we’re running a Sensible Cyber Security for Everyday Life and Business course and how to put this into practice, 17th and 18th July 2017. This will be delivered through a combination of talks, workshops, debates and structured discussions http://ow.ly/4HR330aqGBX

*based on A Levels