Centripetal’s QuickThreat® Gateway operationalizes enterprise threat intelligence, to enable organizations to block, alert, or allow cyber threats in real-time at scale without network disruption. Centripetal partners with industry leading threat intelligence providers, Network Security Technologies, Threat Intelligence Platforms, and Industry & Community Sources to apply million-scale unique indicators to every packet entering and leaving the network. This results in total enhanced cyber visibility.
If you are interested in becoming a partner, please contact us
AlienVault Open Threat Exchange™ (OTX) gives you access to the largest crowd-sourced threat intelligence exchange. OTX™ is an open threat information sharing and analysis network, created to put effective security measures within the reach of all organizations. Unlike invitation-only threat sharing networks, OTX provides real-time, actionable information to all who want to participate.
To learn more, please visit http://www.alienvault.com/open-threat-exchange
Booz Allen Hamiliton’s Cyber4Sight products and managed services are built on decades of intelligence gathering tradecraft, threat analysis, and cyber security experience. Their predictive intelligence includes context on the motivations, intentions, and capabilities of threat actors around the world.
To learn more, please visit http://www.boozallen.com
Cisco AMP Threat Grid combines multiple analysis processes (static and dynamic) and threat intelligence into a single unified solution delivered via the cloud or as an on premises solution. AMP Threat Grid integrates real-time behavioral analysis and up-to-the-minute threat intelligence feeds with your existing security solutions, so organizations can accelerate breach detection and response capabilities from their existing security infrastructure.
To learn more, please visit http://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid
CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike’s next-generation threat protection platform leverages real-time Stateful Execution Inspection (SEI) at the endpoint and Machine Learning in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform is a combination of big data technologies and endpoint security driven by advanced threat intelligence. CrowdStrike Falcon enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.
To learn more, please visit www.crowdstrike.com
Facebook created the ThreatExchange platform so that participating organizations can share threat data using a convenient, structured, and easy-to-use API that provides privacy controls to enable sharing with only desired groups.
For more information, please visit https://threatexchange.fb.com
FireEye protects the most valuable assets in the world from those who have them in their sights. Our combination of technology, intelligence, and expertise — reinforced with the most aggressive incident response team — helps eliminate the impact of security breaches. We find and stop attackers at every stage of an incursion. With FireEye, you’ll detect attacks as they happen. You’ll understand the risk these attacks pose to your most valued assets. And you’ll have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 2,700 customers across 67 countries, including over 157 of the Fortune 500.
For more information please visit www.fireeye.com
Infoblox delivers critical network services that protect Domain Name System (DNS) infrastructure, automate cloud deployments, and increase the reliability of enterprise and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox reduces the risk and complexity of networking.
For more information, go to www.infoblox.com
Intel 471 provides actor-centric intelligence gathering and reconnaissance. Our vigilant surveillance focuses on infiltrating and penetrating the enemy’s territory, specifically the underbelly of the Internet and the deep/dark web.
This underbelly is camouflaged. It is not accessible or searchable. We deploy elaborate methods, significant resources and vast experience to establish and maintain critical access. We command our operational position undetected, safe and secure.
The deep or dark web is an even more sinister place. Entry is highly guarded and with significant barriers of entry. We are in the underground marketplaces, the back rooms, the chat channels and social media. We are in, watching and monitoring as they collaborate, plan, trade, and prepare to attack.
Our global resources are physically situated around the globe. We are in their homeland, we speak their language, we know their culture. We know their tactics, techniques and procedures.
The mission of Intel 471 is to protect your brand, your products, your finance and your people. Intel 471 is proactive. We deliver a unique solution to the private market sectors. Upon detecting a threat, target or exploitation, your team will be alerted and notified immediately, and directed to our portal for comprehensive discovery and data.
For more information about Intel471, go to www.intel471.com
NSS Labs, the security insight company, is trusted by the world’s largest and most demanding enterprises to help make their organizations more secure. NSS has developed the Cyber Advanced Warning System™ (CAWS) – the #1 cyber threat early warning system that enables enterprise organizations to see and actively mitigate attack risk before adversaries engage. CAWS is a cloud-based platform that continuously captures live attacks being used by threat actors, tests those attacks against enterprise security products in real time and easily integrates high value threat data into existing security analysis and automation mitigation workflows.
For more information, visit www.nsslabs.com
PhishMe is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector — spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization’s security decision making process. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
For more information, please visit www.phishme.com
Emerging Threat is now Proofpoint - ET Pro. Emerging Threats is a world-leading provider of commercial and open source threat intelligence. Founded in 2003 as a cyber security research community, Emerging Threats has become the de facto standard in network-based malware threat detection. The company’s IQRisk® Suite of threat intelligence products delivers time-tested, comprehensive actionable data with historical, correlated threat intelligence to support context for the latest malware coverage and in-depth threat analysis. IQRisk Suite combines IQRisk Query, IQRisk Rep List, and the ETPro® Ruleset to provide the highest level of timely and accurate threat intelligence and prevention to protect networks from data exfiltration and a wide variety of malicious threats that include exploits and malware. Used by many G2000 companies, Emerging Threats products and solutions are easy-to-deploy, making them ideal for OEMs, enterprises, government agencies, financial institutions, SMBs, higher education, and managed service providers.
