Corporate Displays

Tuesday, May 14 | 10:15AM–6:00PM CT | Zurich Ballroom Foyer, First Floor Event Centre
Session Type: Industry Led

Companies will be showcasing security technology solutions for higher education with dedicated visiting time scheduled during the morning and afternoon breaks. Stop by to learn more about their solutions and interact with company representatives.

Best Practical Solutions
Best Practical Solutions develops and maintains Request Tracker (RT) and Request Tracker for Incident Response (RTIR). RTIR was designed in collaboration with several global security organizations to enable security teams, CERTs, CSIRTS, and similar types of groups to manage and respond to network and security incidents for their organizations.

Program Track: Incident Management and Response

Corelight
Come to Corelight's table to learn why network security monitoring is your best next move and how it can dramatically accelerate your average incident response times and unlock new threat detection and threat hunting capabilities.

Program Track: Incident Management and Response

CrowdStrike
CrowdStrike is the leader in cloud-delivered endpoint protection, going beyond traditional antivirus to provide complete protection. Our cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed. CrowdStrike’s ultimate goal is to help customers stop breaches immediately, with minimal time, effort, and impact on their processes.

Program Track: Incident Management and Response

Deloitte, Silver Partner
Deloitte’s Higher Education practice can help higher education institutions become more diligent and deliberate in being secure and resilient, focusing on policies and controls to prevent the compromise of their most risk-sensitive assets and operations. We can help achieve the fundamentals faster, by leveraging our engagement accelerators, extensive industry experience, and deep cyberrisk domain knowledge to safeguard risk-sensitive assets and operations. Learn more at: www.deloitte.com/us/higher-ed-cyber-security.

Program Track: Governance, Risk, and Compliance (GRC)

EdgeWave
EdgeWave delivers unparalleled inbox protection from today’s exploding messaging threats like phishing, spoofing, BEC, and more. At the core of our email security solutions is ThreatTest, an automated inbox detection and response solution that uses machine learning and expert human review to quickly catch, analyze, and resolve suspicious emails.

Program Track: Incident Management and Response

FireEye
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. FireEye eliminates the complexity and burden of cybersecurity for academic organizations struggling to prepare for, prevent, and respond to cyberattacks.

Program Track: Cyber Threat Intelligence

Fischer Identity, Silver Partner
The Fischer International Identity mission is simple: your success. We make identity governance and administration work for your organization, technically and financially. We never stop innovating or evolving. We are never satisfied because we know we can make IGA easier. Fischer Identity is the last IGA product you will ever need.

Program Track: Identity and Access Management

Forescout Technologies
Forescout is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, 100% real-time and continuous discovery and classification.

Program Track: Security Operations and Engineering

Identity Automation
Identity Automation helps organizations embrace security, increase business agility, and deliver an enhanced user experience with RapidIdentity, the most complete identity, access, governance, and administration platform available.

Program Track: Identity and Access Management

LastPass
LastPass provides secure password management to reduce the risk of breach and remove employee password frustration. With secure password sharing, customizable policies, and comprehensive user management, LastPass gives businesses of all sizes the tools to create an enterprise security posture. Founded in 2008, LastPass is a product of LogMeIn.

Program Track: Identity and Access Management

Moran Technology Consulting, Gold Partner
Moran Technology Consulting provides IT management and technology consulting to higher education clients, including IAM strategic planning, vendor selection, architecture, and implementation; Active Directory security assessments and secure (re)design; and IT security assessments and security program implementation.

Program Track: Identity and Access Management

Painless Security
Painless Security offers Jisc Liberate in North America. Liberate is a fully managed cloud solution that gives you access to the InCommon Federation, eduroam, and a Shibboleth-based web proxy in an easy-to-configure service. With Liberate, you can save time and money, reduce risk, and eliminate the need for specialized in-house expertise.

Program Track: Identity and Access Management

Quest Software
No matter where—on premises, cloud, or hybrid—Quest is your go-to expert to help move, manage, and secure your most critical Microsoft platforms so you have more time to drive innovation forward.

Program Track: Governance, Risk, and Compliance (GRC)

Rapid7
TBD Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Learn more at www.rapid7.com.

Program Track: Incident Management and Response

Salty Cloud
SaltyCloud provides workflow automation solutions for security/risk teams and was created in the InfoSec trenches at UT Austin and Georgia Tech for real and acute pain points. Our products are for higher education, by higher education and include questionnaire-based security/risk assessments, asset classification, vendor assessments, credential management, antiphishing,and the popular Dorkbot service.

Program Track: Governance, Risk, and Compliance (GRC)

San Diego Supercomputer Center
SDSC Health Cyberinfrastructure Division’s Sherlock Cloud platform was established to provide managed services to meet the secure computing and data management needs of our academic, government, and industry partners. It offers a multitude of high-touch, value-added turnkey solutions that span secure cloud computing, big data management, data science, and analytics.

Program Track: Governance, Risk, and Compliance (GRC)

SpyCloud
SpyCloud is the leader in account takeover (ATO) prevention. We help institutions of all sizes mitigate account takeover by proactively remediating account exposures for students and faculty in an automated way. We accomplish this through our award-winning ATO prevention solutions powered by a world-class team of security researchers and technology.

Program Track: Cyber Threat Intelligence

Symantec Corporation
Symantec Corporation, the world’s leading cybersecurity company, helps organizations, governments, and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, the cloud, and infrastructure. For more information, please visit www.symantec.com.

Program Track: Security Architecture and Design

TDI Security
Having experienced the challenges and complexities associated with managing cybersecurity for multiple organizations firsthand, we knew there had to be a better way. CnSight is an innovative and practical solution providing situational awareness for leaders to help them truly understand and improve the effectiveness of their cybersecurity.

Program Track: Strategic Leadership, Professional/Organizational Development, and Personnel Management

WTC Consulting
Our information security assessment provides six key elements: (1) inventory of security services provided by the central IT organization, (2) assessment of central IT staffing levels, (3) identification of gaps and vulnerabilities in the IT security environment, (4) assessment of security policy and practices, (5) security and user awareness training recommendations, and (6) estimated costs.

Program Track: Governance, Risk, and Compliance (GRC)

Yakabod
Built for higher ed, CISOBox delivers efficient, secure information security incident management through intelligence agency–accredited technology. Universities use CISOBox to isolate and secure sensitive incident data, documentation, and communication; generate critical metrics; and gain NIST 800-61r2 compliance. CISOBox’s new security review management application offers efficient handling of vendor assessments, too.

Program Track: Incident Management and Response