Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative First Line of Defense® solutions. Corero products and services provide our customers with protection against a continuously evolving spectrum of DDoS attacks and cyber threats that have the potential to impact any Internet connected business. Corero provides the opportunity to enhance defense-in-depth security architectures with an important additional layer of security capable of inspecting traffic arriving from the Internet in real time and applying access policies designed to match the needs of the business. The goal of the Corero First Line of Defense security layer is to protect the customer’s network infrastructure, online services and confidential data from suspicious or malicious Internet traffic. Corero solutions are designed to be always on providing automatic attack mitigation with continuous threat visibility and network forensics. The growing global dependence on the Internet as the backbone for organizations to conduct business and ultimately generate revenue is leading to a corresponding exponential surge in malicious traffic and cyber-attack volume. This trend will continue for the foreseeable future with broad implications for network security. In the face of this heightened threat level, traditional approaches to network security are proving ineffective.The never ending increase in available Internet bandwidth and the widespread access to cyber-attack software tools and even services has led to an explosion in the use of these tactics by cyber criminals to disrupt business. At Corero Network Security, we are spearheading the enhancement of defense-in-depth security architectures to address the dynamic and evolving cyber risks facing every organization that depends on the Internet for running their operations or interacting with their partners, suppliers or customers. The Corero First Line of Defense solution provides comprehensive protection against the latest breed of cyber-threats, including network and application layer DDoS attacks, zero-day exploits, remote exploit insertions, server targeted threats and access attempts from IP addresses with a bad reputation or from unwanted geo-locations. These varied cyber-threats have the potential to challenge traditional network security defenses and compromise enterprise networks. The Corero solutions are designed to be deployed in front of traditional or next generation firewalls, IPS, ADC and other IT security infrastructure devices, preventing access to your network by untrusted and unwanted traffic, leaving enterprise networks at a reduced risk of having their web presence taken down or compromised. The Corero solutions lead the industry in detecting and blocking today’s crippling and costly attacks before they enter your network. Award-winning products and services from Corero are securing organizations around the world and across industries, allowing them to guarantee accessibility and ensure business success. In addition to the Corero on-premises appliances, the Corero SecureWatchTM Service offers our customers 24/7 security monitoring and access to the Corero SOC staffed by experts in the mitigation of sophisticated cyber-attacks. Corero US headquarters are located in Hudson, Massachusetts, and its European headquarters are in London, England with additional offices throughout the world.








eSentire is the leading innovator in Active Threat Protection, the most comprehensive way to defend enterprises from cyber threats. Our flagship solution, Network Interceptor, closes the gaps left by traditional cyber security systems, maximizing protection and minimizing our clients’ exposure to attack. We are the go-to cyber security solution for businesses operating in industries that are highly targeted by cyber criminals. For instance, we protect 150 asset management funds with over $1.3 trillion in assets. Clients choose us because they need active protection:
Wombat Security Technologies is a leading provider of cyber security training and filtering solutions. Its software-based training solutions are designed to be engaging and effective, and have been scientifically proven to be significantly more effective than other traditional training solutions. Wombat’s anti-phishing filtering solutions have been shown to catch significantly more phishing attacks than other filters. Wombat’s products are used in sectors as diverse as finance, government, telecom, health care, retail, education, transportation and utilities.
A veteran-owned small business, Vir-Sec, is a software development company with a patented technology that provides an unmatched level of security for Internet applications. Vir-Sec’s “Virtual Security Application” methodology represents the future of securely accessing private information over the Internet.
Sonavation is committed to perfecting biometrics fingerprint-reading technology and providing its customers with solutions that deliver the highest level of accuracy, durability and reliability in the world’s thinnest fingerprint sensor design. Sonavation’s SonicSlideTM sensors combine that level of accuracy in the industry’s thinnest and most durable design, with the lowest power consumption of any fingerprint sensor available. Sonavation is determined to continue developing the biometrics industry’s leading-edge sensors based on technology innovations.
SINET is a community builder, strategic advisor and catalyst whose passion is to promote innovation, small and large business development and enhanced awareness of early stage and emerging growth companies and enterprises into the Federal Government and industry markets. This is the driving force behind our vital mission to advance innovation and enable global public and private sector collaboration to defeat Cybersecurity threats in the U.S. and abroad.
Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions like Advanced Persistent Threats or zero-day attacks. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image. No signatures or prior knowledge of any kind are required to stop the adversary. Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready.
Jon Ramsey Dell Fellow Dell SecureWorks Chief Technology Officer Executive Director Dell SecureWorks Counter Threat Unit Jon Ramsey is the Dell SecureWorks Chief Technology Officer and Executive Director of the Dell SecureWorks Counter Threat UnitSM (CTU). The CTU Research Group is comprised of the nation’s top security experts who identify and analyze emerging cyber threats, while developing rapid countermeasures in support of clients worldwide. An information security expert with policy-making responsibility, Jon has over 20 years of hands-on experience at every level: system administrator, software engineer, analyst, security penetration specialist and senior engineer. Prior to joining Dell SecureWorks, Jon worked for the Computer Emergency Response Team (CERT/CC) at Carnegie Mellon University, Siemens Corporate Research, and the University of Pittsburgh. Jon earned a Master’s degree in software engineering from Carnegie Mellon University and a BS in computer science from the University of Pittsburgh.





















































































