Tech Marketplace

The RH-ISAC Tech Marketplace features industry-leading service and product providers that add value within the RH-ISAC community and the activities it supports.

  AUTHENTICATION SECURITY & STRATEGY   






Yubico

yubico.com

Yubico provides retail and hospitality organizations peace of mind to protect against modern cyber threats such as phishing attacks and account takeovers. Yubico is the inventor of the YubiKey, the gold standard in phishing-resistant multi-factor (MFA) and passwordless, and a co-creator of the Fast Identity Online (FIDO) open authentication standards. 

Not all forms of MFA are created equal in terms of usability and security, but the YubiKey balances both, delivering highest-assurance security with the best user experience. The YubiKey meets you where you are today and helps you bridge to a modern passwordless future with the most secure passkey form-factor in the industry. For more information, connect with us at: yubi.co/contact

  CLOUD SECURITY SERVICES   



AccessIT Group


AccessIT Group

accessitgroup.com
CONTACT: Jerry Zayas |  jerryz@accessitgroup.com | 201-852-8591

AccessIT Group is a specialized cybersecurity solutions provider with over 20 years of experience and relationships with leading technology partners. We offer a full range of advanced security services that assist organizations with the design, implementation, and operation of their security program and infrastructure. We focus on cloud, risk management, compliance, and implementation services, working with organizations to address the evolving complexities of cyberthreats.

Akamai


Akamai

akamai.com
CONTACT: sales@akamai.com | 877-425-2624

Akamai powers and protects life online. The most innovative companies worldwide choose Akamai to secure and deliver their digital experiences — helping billions of people live, work, and play every day. With the world's largest and most trusted edge platform, Akamai keeps apps, code, and experiences closer to users — and threats farther away.  Learn more about Akamai's security, content delivery, and edge compute products and services at www.akamai.com.

Kyndryl




Kyndryl

kyndryl.com
CONTACT: Ben Drumm  |  Ben.Drumm.Jr@kyndryl.com  |  410-200-7328

Kyndryl is the world's largest provider of IT infrastructure services serving thousands of enterprise customers in more than 60 countries. As a focused, independent company, we're building on our foundation of excellence by bringing in the right partners, investing in our business, and working side-by-side with our customers to unlock their potential.

Palo Alto




Palo Alto Networks

paloaltonetworks.com
CONTACT: Michael Laport | mlaport@paloaltonetworks.com | 866-320-4788 

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life.

   CYBER THREAT INTELLIGENCE SERVICES    






360 Privacy

360privacy.io
CONTACT: Tom Aldrich  | taldrich@360privacy.io  |  203-912-3130

360 Privacy’s mission is to protect the digital identity, security, and reputation of high-profile executives, athletes and high net-worth families. Digital identity is at the intersection of physical security, cyber, fraud prevention, and reputation. Powered by proprietary technology and an expert team, 360 Privacy correlates, analyzes and deletes data daily to protect your digital identity, keeping it out of the hands of sophisticated threat actors, fraudsters, and other criminals.




Allure Security

alluresecurity.com
CONTACT: Jason Gonzales |  jgonzales@alluresecurity.com  |  973-420-8518

Allure Security protects brands by finding and stopping online brand impersonation attacks before customers fall victim. Our patented, artificial intelligence-powered engine finds more spoofed websites, social media accounts, and mobile apps more quickly and with greater accuracy than legacy approaches. Our unique, multi-pronged approach to response – blocklisting, decoy data, and takedown – significantly reduces the lifespan of a scam and the damage it can do.

DataDome logo

DataDome

datadome.co
CONTACT: Brendan Nuessle  |  brendan.nuessle@datadome.co

DataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. Our machine-learning solution analyzes 3 trillion signals per day to adapt to new threats in real time. Our 24/7 SOC protects enterprises' mobile apps, websites, and APIs from ATO, scraping, carding, DDoS, credential stuffing, and more. A force multiplier for IT and security teams, DataDome is fully transparent, easy to deploy, and frictionless for consumers.

Flashpoint




Flashpoint

flashpoint.io

Trusted by governments, commercial enterprises, and educational institutions worldwide, Flashpoint helps organizations protect their most critical assets, infrastructure, and stakeholders from security risks such as cyber threats, ransomware, vulnerabilities, fraud, and physical threats. Leading security practitioners on physical and corporate security, cyber threat intelligence (CTI), vulnerability management, and vendor risk management teams rely on Flashpoint to proactively identify and mitigate risk and stay ahead of the evolving threat landscape. Learn more at www.flashpoint.io.

