VB2018 was partnered by the following organizations:

For more details of partnership opportunities with the VB Conference please contact Allison Sketchley by email or call +44 1235 544034.

 

Platinum partners:

Adaware.jpg

 "In the late 1990s users were faced with pop-ups, decreased computer performance and frequent interruptions due to new variations of spyware and malware not covered by existing anti-virus products. In response to the shifting online landscape, Lavasoft AB launched its flagship product, Ad-Aware. Fast forward to present day, adaware antivirus, has been downloaded over 450,000,000 times and Lavasoft has been renamed to 'adaware' to reflect the evolution of the brand and the success of its flagship anti-virus software.

"adaware is a world-leading security company comprised of experts and creative thinkers devoted to implementing solutions to protect users around the world by offering anti-malware solutions as well as clean software monetization for publishers. Since inception, adaware has created award-winning, free security and privacy software with the belief that online security should be transparent, effective and available to all.

"adaware's innovative H2O installer platform gives reputable publishers the opportunity to monetize their traffic and grow their distribution by offering consumers value-added software along with their downloads, all within the secure and transparent adaware environment. Simple integration, strict compliance and full publisher control are what make the H2O installer the best choice for enhanced monetization.

"adaware's web companion tool offers consumers free online security and features they want while benefiting publishers with added revenue, better attach-rates and yielding higher retention. With security and monetization at the core of its business, adaware is the partner of choice for software publishers for increased conversions using our traffic networks and installer solutions.

"Through adaware, millions of users have maximum protection for their computers and online identities. Consistently receiving 5-star reviews, adware has demonstrated why it is the best choice for consumers, creating high lifetime value and building trust through choice, innovation and transparency.

"As a world-leading security company, adaware strives to head the global fight against malware and spyware by providing exceptional security and privacy solutions. This is possible by ensuring partnerships with some of the industry's largest and most reputable software.

"Online communication is an integral part of our lives and we aim to provide people around the world with effective solutions to encourage their online connections. We focus on users and their unique online experiences, striving to be a part of your daily online interactions.
adaware is a global company with operations in North America and Europe. For more information, visit https://www.adaware.com/discover-adaware."

 

 

platinum-Comodo Logo.png"In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers globally."

 

 

ESET-130.jpg"Since 1987, ESET® has been developing security software that now enables over 110 million users to Enjoy Safer Technology™. Its broad security product portfolio covers all popular platforms, and provides both businesses and consumers around the world with the perfect balance of speed detection and usability. ESET NOD32® Antivirus, ESET Smart Security, ESET Cyber Security (its solution for Mac), and ESET Mobile Security for Android OS are among the most recommended security solutions in the world.

"The beginnings of ESET date back to 1987, when two young programming enthusiasts, Peter Paško and Miroslav Trnka, discovered one of the world's first computer viruses. They dubbed it 'Vienna' and wrote a program to detect it. Many other virus discoveries quickly followed, sparking the idea to devise a universal software solution to counter what were, at the time, emerging and relatively little-known computer threats.

"What started as the brainchild of a few friends has since evolved into an entire range of consumer, business and enterprise IT security solutions that are considered to be among the fastest and most effective in the world. Engineered for speed and stability, they fulfil the founders' vision of making advanced computer technology safe for everyone to use, whatever their level of IT skills or experience. Throughout the company's expansion, ESET has stayed true to the principles underpinning the company's philosophy – responsibility, reliability and honesty. These, coupled with innovation, continue to be the driving force behind the company's success and growth.

"Today, ESET has more than 1,500 employees globally. Headquartered in Bratislava (Slovakia), it has regional distribution centers in San Diego, Buenos Aires, and Singapore as well as country offices located in Sao Paulo (Brazil), Prague (Czech Republic), Jena (Germany), Sydney (Australia), Toronto (Canada), Bournemouth (UK), Taunton (UK) and Mexico City. Furthermore, ESET has established an extensive network of research & development centres in Bratislava (Slovakia), Prague (Czech Republic), Košice and Žilina (Slovakia), Krakow (Poland), Montreal (Canada) and Iaşi (Romania) along with a network of partners spanning more than 200 countries and territories.

