California Cybersecurity Forum Sponsors
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
Aruba, a Hewlett Packard Enterprise company, saw the need for a modern approach to designing enterprise security that leverages the power of the network and a full range of advanced analytics including AI-based machine learning. The Aruba 360 Secure Fabric is an enterprise security framework that gives security and IT teams an integrated way to gain visibility, control and advanced threat defense. Learn more at the California Cybersecurity Forum.
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed. CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates over 78 billion security events a day from across the globe to immediately prevent and detect threats.
ExtraHop provides hybrid security for the cloud-first enterprise, delivering Network Detection and Response (NDR) powered by cloud-scale machine learning. With complete visibility, real-time threat detections, and guided investigation, ExtraHop enables security teams to rise above the noise of alerts, organizational silos, and runaway technology in order to accelerate investigations, unify policies across hybrid environments, and build their security the way they’re building their business: cloud-first.
Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environment and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device, as well as continuous posture assessment. As of December 31, 2018, 3,300 customers in over 80 countries rely on Forescout’s infrastructure-agnostic solution to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity.
IBM is enabling systems of health to become smarter, more efficient and uniquely personalized. With Watson Health, we are pioneering a new partnership between humanity and technology with the goal of transforming global health. IBM's healthcare solutions, technology & consulting enable organizations to achieve greater efficiency within their operations, collaborate to improve outcomes, and integrate with new partners for a more sustainable, personalized and patient-centric system.
Company description: Nyotron pioneers a new generation of automatic Endpoint Detection and Response with integrated protection called Endpoint Prevention and Response (EPR). Our product prevents damage from malware that evades existing security controls and offers granular visibility into the attack. Based on the OS-Centric Positive Security, Nyotron’s PARANOID automatically whitelists trusted operating system behavior and rejects everything else. No manual threat hunting, baselining, machine learning or cloud connectivity required. With PARANOID organizations gain true defense-in-depth protection against the most advanced attacks.