Accenture Logo

Intel 471

intel471.com
CONTACT: Joy Nemitz  |  408-765-8080

Intel 471 provides the RH-ISAC team with timely and exclusive data on current, real-time threats and pending future threats. This partnership provides the RH-ISAC with increased visibility and focused insight related to the increased number and sophistication of attacks against retailers.

Niso Logo

Nisos - The Managed Intelligence Company

nisos.com
CONTACT: Dylan Hennessy  |  dylanh@nisos.com  |  602-549-9398

Nisos is The Managed Intelligence Company™. Our analyst-led intel investigations, assessments, and monitoring services empower your security, intelligence, and trust and safety teams. We provide accurate, customized intelligence that guides your security and risk decisions - protecting your organization, assets, and people.

Trustwave

trustwave.com
CONTACT: Mike Petitti | mpetitti@trustwave.com | 312-267-3222

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience against advanced threats.

Visa

Visa

visa.com
CONTACT: David Capezza | 908-601-2752

Indicators of Compromise help organizations determine if they have been the target of a breach and contributes actionable data helping merchants avoid future breaches. When payment fraud occurs, Visa’s Risk and Fraud teams collect and analyze information from the breach and that data is provided through an API to VTI subscribers.

  RISK MANAGEMENT SERVICES   



HUMAN





PwC

pwc.com
CONTACT: us_cyber_risk_regulatory_marketing@pwc.com

Our purpose—to build trust in society and solve important problems—is at the core of everything we do. To help our clients build trust and deliver sustained outcomes, PwC provides professional services across two segments: Trust Solutions and Consulting Solutions. Within these segments we bring a range of capabilities to help organizations solve faster, solve more and realize more value. These capabilities include cloud and digital, cybersecurity and privacy, risk, transformation, and much more.

Risk Recon

RiskRecon

riskrecon.com
CONTACT: Holly Glynn |  holly.glynn@riskrecon.com

RiskRecon, a Mastercard company, is the only continuous vendor monitoring solution that delivers risk-prioritized action plans custom-tuned to match your risk priorities. RiskRecon provides the world’s easiest path to understanding and acting on own enterprise and third-party cyber risk, enabling organizations to efficiently operate scalable, third-party risk management programs for dramatically better risk outcomes.

Security Scorecard

SecurityScorecard

securityscorecard.com
CONTACT: 800-682-1707

SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 1.4 million companies continuously rated. The SecurityScorecard platform is used by over 1,200 organizations around the world for third-party risk management, cyber risk monitoring, board reporting, and cyber insurance underwriting. SecurityScorecard offers organizations valuable insights into the vulnerabilities that exist in their own environments and their third-party ecosystems

Xeol

Xeol

xeol.io
CONTACT: ShiHan Wan | founders@xeol.io

Xeol closes the end-of-life gap in your vulnerability management program.

Xeol catalogs the largest database of open-source projects and their EOL states. Xeol's dashboard then surfaces the riskiest EOL issues based on CVEs, reach, and EOL time so that your AppSec team can proactively manage them out of your supply chain. This helps your organization mitigate the unknown unknown risks of EOL open-source projects.

   SECURITY ARCHITECTURE SERVICES   



Society_Logo_RGB_Tagline_72.jpg



Armis

armis.com
CONTACT: Scott Oldfield  |  scott@armis.com  |  888-452-4011

Armis is the leading agentless, enterprise-class device security platform designed to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust our real-time and continuous protection to see and control all managed, unmanaged, and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides passive and unparalleled cybersecurity asset management, risk management, and automated enforcement. 

   SECURITY AWARENESS SERVICES    



Booz Allen Hamilton Logo

Booz Allen Hamilton

boozallen.com
CONTACT: Omar Ellis | 703-902-5000

We are a global firm of approximately 27,600 diverse, passionate, and exceptional people driven to excel, do right, and realize positive change in everything we do. We bring bold thinking and a desire to be the best in our work in consulting, analytics, digital solutions, engineering, and cyber, and with industries ranging from defense to health to energy to international development.

   SECURITY OPERATIONS SERVICES    





CalypsoAI

calypsoai.com
CONTACT: sales@calypsoai.com

Recognizing the rising risks in the AI era, CalypsoAI is dedicated to empowering corporate and government organizations. Through our cutting-edge AISec solutions, we offer groundbreaking AI security platforms. These platforms rigorously test, validate, and secure AI systems, unlocking new opportunities, fostering innovation, and reinforcing decision-making processes. Our goal is to enable these organizations to navigate the complex AI adoption landscape with full confidence.

