H-ISAC teams with innovative cybersecurity solution providers to become integral architects for the future of Healthcare. Healthcare members desire vendor partners willing to invest in them and support their peers as they grow and share solutions for the ever changing landscape ahead. Vendors that will enabling them to increase resiliency and aid in direction amongst the ever darkening and turbulent seas of cybersecurity.
Navigator Sponsorship Program
H-ISAC offers the benefits of its customized Navigator program to interested vendors or solutions providers to the Security sector within the Healthcare/Public Health (HPH) sub-sector. Participation in the Navigator Program is designed to enhance the understanding of sector progress in information sharing and the tools used to enhance security.
In today’s Cyber Security universe, solution providers can play an important role in navigating and educating active members of the HPH security vertical. These firms provide products and services designed to make the HPH sector stronger and safer, and an essential part of H-ISAC’s ability to achieve its goals.
If you are interested in becoming a Navigator, or learning more and what is included with the Navigator Program, please click the buttons below.
**Click to download the Navigator Agreement, sign and email the PDF to the contact point listed on the agreement.
Current H-ISAC Navigators
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.
Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected. An integral part of our DNA is creating long-lasting customer partnerships, working together to identify our customers’ needs and provide solutions that fuel their success.
We have preserved this keen focus on solving business challenges since our founding in 1984. Len Bosack and wife Sandy Lerner, both working for Stanford University, wanted to email each other from their respective offices, but technological shortcomings did not allow such communication. A technology had to be invented to deal with disparate local area protocols, and as a result of solving their challenge, the multiprotocol router was born.
Medical device cybersecurity and zero-day protection.
Defending Healthcare from Cyber Threats.
“Deloitte” is the brand under which tens of thousands of dedicated professionals in independent firms throughout the world collaborate to provide audit & assurance, consulting, risk and financial advisory, risk management, tax, and related services to select clients. These firms are members of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”). Each DTTL member firm provides services in particular geographic areas and is subject to the laws and professional regulations of the particular country or countries in which it operates.
Each DTTL member firm is structured in accordance with national laws, regulations, customary practice, and other factors, and may secure the provision of professional services in its territory through subsidiaries, affiliates, and other related entities. Not every DTTL member firm provides all services, and certain services may not be available to attest clients under the rules and regulations of public accounting.
DTTL and each DTTL member firm are legally separate and independent entities, which cannot obligate each other. DTTL and each DTTL member firm are liable only for their own acts and omissions, and not those of each other. DTTL (also referred to as “Deloitte Global”) does not provide services to clients.
IBMers believe in progress — that the application of intelligence, reason and science can improve business, society and the human condition
IntSights Cyber Intelligence
Revolutionizing cybersecurity with the first of its kind enterprise threat intelligence and mitigation platform that drives proactive defense by turning tailored threat intelligence into automated security action.
Netskope was founded on four key tenets — these remain true today:
– Cloud services are how people work and collaborate.
They no longer seek IT’s permission to use those services.
– These services can be accessed from anywhere.
Whether that’s on or off your network, via mobile devices, or through sync clients.
– These services are written using APIs.
Security tools that don’t understand APIs are no longer as relevant.
– IT can no longer block cloud services.
Instead, they need a way to say “yes.”
Our mission is to evolve security for the way people work
PwC’s accounting practice originated in London well over a century ago. As times changed and PwC expanded worldwide, our commitment to clients—like you—never wavered. With us, you’re always supported by a global network of more than 236,000 people in 158 countries with one goal: to help your business thrive.
PwC’s professional services, including audit and assurance, tax and consulting, cover such areas as cybersecurity and privacy, human resources, deals and forensics. We help resolve complex issues and identify opportunities across these industries.
Let’s combine your aspirations with our world-class capabilities to achieve your goals.
Symantec protects the Cloud Generation through our Integrated Cyber Defense Platform, the industry’s most complete portfolio for securing cloud and on-premises environments. We support 15,000 enterprises in taking full advantage of cloud computing without compromising the security of the people, data, applications, and infrastructure that drive their business. Our advanced technology portfolio is powered by the world’s largest civilian threat intelligence network, enabling us to see and protect against the most advanced threats.
The solutions and subscriptions from our consumer brands, Norton and LifeLock, comprise the Digital Safety platform, which protects information, devices, networks, and identities. Our Norton-branded solutions provide multi-layer security for desktops, mobile operating systems, and home networks, defending against increasingly complex online threats to individuals, families, and small businesses. With the acquisition of LifeLock, we strive to protect all aspects of peoples’ digital identities.
As more than one-third of Americans and 650 million people globally were cyber crime victims in 2016, we trust in the Digital Safety platform to secure consumers’ digital lives—now and well into the future.
The highest-fidelity intelligence is what’s already captured within the four walls of your organization. TruSTAR breaks down silos across tools and teams to surface the most relevant data, helping you speed investigation and response times.
At TruSTAR, we’re obsessed with getting the most value from your threat intelligence data. We believe that when analysts can integrate threat intelligence data into every stage of their workflow, they can make better decisions faster.
Founded in 2014 by a mix of seasoned entrepreneurs, former security and intelligence specialists, and killer product developers, TruSTAR is focused on building the best threat intelligence platform for enterprise cybersecurity.
Our founders have been in the security and infrastructure field since the late 1990s and friends since the mid-2000s. They wondered why email still had no mechanism to address its “original sin,” which is the inability to authenticate the sender of an email. Without email authentication, domain owners have no control over how their organization name and domain address are used. And mail recipients are left on the defensive, never knowing for sure if the sender of a message is being impersonated and if they can trust an email.
Protect your brand and customers against phishing, domain spoofing, and fake email. Fully automated DMARC enforcement. Guaranteed. Test your domain.