Investing in the Journey

Navigator Overview

H-ISAC teams with innovative cybersecurity solution providers to become integral architects for the future of Healthcare.   Healthcare members desire vendor partners willing to invest in them and support their peers as they grow and share solutions for the ever changing landscape ahead.  Vendors that will be enabling them to increase resiliency and aid in direction amongst the ever darkening and turbulent seas of cybersecurity.

Navigator Sponsorship Program

H-ISAC offers the benefits of its customized Navigator program to interested vendors or solutions providers to the Security sector within the Healthcare/Public Health (HPH) sub-sector. Participation in the Navigator Program is designed to enhance the understanding of sector progress in information sharing and the tools used to enhance security.

In today’s Cyber Security universe, solution providers can play an important role in navigating and educating active members of the HPH security vertical. These firms provide products and services designed to make the HPH sector stronger and safer, and an essential part of H-ISAC’s ability to achieve its goals.

If you are interested in becoming a Navigator, or learning more and what is included with the Navigator Program, please click the buttons below. 

**Click to download the Navigator Agreement, sign and email the PDF to the contact point listed on the agreement.

Current H-ISAC Navigators



There are more than four billion inboxes in the world. Millions of users send and receive hundreds of billions of messages every single day. And cybercriminals are taking advantage—turning what should be trusted communications into a place where they can steal sensitive data and generate profit.

At Agari, we take a stand against these cybercriminals with a bold mission: we protect digital communications to ensure humanity prevails over evil.

Agari uses predictive AI to model identity at Internet scale and prevent the next zero-day attack. By focusing on sender identity and behavior versus the attack type itself, Agari models the good to protect you from the bad, ensuring that no threat—new or existing—hits your inbox.

We believe that email should be safe. We believe that email should be secure. We believe that you should have the confidence to open, click, and trust everything in your inbox.

Attivo Networks


Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.




Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with nearly 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine. For more visit 

Censinet Systems


Today, the biggest risks to patient care come from disruptions or downtime to clinical applications and medical devices caused by cyberattacks such as data breaches and ransomware.

In September of 2017, we founded Censinet with a vision to take these risks out of healthcare. Our mission is to become the trusted network for third-party vendor risk management in U.S. healthcare by 2022.

With input and guidance from a broad cross-section of healthcare providers and leaders, we set out to understand how big the issue really was for providers and vendors. We realized quickly that the old processes, workflows and technical approaches that were being used were part of the problem.

So we’ve taken on the status quo and disrupted how third-party risk is managed. We created the healthcare industry’s first collaborative cloud platform for third-party vendor risk management, built exclusively for healthcare providers by providers and healthcare experts.
Our platform is based on our core beliefs:

– Risk is not a technical problem, it’s a business problem.
– Risk never sleeps. It hides patiently in infusion pumps, quietly lurks on hospital networks and in the cloud, and says good morning at the end of every shift.
– The enemy of risk is transparency.

These beliefs define who we are and drive why we are. They’re foundational to our values and DNA. They also drive us to create a better way for third-party risk management – one that is transparent, immediate, and always on.


Cisco Systems


Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected. An integral part of our DNA is creating long-lasting customer partnerships, working together to identify our customers’ needs and provide solutions that fuel their success.


We have preserved this keen focus on solving business challenges since our founding in 1984. Len Bosack and wife Sandy Lerner, both working for Stanford University, wanted to email each other from their respective offices, but technological shortcomings did not allow such communication. A technology had to be invented to deal with disparate local area protocols, and as a result of solving their challenge, the multiprotocol router was born.


“Deloitte” is the brand under which tens of thousands of dedicated professionals in independent firms throughout the world collaborate to provide audit & assurance, consulting, risk and financial advisory, risk management, tax, and related services to select clients. These firms are members of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”). Each DTTL member firm provides services in particular geographic areas and is subject to the laws and professional regulations of the particular country or countries in which it operates.

Each DTTL member firm is structured in accordance with national laws, regulations, customary practice, and other factors, and may secure the provision of professional services in its territory through subsidiaries, affiliates, and other related entities. Not every DTTL member firm provides all services, and certain services may not be available to attest clients under the rules and regulations of public accounting.

DTTL and each DTTL member firm are legally separate and independent entities, which cannot obligate each other. DTTL and each DTTL member firm are liable only for their own acts and omissions, and not those of each other. DTTL (also referred to as “Deloitte Global”) does not provide services to clients.


Flashpoint delivers Business Risk Intelligence (BRI) that empowers organizations worldwide to combat threats and adversaries.

Fueled by a combination of sophisticated technology, advanced data collections, and human-powered analysis, Flashpoint tailors its offerings to customer requirements.

The result is meaningful intelligence that enables large enterprises and the public sector to bolster cybersecurity, confront fraud, combat insider threats, enhance physical security, and address vendor risk and supply chain integrity.


HYPR is the leading provider of True Passwordless Security™

Backed by Comcast, Mastercard, and Samsung, HYPR is the first authentication platform designed to eliminate passwords and shared secrets across the enterprise. With HYPR, businesses are finally able to deploy Desktop MFA and Strong Customer Authentication to millions of users worldwide.

Eliminate The Target.


IBMers believe in progress — that the application of intelligence, reason and science can improve business, society and the human condition


Irdeto is the world leader in digital platform security, protecting platforms and applications for video entertainment, video games, connected transport and IoT connected industries. Irdeto’s solutions and services enable customers to protect their revenue, create new offerings and fight cybercrime. With 50 years of expertise in security, Irdeto’s software security technology and cyberservices protect over 5 billion devices and applications for some of the world’s best-known brands. With a unique heritage in security innovation, Irdeto is the well-established and reliable partner to build a secure future where people can embrace connectivity without fear. Please visit Irdeto at


Netskope was founded on four key tenets — these remain true today:

– Cloud services are how people work and collaborate.
They no longer seek IT’s permission to use those services.

– These services can be accessed from anywhere.
Whether that’s on or off your network, via mobile devices, or through sync clients.

– These services are written using APIs.
Security tools that don’t understand APIs are no longer as relevant.

– IT can no longer block cloud services.
Instead, they need a way to say “yes.”

 Our mission is to evolve security for the way people work

TruStar Technology

The highest-fidelity intelligence is what’s already captured within the four walls of your organization. TruSTAR breaks down silos across tools and teams to surface the most relevant data, helping you speed investigation and response times.

At TruSTAR, we’re obsessed with getting the most value from your threat intelligence data. We believe that when analysts can integrate threat intelligence data into every stage of their workflow, they can make better decisions faster.

Founded in 2014 by a mix of seasoned entrepreneurs, former security and intelligence specialists, and killer product developers, TruSTAR is focused on building the best threat intelligence platform for enterprise cybersecurity.


Our founders have been in the security and infrastructure field since the late 1990s and friends since the mid-2000s. They wondered why email still had no mechanism to address its “original sin,” which is the inability to authenticate the sender of an email. Without email authentication, domain owners have no control over how their organization name and domain address are used. And mail recipients are left on the defensive, never knowing for sure if the sender of a message is being impersonated and if they can trust an email.


Protect your brand and customers against phishing, domain spoofing, and fake email. Fully automated DMARC enforcement. Guaranteed. Test your domain.