|Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected.
At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success. More
|Cisco Co-Sponsor: Intel Corporation, incorporated on March 1, 1989, is engaged in the design and manufacture of digital technology platforms. Intel’s DCG segment includes server, network and storage platforms designed for the enterprise, cloud, communications infrastructure and technical computing segments.
The Company’s Intel Xeon processor D family, its Intel Xeon processor-based SoC product family, extends its portfolio for network, storage and high-density servers. Its Intel Xeon processor E7 v3 family targets at platforms requiring approximately four or more CPUs. It also released the Intel Xeon processor E3 v5 family on its 14nm process technology, targeted for entry-level servers and workstations. More
|Netskope is the leader in cloud security. Trusted by the world’s largest companies, Netskope’s cloud-scale security platform enables security professionals to understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work. Netskope —security evolved.More|
|Avi Networks completes enterprises’ digital transformation with modern application services which include its Smart Load Balancer, Intelligent Web Application Firewall (iWAF), and Elastic Service Mesh.
The Avi Vantage Platform is deployed across data centers and clouds, delivering better elasticity, application insights, and cost savings by providing granular per-tenant and per-app services. Customers enjoy 5X faster application rollouts, actionable analytics, and 70% lower cost.More
|Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, their devices, and limits access and privilege.
Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM).More
|iWelcome is the only 100% European IAM as-a-Service provider (IDaaS). With iWelcome’s cloud platform, organisations manage the identity lifecycle, the profiles and access rights of their consumers, workforce & business partners in a user friendly and secure manner. We connect and protect users and IT.
Our platform and organisation are engineered to facilitate the scalability, complexity, privacy and security requirements of larger enterprise and government organisations. As only European IDaaS provider, we not only assure European data residency, we are also the first platform that is GDPR-compliant.
Analysts regard iWelcome as product leader for Consumer IAM (CIAM) and Workforce Identity at scale. Our platform is rated ‘Excellent’ by Gartnr and included in their Magic Quadrant since 2014, and named Product and Innovation Leader by KuppingerCole and TechVision.
|Juniper Networks (NYSE:JNPR) challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with our customers and partners to deliver automated, scalable and secure networks with agility, performance and value.
|Keyon AG is a leading provider of solutions and services in the area of IT security and custom software development in Switzerland. The company has been operating since 1999 and has a number of excellent references by realizing strategic projects for the Swiss government and customers in the area of finance, insurance, trade, industry, and telecommunication.More|
|NTT Security is the specialized security company and the center of excellence in security for NTT Group. NTT Security delivers secure and resilient business solutions to enable clients’ digital transformation needs. NTT Security has 10 SOCs, seven R&D centers, over 1,500 security experts and handles hundreds of thousands of security incidents annually across six continents.
NTT Security in Switzerland ensures that resources are used effectively by delivering the right mix of Managed Security Services, Security Consulting Services and Technology Solutions for our clients – making best use of local resources and leveraging our global capabilities. NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest ICT companies in the world.More
|Ping Identity envisions a digital world powered by identity. As the identity security company, we simplify how the world’s largest organizations prevent security breaches, increase employee and partner productivity and provide personalized customer experiences. Enterprises choose Ping for our identity expertise, open standards leadership, partnership with companies like Microsoft, Amazon and Google, and collaboration with customers like Boeing, Cisco, GE, Kraft Foods, Walgreens and over half of the Fortune 100.
The Ping Identity Platform allows enterprises and their users to securely access cloud, mobile and on-premises applications while managing identity and profile data at scale. Architects and developers have flexible options to enhance and extend their existing applications and environments with multi-factor authentication, single sign-on, access management, directory and data governance capabilities.More
|«identic» – a Ping Identity partner – provides specialized and focused IT advisory and implementation services in the area of identity and access management. We enable our clients to streamline and automate both their business processes and the technologies around identity and access management.
«identic» provides specialized and focused IT advisory and implementation services in the area of identity and access management. We enable our clients to streamline and automate both their business processes and the technologies around identity and access management.More
|Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100.
The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.
Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, Accuvant, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, InfoSys, NTT, Tata Communications, Verizon and Wipro.
The company is also a founding member of the Cloud Security Alliance (CSA). More
|Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.
As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000 and large government agencies. Learn more at tenable.com.
Tenable is built on innovation. We started with Nessus, creating the world’s most widely deployed vulnerability assessment solution. Powerful yet flexible to adapt to the unique requirements of today’s modern assets. Now with Tenable.io, we’ve delivered the world’s first Cyber Exposure platform to provide visibility into any asset on any computing platform.
Cyber Exposure is an emerging discipline for managing and measuring your modern attack surface to accurately understand and reduce your cyber risk. Cyber Exposure transforms security from static and siloed visibility to dynamic and holistic visibility across the modern attack surface.
Cyber Exposure provides live visibility with technology purpose-built for security. Understanding Cyber Exposure will transform security from a raw list of vulnerabilities to a metrics-driven program, where cyber risk is quantified and measured alongside every other business risk and every strategic business decision will rely on it.
Understanding Cyber Exposure will not be an impediment to digital transformation. It will enable it.
|Zscaler ensures that more than 15 million employees across thousands of enterprises and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies.
Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location. Zscaler effectively moves security into the Internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance.
Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software.More
|Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics, available as a cloud service or as a standalone software package on premise. Based on deep malware analysis and multi technology platform, Joe Security has developed unique technologies to analyze malware in a depth previously not possible. Analysis targets include Windows, Mac, Android and iOS operating systems at any scale.
With its products Joe Security empowers CERTS, CIRTS, SOCs, malware analysts and incident responders around the world to detect and deeply understand malware.
|Encrypted data – trustworthy information
We are a technology company dedicated to secure data and communications. We design, produce and distribute
hardware, software and services that protect and verify data and their transmission. Our products are built and developped in Switzerland and with vetted partners in Europe. Our best known products are our Hardware Security Modules (HSM) that protect the Swiss banking system.
We also offer HSM as a service and network encryptors. Our solutions fit into PKI environments, blockchain systems, crypto finance and other fintech applications.More