For more information, please visit www.emergingthreats.net
© 2014 Emerging Threats Pro, LLC. All rights reserved. All other names and marks are property of their respective owners. ETPro®, IQRisk®, and the ET design are registered trademarks of Emerging Threats Pro, LLC.
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 19,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers.
The Media Trust is the client-side malware scanner for the world’s most heavily-trafficked websites, functioning as the SOC for their public-facing web and mobile properties. Using a variety of device, OS, browser, geographic, and user-behavior combinations, our proprietary technology continuously scans millions of websites and advertising tags to detect anomalous activity before it becomes overt. This extensive monitoring yields original source, real-time malware data that helps enterprises block malicious activity.
To learn more go to www.themediatrust.com.
ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber defenses deployed by enterprises and government agencies around the world. With more than 300 employees worldwide and backed by Insight Venture Partners and Bessemer Venture Partners, the company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the latest malicious threats, including its ThreatSecure advanced threat detection and remediation platform, ThreatAnalyzer malware behavioral analysis sandbox, ThreatIQ real-time threat intelligence service, and VIPRE business antivirus endpoint protection.
Learn more at www.ThreatTrackSecurity.com
Accenture iDefense empowers its customers’ environments with contextual, timely and actionable security intelligence, enabling businesses and governments to make smarter decisions to defend against new and evolving threats. With several decades in business, iDefense Security Intelligence Services has established a proven track record of providing timely, relevant and actionable cyber threat intelligence to the largest organizations in the world. iDefense has helped to protect and secure some of the world's most critical infrastructure—with the understanding that today's security practitioners require trusted cyber intelligence to identify and investigate threats, take action and transition to an intelligence-driven security paradigm.
Learn more at www.accenture.com
Launched in 1999, FS-ISAC was established by the financial services sector in response to 1998's Presidential Directive 63. That directive - later updated by 2003's Homeland Security Presidential Directive 7 - mandated that the public and private sectors share information about physical and cyber security threats and vulnerabilities to help protect the U.S. critical infrastructure. While FS-ISAC has always worked with members that have operations around the globe, in early 2013 FS-ISAC's board approved an extension to its charter to share information between financial services firms world-wide. Constantly gathering reliable and timely information from financial services providers, commercial security firms, federal/national, state and local government agencies, law enforcement and other trusted resources, the FS-ISAC is now uniquely positioned to quickly disseminate physical and cyber threat alerts and other critical information to your organization. This information includes analysis and recommended solutions from leading industry experts.
For more information please visit www.fsisac.com
The ICS-ISAC is a non-profit Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security. At the ICS-ISAC facility operators, integrators, vendors, researchers and the communities they support work together to share the means and methods necessary to maintain safe and stable societies.
For more information please visit www.ics-isac.org
The National Cyber-Forensics & Training Alliance (NCFTA) is a non-profit corporation founded in 2002, focused on identifying, mitigating, and neutralizing cyber crime threats globally. The NCFTA operates by conducting real time information sharing and analysis with Subject Matter Experts (SME) in the public, private, and academic sectors. Through these partnerships, the NCFTA proactively identifies cyber threats in order to help partners take preventive measures to mitigate those threats. The NCFTA has a proven track record and has long been identified as the model for private/public partnerships. Today, the NCFTA model, best practices, and lessons learned are being leveraged and emulated in countries around the world. Our membership is constantly growing both nationally and internationally across private industry, law enforcement, government, and academia.
For more information please visit www.ncfta.net
Anomali™ delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.
To learn more, visit www.anomali.com
ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations.
To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com
About A10 Networks
A10 Networks (NYSE: ATEN) is a leader in application networking and security, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.
Darktrace is one of the world’s fastest-growing cyber defense companies and the leader in Enterprise Immune System technology, a new category of cyber solutions based on pioneering Bayesian mathematics developed at the University of Cambridge. Darktrace addresses the challenge of insider threat and advanced cyber-attacks through its unique ability to detect previously unidentified threats in real time, as manifested in the emerging behaviors of the network, devices and individuals. Some of the world’s largest organizations rely on Darktrace’s adaptive, self-learning platform to spot anomalous activity within the enterprise, in sectors including energy and utilities, financial services, telecommunications, retail and transportation. Darktrace was founded by world-class machine learning specialists and operational government intelligence experts. The company is headquartered in Cambridge, UK, with offices in London, Milan, New York, Paris, San Francisco and Washington D.C.
To learn more, visit www.darktrace.com
Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric™ and GigaSECURE® , the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.
See more at http://www.gigamon.com