"The company continues to lead the industry in proactive threat detection. The proven detection capabilities and low system demands of its security solutions continue to be recognized by independent testing organizations. ESET's NOD32 anti-malware system holds the world record for the longest unbroken string of acclaimed VB100 awards; it obtained its 100th VB100 award in December 2016."

 

tencent-new.jpg"Founded in November 1998, Tencent is a leading provider of Internet value-added services in China. Since its establishment, Tencent has maintained steady growth under its user-oriented operating strategies. On 16 June 2004, Tencent Holdings Limited (SEHK 700) went public on the main board of the Hong Kong Stock Exchange.

"It is Tencent's mission to enhance the quality of human life through Internet services. Presently, Tencent provides social platforms and digital content services under the 'Connection' Strategy. Tencent's leading Internet platforms in China – QQ (QQ Instant Messenger), Weixin/WeChat, QQ.com, QQ Games, Qzone and Tenpay – have brought together China's largest Internet community, to meet the various needs of Internet users including communication, information, entertainment, financial services and others. As of 31 December 2017, the number of monthly active QQ user accounts was 783 million while its peak concurrent user accounts reached 271 million. Combined MAU of Weixin and WeChat was 989 million. The development of Tencent has profoundly influenced the ways hundreds of millions of Internet users communicate with one another as well as their lifestyles. It also brings possibilities of a wider range of applications to China's Internet industry.

"Looking forward, Tencent remains committed to enhancing its development and innovation capabilities while strengthening its nationwide branding for its long-term development. More than 50% of Tencent employees are R&D staff. Tencent has obtained patents relating to technologies in various areas: instant messaging, e-commerce, online payment services, search engine, information security, gaming, and many more. In 2007, Tencent invested more than RMB100 million in setting up the Tencent Research Institute, China's first Internet research institute, with
campuses in Beijing, Shanghai, and Shenzhen. The institute focuses on the self-development of core Internet technologies, in pursuing its development and innovation for the industry.

"Tencent's long-term vision is to become the most respected Internet enterprise. In order to fulfill corporate social responsibilities and to promote civil Internet communities, Tencent has been actively participating in public charity programs. In 2006, Tencent inaugurated the Tencent Charity Fund, the first charity foundation set up by a Chinese Internet enterprise, and the public charity website gongyi.qq.com. The website focuses on youth education, assisting impoverished communities, care for the disadvantaged, and disaster relief. Tencent has recently begun a number of public charity projects across China. It strives to help build a harmonious society and to become a good corporate citizen."

 

 

 

Gold partners:

Gold-Kaspersky-2.jpg"Kaspersky Lab is a global cybersecurity company, which has operated in the market for over 20 years. Kaspersky Lab's deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company's comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them."

 

 

TalosBrand_CMYK2.jpeg"Talos is the industry-leading threat intelligence organization devoted to detecting and correlating threats in real time using the largest threat detection network in the world. Our intelligence and world-class threat research team better protect you and your organization against known and emerging cybersecurity threats."

 

 

Silver partners:

G_DATA_Logo_TIGS_2017_4C.jpg

"G DATA Software AG was founded in 1985 in Bochum, Germany, and invented antivirus in 1987. Over the last decades G DATA has become an innovative provider of IT security solutions. The product range comprises solutions for home users, SMEs and large organizations, as well as security services including incident response, penetration tests and consulting. Over 500 employees ensure the digital security of our customers.

"G DATA's IT security solutions for businesses satisfy our customers and were elected the best IT security product in the PUR 2018 study, which is based on a survey of 2,000 users. Moreover, with the statement 'My data remains in Europe', G DATA guarantees that personal data is stored and processed exclusively in Europe. G DATA issued a 'No backdoor' guarantee back in 2011, and is a member of 'IT Security made in Germany'. G DATA security solutions are available all over the world."

