Welcome to ITSPmagazine's Company Directory

We invite you to browse the listings to see the latest press, next event, and current promotional offering as submitted to us by each company.


 

ANEXIO is an accredited provider of Cloud and managed IT business services. ANEXIO delivers a broad range of advanced IT services to small to mid-size organizations, focusing on reducing overall costs while enabling businesses growth. The company serves several key industries including Financial Services, Healthcare, Technology, Professional Services and Entertainment & Media. Founded in 1996, we started out with a mission to give business owners peace of mind and freedom from worrying over their technology, Today, we combine decades of experience with practical knowledge and continuous innovation to make IT work for businesses 24 hours a day, 7 days a week, all year round.

                   
 

Aptive provide Cybersecurity consultancy services specialising in penetration testing services, web application penetration testing, external penetration testing and mobile app penetration testing. Additionally, Aptive provide vulnerability assessment services (automated and manual), security hardening and security build reviews.

                   
 

Armor exists to protect. Each employee feels our passion, knows the vision and lives the company values. Diversity is key. Everyone on the team learns right away that their role is important to Armor’s success. We volunteer our best every day and go to any length to ensure our customers are protected. There are no short cuts. And “good enough” service is never enough. Simply put, we want customers to rave about their experience with us.

                   
 

Arxan is the trusted leader of Application Attack Prevention and Self-Protection products for Internet of Things (IoT), Mobile, Gaming, Digital Media, and other embedded applications. Arxan provides the most comprehensive end-to-end enterprise solution for application protection including a robust software/cloud solution, a strong ecosystem of partners, a leading-edge research group, professional services, and a world class support organization. We help organizations protect their applications from hacker attacks by making their applications resilient to prevent hackers from tampering and also blocking attacks real time in static or run-time mode. This also helps customers get compliant with regulatory and industry standards including PCI, GLBA, HIPAA, OWASP, among others. By deterring application attacks, we protect customers from financial loss, brand damage, IP theft, stolen credentials, and fraudulent transactions, unauthorized access, non-compliance with standards, and more.

                   

ITSPmagazine discusses application security, autonomous vehicle security, financial services security, IoT security, and diversity with Joe Sander, CEO from Arxan Technologies.

  Featured Item

  Recent Articles

Latest Press

Next Event

 

Balabit – headquartered in Luxembourg – is a leading provider of contextual security technologies with the mission of preventing data breaches without constraining business. Balabit operates globally through a network of local offices across the United States and Europe together with partners. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.

                   

  Featured Item

Latest Press

Next Event

 

Bay Dynamics® enables enterprises to prioritize security activities and direct their limited resources at their most important problems. The company’s flagship product, Risk Fabric®, is a software platform for enterprises requiring timely prioritization and remediation of security exposures impacting their most critical IT systems and data assets. Risk Fabric benefits enterprises with improved timeliness of action by automating the delivery of personalized and prioritized vulnerabilities to line-of-business application owners responsible for remediation. The platform also enables enterprises to reduce costs and regulatory risk, fortify business continuity, and improve decision making by combining security tool data with business context to provide a complete view of risk mapped to valued assets.

                   

  Recent Articles

 

BeyondTrust cyber security solutions deliver the visibility to reduce risks and the control to act against internal and external data breach threats.

                   

  Featured Item

Latest Press

Next Event

 

                   

Block Armour is a next-gen enterprise Cybersecurity solution that leverages Blockchain Technology to secure critical enterprise systems and IoT communication. The solution uses digital signature based identity and authentication for humans, devices and data.

Using private permissioned blockchain and TLS technology, Block Armour delivers a Blockchain Defined Perimeter (BDP) - an enhanced Software-Defined Perimeter - rendering critical systems / cloud servers invisible; thereby making it near impossible for hackers to discover and attack, while providing a secure communication channel for legitimate users. The platform also harnesses blockchain based digital signatures to identify, authenticate and authorize devices to secure IoT communications.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

BMC helps leading companies around the world put technology at the forefront of business transformation, improving the delivery and consumption of digital services. From mainframe to cloud to mobile and beyond, BMC delivers innovative IT management solutions that have enabled more than 15,000 customers to leverage complex technology into extraordinary business performance—increasing their agility and exceeding anything they previously thought possible. BMC has five business units: Datacenter Automation & Cloud Management, IT Service Management/Digital Service Management, Mainframe, Performance & Availability, and Workload Automation.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Boldon James are the market leaders in data classification and secure messaging software. We give our clients confidence when it comes to controlling and protecting their data. We are part of the QinetiQ group, a major UK plc and FTSE 250 company, and whilst our business has grown, our attitude to quality software development and customer service excellence remains the same.

We pride ourselves in finding real solutions that work for our clients – whatever their challenge. We have over 30 years’ experience in facilitating secure messaging and classifying data to protect against sensitive data leaks. We work with the world’s leading commercial organizations, system integrators, defense forces and governments, driving effective classification of all kinds of data within their existing software environments.