HackerOne



HackerOne

hackerone.com
CONTACT: George Cuchural  |  george@hackerone.com  |  781-630-3136

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer. Our platform is the industry standard for hacker-powered security. We partner with the global hacker community to surface the most relevant security issues of our customers before they can be exploited by criminals.

Kasada

Kasada

kasada.io
CONTACT: Sophie Barrett  |  802-355-9788  |  sophie.barrett@kasada.io

Kasada provides website, API, and mobile app protection for enterprises that are quick to evolve, difficult to evade, and invisible to customers. The Kasada technology and team defend some of the largest brands in the world from automated threats without impacting the end-user experience. Kasada’s defenses work by combining server-side detections and invisible client-side challenges with an unmatched understanding of how adversaries evade detection. 

Red Sift Logo


Red Sift

redsift.com
CONTACT: Brian Westnedge |  brian.westnedge@redsift.io  |  303-817-9141

Red Sift's Digital Resilience Platform solves for the greatest vulnerabilities across the complete attack surface. By providing comprehensive coverage of an organization’s digital footprint through best-in-class discovery and monitoring, Red Sift enables users to proactively uncover threats within email, domains, brand, and the network perimeter. Paired with sophisticated remediation capabilities, Red Sift provides organizations with the tools to shut down phishing and ensure ongoing compliance with email and web security protocols.

S3Security




S3Security

s3security.com
CONTACT: Quinton Schanbaum | 972-378-5554 x310 | quinton@s3security.com

Specialized Security Services, Inc. (S3 Security) is building cyber resilience to support business in a digital world. We are a woman-owned, global cybersecurity firm headquartered in Dallas, TX. For over 23 years, our expert team has successfully assisted organizations with the design, implementation, & ongoing testing of their cyber & information security programs, providing professional guidance with clarity & assurance.

At S3 Security, people are our purpose, and we form long-lasting, strategic partnerships with our clients. We recognize that behind every security program, title, policy, and security control are real people protecting other people. We've seen a lot in the past two decades and apply this knowledge with straightforward cyber security guidance, information, and education.

Splunk




Splunk

splunk.com
CONTACT: Chris Simmons | 415-848-8450 | csimmons@splunk.com

Splunk Inc. (NASDAQ: SPLK) turns data into doing with the Data-to-Everything Platform. Splunk technology is designed to investigate, monitor, analyze, and act on data at any scale.

Spycloud



SpyCloud

spycloud.com
CONTACT: Heather Smith | 1-800-513-2502 | heather@spycloud.com

SpyCloud protects consumers, employees, suppliers, and citizens globally from the dangers of compromised identity. Its solutions make breached information actionable to prevent fraud, enabling a proactive, automated response that negates the value of stolen data before it can be used to cause harm. Its data also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include four of the ten largest global enterprises, mid-size companies, and government agencies around the world. 

   SECURITY STRATEGY & LEADERSHIP SERVICES    



Level 6

Level 6

level6cyber.com
CONTACT: Kevin Jackson | 513-270-0150 | kjackson101@level6cyber.com

Level 6 Cybersecurity's analytic tool suite - LISN - uses the power of artificial intelligence to analyze what statistically works and fails in cybersecurity, delivering detailed answers to the most pressing information security questions every organization faces. These answers are based on cybersecurity ROI calculations from real-world data, giving cybersecurity decision-makers actionable guidance on what security strategies to employ for maximum organizational benefit.

  SPECIAL INTEREST & RESILIENCE SERVICES   



Accenture

Accenture

accenture.com 
CONTACT:
877-889-9009 

Accenture Security helps organizations build resilience from the inside out. With services including strategy & risk management, cyber defense, digital identity, application security & managed security, Accenture enables businesses around the world to defend against threats. Follow @AccentureSecure on Twitter or visit the Accenture Security blog.



N2K Networks

n2k.com
CONTACT: Patrick Mullan | patrick.mullan@n2k.com

N2K Networks delivers strategic workforce intelligence that enables organizations to build and maintain high-performing teams, rapidly climb the knowledge curve, and stay a step ahead in a relentlessly changing world. As part of our Strategic Cyber Workforce Intelligence capabilities, our solutions provide measurable and actionable insights into your team's capabilities to build effective talent strategies and make continuous talent development decisions.