 

 

Qihoo-360-web.png"Founded in August 2005, Qihoo 360 has become the biggest Internet security company in China. It covers more than 90% of the individual users in the market. 360 is also a leading company in the B2B enterprise security market. Internet and security are two inherent components of 360, infused within the company at its birth time. The company integrates security technology seamlessly with AI, big data, cloud computing and other technologies. 360 is also an innovative player that developed its own multiple anti-virus engines. Its whole idea of 'Internet+' also brings disruptive revolution to the traditional security industry."

 

reason-lod-logo-signature.png

"Reason Software Company is the leading cybersecurity company focused on privacy and data protection. At Reason, we believe that stronger privacy starts with stronger security. User data has become the most valuable prize for cybercriminals, so Reason leverages its unique threat analytics platform to identify and protect against emerging threats at their earliest stage. Powered by an expert team, led by former Microsoft Lead Security Program Manager, Andrew Newman, Reason's cybersecurity engine scans over 1B files a day across 180 countries, protecting the privacy of millions of users worldwide."

 

 

 

Sponsor of the VB2018 Threat Intelligence Summit:

Abusix_Logo_4c_white_BG.png

"Based in the United States with operations around the globe, Abusix has long been considered one of the world's leading authorities on identifying and mitigating threats and preventing network abuse.

"The traditional security approach that is still focused on protecting the user from foreign attacks is not enough for one simple reason – there is no such thing as 100% secure internet access and hosting. What's needed is a true abuse orchestration and automation solution that can identify and shutdown network abuse and other cyber threats at the source.

"Abusix's Threat Intelligence™ provides actionable intelligence to security solutions, government organizations, network operators, brand protection providers, email service providers, social networks and others, to discover relevant threats and protect their customers. Using proprietary sensor networks combined with data from valued source partners, Abusix provides an unparalleled view of threat resources that enable efficient operation of heuristics engines, automatic detection of compromised sites, zero-day detection of new malware variants, hunting of command-and-control servers, phishing, driveby downloads and malware on the web, all allowing for quick identification and remediation of security threats and vulnerabilities.

"Abusix's Zetascan™ blocking algorithms help keep Enterprise, Security and Internet Service Providers' users safe while reducing the complexity related to accessing and using threat data by consolidating essential, industry-leading threat intelligence feeds into one easy-to-consume, state of the art, real-time DNS reputation and blacklist service. Zetascan simply aggregates, processes and normalizes data from different sources, facilitating real-time lookup of IP, Domain and URL reputation and threat data for various applications and services. It also provides mechanisms to grade an IP or domain-name for abuse, anti-spam measures and trustworthiness with very high reliability and low false-positive rate, enabling informed accurate decision making for enterprises, edge systems and other types of security providers.

"Abusix's AbuseHQ™ unifies security and abuse management by orchestrating, automating and resolving network and service operator threats that originate from within. The solution provides the visibility that service providers need to protect their network and keep their customers safe. AbuseHQ™ dramatically and quickly reduces abuse, vulnerability and compromise rates in our customer's networks through automated processing of inbound abuse reports, our customer's existing internal security solutions, and the Abusix's Threat Intelligence.

"The resulting, combined view of threats, compromised and vulnerable users, and the simple integration through easy-to-use Webhooks and APIs into existing tools, allow organizations to automate actions, appropriately protecting safe harbor and assuring customer trust and safety with their networks.

"Together, the portfolio of Abusix products provide the missing piece in today's network security environment that allows for quick and reliable mitigation of network abuse and other cyber threats.

"For more information, visit www.abusix.com or email info@abusix.com."