We’ve worked on some of the world’s largest IT security software programs, collaborating with our network of global partners. We believe that involving users in assessing, managing and caring for your data makes your organization stronger and able to compete with the best.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

An innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of more than 30,000 security researchers to surface critical software vulnerabilities. Bugcrowd provides a range of vulnerability disclosure and bug bounty programs that allow organizations to commission a customized security testing program that fits their needs.


Latest Press

  Featured Item

2016 State of Bug Bounty Report

Next Event

 

                   

Carbon Black is the leading provider of a next-generation endpoint-security platform designed to enable organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 650 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2015 Awards.


Latest Press

  Featured Item

Next Event

 

                   

CBI manages IT security risk and helps ensure your data is secure, compliant and available. No matter your industry our Subject Matter Experts, tailored assessments and custom solutions help safeguard your organization’s information. Our proven process allows you to prepare, manage and navigate issues that can damage your business and reputation.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.


Latest Press

Next Event

 

                   

The CERT Division is part of the Software Engineering Institute, which is based at Carnegie Mellon University. We are the world’s leading trusted authority dedicated to improving the security and resilience of computer systems and networks and are a national asset in the field of cybersecurity.


Latest Press

  Featured Item

Next Event

 

                   

Citadel Information Group is a full service cyber security management firm. We work either consultatively or with a client’s senior management team to assist clients cost-effectively manage the confidentiality, integrity and availability of their information. We are particularly adept at working with small and medium-sized organizations where we often provide a combination of management expertise, technology know-how, leadership, coaching and training. As leaders in the Los Angeles information security community, we are experienced in security management best practices such as ISO 27001-02, the NIST Framework, CISSP, CISM, ITIL® and Six-Sigma and compliance requirements such as HIPAA, GLBA, and PCI DSS.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Citrix aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time. Citrix provides a complete and integrated portfolio of Workspace-as-a-Service, application delivery, virtualization, mobility, network delivery and file sharing solutions that enables IT to ensure critical systems are securely available to users via the cloud or on-premise and across any device or platform. With annual revenue in 2015 of $3.28 billion, Citrix solutions are in use by more than 400,000 organizations and over 100 million users globally.


Latest Press

  Featured Item

Next Event

 

Cobalt is a SaaS based marketplace enabling modern businesses to crowdsource application security by connecting them with a talented vetted community of security researchers. In just a few clicks, a business can engage with security researchers through curated bug bounty programs, agile security assessments and penetration tests to strengthen the security of their applications (web, mobile and APIs). Visit cobalt.io for more info.

                   

  Featured Item

dummies.jpeg

This Free eBook will help you:

- Dive into how a crowdsourced pen test works
- Explore how crowdsourced pen testing works with your agile SDLC
- Examine how talent is evaluated
- Compare the crowdsourced pen testing platform to other security testing options out there
- Walk away with valuable references for further study

 

  Video Spotlight

ITSPmagazine chats with Caroline Wong, VP of Security Strategy at Cobalt.

  Recent Articles

Latest Press

Next Event

 

                   

Code Dx, Inc. is a leading provider of easy-to-use application vulnerability correlation and management systems that enable software developers, testers and security analysts to find and manage vulnerabilities in software. The award-winning Code Dx Enterprise solution integrates the results of multiple static, dynamic and interactive Application Security Testing (AST) tools, third-party component analyzers, and manual reviews into a consolidated set of results for quick and easy triage, prioritization and remediation. The core technology was partially funded by Department of Homeland Security Science & Technology (DHS S&T) to help secure the nation’s software supply chain.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Contrast Security is the world’s only application security software that quickly and accurately stops hackers from stealing data via web applications – the most successful attack vector. Industry research shows that application security flaws are the leading source of successful data breaches yet more than 90% of applications are not secure. Unlike legacy security products that do not defend applications, Contrast employs patented, deep security instrumentation to strengthen applications before they’re deployed, protect them in production and provide visibility throughout the application lifecycle. As a result, organizations can act faster against threats and immediately reduce their attack surface.


Latest Press

  Featured Item

Next Event

 

                   

Corero Network Security, protects Hosting Providers, Internet Service Providers and the Online Enterprise against DDoS attacks, in real-time. Corero products and services inspect raw Internet traffic at line rate, instantly defeating DDoS attacks and providing sophisticated visibility into the DDoS security events targeting your network.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

      CyberPolicy

      CyberPolicy

                   

CyberPolicy is a comprehensive cyber protection solution that combines three critical elements to protect small businesses against cyber threats: cyber insurance, cybersecurity tools and cyber planning.


Latest Press

  Featured Item



Sorry, there are no promotions from this company at this time

Next Event

 

                   

Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.


Latest Press

  Featured Item

Next Event