Welcome to ITSPmagazine's Company Directory

We invite you to browse the listings to see the latest press, next event, and current promotional offering as submitted to us by each company.


 

                   

ANEXIO is an accredited provider of Cloud and managed IT business services. ANEXIO delivers a broad range of advanced IT services to small to mid-size organizations, focusing on reducing overall costs while enabling businesses growth. The company serves several key industries including Financial Services, Healthcare, Technology, Professional Services and Entertainment & Media. Founded in 1996, we started out with a mission to give business owners peace of mind and freedom from worrying over their technology, Today, we combine decades of experience with practical knowledge and continuous innovation to make IT work for businesses 24 hours a day, 7 days a week, all year round.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Armor exists to protect. Each employee feels our passion, knows the vision and lives the company values. Diversity is key. Everyone on the team learns right away that their role is important to Armor’s success. We volunteer our best every day and go to any length to ensure our customers are protected. There are no short cuts. And “good enough” service is never enough. Simply put, we want customers to rave about their experience with us.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Arxan is the trusted leader of Application Attack Prevention and Self-Protection products for Internet of Things (IoT), Mobile, Gaming, Digital Media, and other embedded applications. Arxan provides the most comprehensive end-to-end enterprise solution for application protection including a robust software/cloud solution, a strong ecosystem of partners, a leading-edge research group, professional services, and a world class support organization. We help organizations protect their applications from hacker attacks by making their applications resilient to prevent hackers from tampering and also blocking attacks real time in static or run-time mode. This also helps customers get compliant with regulatory and industry standards including PCI, GLBA, HIPAA, OWASP, among others. By deterring application attacks, we protect customers from financial loss, brand damage, IP theft, stolen credentials, and fraudulent transactions, unauthorized access, non-compliance with standards, and more.


Latest Press

  Featured Item

2016 State of Application Security Infographic >> View Now

Next Event

 

                   

Balabit – headquartered in Luxembourg – is a leading provider of contextual security technologies with the mission of preventing data breaches without constraining business. Balabit operates globally through a network of local offices across the United States and Europe together with partners. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.


Latest Press

Next Event

 

                   

Bay Dynamics® enables enterprises to prioritize security activities and direct their limited resources at their most important problems. The company’s flagship product, Risk Fabric®, is a software platform for enterprises requiring timely prioritization and remediation of security exposures impacting their most critical IT systems and data assets. Risk Fabric benefits enterprises with improved timeliness of action by automating the delivery of personalized and prioritized vulnerabilities to line-of-business application owners responsible for remediation. The platform also enables enterprises to reduce costs and regulatory risk, fortify business continuity, and improve decision making by combining security tool data with business context to provide a complete view of risk mapped to valued assets.


Latest Press

  Featured Item

Next Event

 

                   

BeyondTrust cyber security solutions deliver the visibility to reduce risks and the control to act against internal and external data breach threats.


Latest Press

  Featured Item

Next Event

 

                   

BMC helps leading companies around the world put technology at the forefront of business transformation, improving the delivery and consumption of digital services. From mainframe to cloud to mobile and beyond, BMC delivers innovative IT management solutions that have enabled more than 15,000 customers to leverage complex technology into extraordinary business performance—increasing their agility and exceeding anything they previously thought possible. BMC has five business units: Datacenter Automation & Cloud Management, IT Service Management/Digital Service Management, Mainframe, Performance & Availability, and Workload Automation.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Boldon James are the market leaders in data classification and secure messaging software. We give our clients confidence when it comes to controlling and protecting their data. We are part of the QinetiQ group, a major UK plc and FTSE 250 company, and whilst our business has grown, our attitude to quality software development and customer service excellence remains the same.

We pride ourselves in finding real solutions that work for our clients – whatever their challenge. We have over 30 years’ experience in facilitating secure messaging and classifying data to protect against sensitive data leaks. We work with the world’s leading commercial organizations, system integrators, defense forces and governments, driving effective classification of all kinds of data within their existing software environments.

We’ve worked on some of the world’s largest IT security software programs, collaborating with our network of global partners. We believe that involving users in assessing, managing and caring for your data makes your organization stronger and able to compete with the best.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

An innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of more than 30,000 security researchers to surface critical software vulnerabilities. Bugcrowd provides a range of vulnerability disclosure and bug bounty programs that allow organizations to commission a customized security testing program that fits their needs.


Latest Press

  Featured Item

2016 State of Bug Bounty Report

Next Event

 

                   

Carbon Black is the leading provider of a next-generation endpoint-security platform designed to enable organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 650 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2015 Awards.


Latest Press

  Featured Item

Next Event

 

                   

CBI manages IT security risk and helps ensure your data is secure, compliant and available. No matter your industry our Subject Matter Experts, tailored assessments and custom solutions help safeguard your organization’s information. Our proven process allows you to prepare, manage and navigate issues that can damage your business and reputation.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.


Latest Press

Next Event

 

                   

The CERT Division is part of the Software Engineering Institute, which is based at Carnegie Mellon University. We are the world’s leading trusted authority dedicated to improving the security and resilience of computer systems and networks and are a national asset in the field of cybersecurity.