 

 

Getting connected partner:

Secudit-internet-sponsor.jpg"Secudit combines global cyber-threat intelligence with local network traffic monitoring and penetration testing to provide an enterprise with a continuously updated IT vulnerability dashboard. This dashboard provides enterprises with diagnostics of their overall cyber-health while indicating the specific sources of their greatest exposures to successful cyber attack.

"The Secudit dashboard operates at two diagnostic levels, both of which are continuously updated:

  1. Organized view of component vulnerabilities – an organized presentation of the current cyber-health of individual components of IT vulnerability.
  2. Correlated view of patterns of vulnerability evolution – cross-correlation of component indicators to discern and present patterns of emerging vulnerability that might otherwise be hidden.

"Secudit provides vulnerability detection and actionable recommendations for vulnerability mitigation. Secudit is not an operational incident response system (i.e. Secudit is not another SIEM). Rather than supporting real-time responses to specific security incidents, Secudit supports the continual improvement of incident response preparedness by exposing weaknesses in the current incident response plan, policies and deployment."

 

 

 

Evening networking partner:

malwarebytes.png"Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional anti-virus solutions. Malwarebytes completely replaces anti-virus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions. Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia. For more information, please visit us at http://www.malwarebytes.com/."

 

 

 

Early morning caffeine hit partner:

Kromtech.jpg"Kromtech is a global leading Mac cleaning, security & optimization software developer dedicated to helping Mac users' digital lives be more secure and simple through reliable technology solutions. The company has become the market leader in security software for Mac. The company's product MacKeeper and customer service are distributed all over the world, supported by 19 languages. Kromtech was founded in 2013, headquartered in Dubai, with offices in Ukraine. Currently there are over 800 employees."

 

 

 

VB2018 was supported by:

CSA_FINAL_RGB.jpg"The Clean Software Alliance (CSA) is a champion of sustainable, consumer-friendly practices within the software distribution ecosystem.

"The CSA works to advance the interests of the software development community through the establishment and enforcement of guidelines, policies and technology tools that balance the software industry's needs while preserving user choice and user control.

"A 501(c)(6) nonprofit trade association, the CSA works inclusively across its constituents of online security vendors, software distribution & monetization firms, installer platform companies, browser providers, computer platform developers and third party certification companies to find consumer-friendly solutions to the challenges of economically sustainable software distribution."

 

 

Microsoft-logo.jpg"Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more."

 

 

SE-Labs.jpg"SE Labs aims to improve information technology security by assessing products and services designed to detect attacks, protect against intrusions, or both. We test a range of solutions including endpoint software, network appliances and cloud services. Our tests are technically accurate and relevant, and are conducted with the utmost integrity.

"Constantly innovating, SE Labs has developed next-generation testing to prove the abilities of 'next-generation' security products using a comprehensive, full-stack approach to security assessment powered by true and detailed threat intelligence. Our end-to-end, targeted attack detection, protection and response testing is world class and capable of evaluating endpoint, appliance and cloud-based products and services."

VB2019 LONDON

2-4 October 2019 London, UK

VB2018 OVERVIEW

VB2018 SPEAKERS

VB2018 PROGRAMME

THREAT INTELLIGENCE SUMMIT

CODE OF CONDUCT

PÉTER SZŐR AWARD


Virus-Bulletin-Logo-no_text_Sidebar.jpg

Virus Bulletin is a security information portal, testing and certification body with a formidable reputation for providing users with independent intelligence about the latest developments in the global threat landscape.

In its 28th year, the international Virus Bulletin conference is cited by many as the IT security event of the year.

Meet the VB team!


Who attends?

  • CISO, CTO, CIOs, CEOs
  • IT security managers and directors across all industries
  • Cybersecurity and technology academics
  • Malware researchers and analysts
  • Security product testers and reviewers
  • Email and network security researchers
  • Cybersecurity lawyers and insurers
  • Product vendors
  • Software and app developers
  • Non-profits
  • Governments
  • Journalists and reviewers
  • Security evangelists
  • Consultants
  • ... and more

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.