Latest Press

  Featured Item

Next Event

 

                   

Citadel Information Group is a full service cyber security management firm. We work either consultatively or with a client’s senior management team to assist clients cost-effectively manage the confidentiality, integrity and availability of their information. We are particularly adept at working with small and medium-sized organizations where we often provide a combination of management expertise, technology know-how, leadership, coaching and training. As leaders in the Los Angeles information security community, we are experienced in security management best practices such as ISO 27001-02, the NIST Framework, CISSP, CISM, ITIL® and Six-Sigma and compliance requirements such as HIPAA, GLBA, and PCI DSS.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Citrix aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time. Citrix provides a complete and integrated portfolio of Workspace-as-a-Service, application delivery, virtualization, mobility, network delivery and file sharing solutions that enables IT to ensure critical systems are securely available to users via the cloud or on-premise and across any device or platform. With annual revenue in 2015 of $3.28 billion, Citrix solutions are in use by more than 400,000 organizations and over 100 million users globally.


Latest Press

  Featured Item

Next Event

 

                   

Contrast Security is the world’s only application security software that quickly and accurately stops hackers from stealing data via web applications – the most successful attack vector. Industry research shows that application security flaws are the leading source of successful data breaches yet more than 90% of applications are not secure. Unlike legacy security products that do not defend applications, Contrast employs patented, deep security instrumentation to strengthen applications before they’re deployed, protect them in production and provide visibility throughout the application lifecycle. As a result, organizations can act faster against threats and immediately reduce their attack surface.


Latest Press

  Featured Item

Next Event

 

                   

Corero Network Security, protects Hosting Providers, Internet Service Providers and the Online Enterprise against DDoS attacks, in real-time. Corero products and services inspect raw Internet traffic at line rate, instantly defeating DDoS attacks and providing sophisticated visibility into the DDoS security events targeting your network.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

      CyberPolicy

      CyberPolicy

                   

CyberPolicy is a comprehensive cyber protection solution that combines three critical elements to protect small businesses against cyber threats: cyber insurance, cybersecurity tools and cyber planning.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.


Latest Press

  Featured Item

Next Event

 

                   

DatumSec operates under a single premise: offer a scalable, measurable, and repeatable approach to the vendor risk assessment process so that organizations gain the ability to reduce their third-party risk. With a team of dedicated professionals coming from security powerhouses like Symantec, Yahoo and Arbor Networks, DatumSec specializes in providing third-party vendor risk assessment solutions. Whether you are a company that is reliant on thousands of vendors, or you are one of those thousands of vendors, we are here to help bring efficiency to your risk assessment program.


  Featured Item

BluFocus Case Study

BluFocus Leverages DatumSec Risk Assessment Score as a Vendor Badge of IT Security

BluFocus Leverages DatumSec Risk Assessment Score as a Vendor Badge of IT Security

Next Event

 

                   

Distil Networks, the global leader in bot detection and mitigation, is the only easy and accurate way to protect web applications from bad bots, API abuse, and fraud. With Distil, you automatically block 99.9% of malicious traffic without impacting legitimate users. Distil Web Security defends websites against web scraping, competitive data mining, account takeovers, transaction fraud, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime. Distil API Security protects public and partner-facing APIs against developer errors, integration bugs, automated scraping, and web and mobile hijacking.


Latest Press

  Featured Item

Next Event

 

                   

E8 Security’s behavioral intelligence platform leverages self-learning security analytics designed to detect the early warning signs of critical resources being targeted by cyberthreats. The E8 Security platform automatically prioritizes alerts based on risk, and provides Security Analysts the ability to visualize the relationships between targets, explore divergent hypotheses and uncover hidden attack patterns. The E8 Security behavioral intelligence platform provides organizations a clear view of the real risks within the business environment. It further benefits organizations by integrating with their existing infrastructure, extending visibility and maximizing investments already made.


Latest Press

  Featured Item

Next Event

 

                   

Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 85 million customers at 316 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Echoworx is a security software developer and recognized industry leader in email encryption. We bring simplicity and scalability to encryption while assuring its integrity. OneWorld, our flagship solution, is the first smart message encryption platform that makes secure messaging easy and cost effective. The same software that acts as a gateway solution can also be used to automatically encrypt and deliver secure statements at industry-leading speeds - consolidating all email encryption use cases into a single solution. Our encryption experts transform chaos into order for world leading enterprises and providers who understand secure communication is of the upmost importance.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Fullstack Vulnerability Management to detect weaknesses across web applications and supporting hosts. Continuous Vulnerability Assessment coupled with expert human intelligence - Virtually False Positive Free.

Full Stack Security: Websites, apps (mobile/web/cloud), software, servers and networks With over 57,000 assets under vulnerability management, edgescan is a listed "notable vendor" in the Gartner’s Magic Quadrant for Managed Security Services and a “sample vendor” in the Gartner Application Security Hype cycle.


Latest Press

  Featured Item