VB2019 is partnered by the following organizations

For more details of partnership opportunities with the VB Conference please contact Allison Sketchley by email or call +44 1235 544034.


Platinum partners


Platinum-reason.png"Reason Cybersecurity, formerly known as Reason Core Security, is a leading cybersecurity company focusing on privacy protection. Founded in 2012, Reason is powered by a team of cyber experts and visionaries and led by Andrew Newman, a former Microsoft Lead Security Program Manager.

"Reason's cutting-edge technology engine protects the privacy of millions of users worldwide by scanning over 1B files in 180 countries a day. Its unique state-of-the-art data analytics platform identifies and protects against emerging threats, such as ransomware, spyware, trojans, worms, adware and more, at their earliest stage.

"Reason's researchers developed powerful privacy-focused features such as Antivirus & Malware Scan, Threat Removal, Real-time Protection, Ransomware Protection, Microphone & Webcam Protection, Secure Browsing, Tracking Protection and more."



Gold partners



Gold-Facebook.png"Founded in 2004, Facebook's mission is to give people the power to build community and bring the world closer together. People use Facebook to stay connected with friends and family, to discover what's going on in the world, and to share and express what matters to them."




TalosBrand_CMYK2.jpeg"Cisco Talos is one of the largest and most trusted providers of cutting-edge security research globally. We provide the data Cisco Security products and services use to take action. The key differentiator of Talos is our process — seeing what is happening broadly across the threat landscape, acting on that data rapidly and meaningfully, and driving protection. The core mission at Talos is to provide verifiable and customizable defensive technologies and techniques that help customers quickly protect their assets. Our job is protecting your network."



Silver partners:


endgame-2.jpg"Endgame makes military-grade endpoint protection as simple as anti-virus. Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection, stopping everything from ransomware, to phishing, and targeted attacks. Endgame is the only endpoint security platform to offer a unique hybrid architecture that delivers both cloud administration and data localization that meets all industry, regulatory, and global compliance requirements. The US military as well as the world's largest commercial organizations rely on Endgame to protect their people, technology and mission, globally. For more information, visit www.endgame.comand follow us on Twitter @EndgameInc."


G_DATA_Logo_TIGS_2017_4C.jpg"G DATA Software AG is considered to be the inventor of anti-virus. It was more than 30 years ago that the company, founded in Bochum in 1985, developed the first commercial program to combat computer viruses. These days, G DATA is one of the world's leading providers of cyber defence solutions. With the AI-technology DeepRay, an innovative in-house development, G DATA is able to quickly react to new malware samples.

"Today, G DATA is much more than an anti-virus company. If offers a range of services — from security awareness trainings to security assessments as well as detailed penetration tests. The endpoint protection product range comprises security solutions for private customers as well as medium- to large-sized enterprises."


intezer-logo.jpg"Intezer introduces a Genetic Malware Analysis technology, offering enterprises automated malware analysis for improving their security operations and accelerating incident response. Intezer’s platform provides a fast, in-depth understanding of any device or file by mapping its code DNA at the 'gene' level. By identifying the origins of every single piece of code within seconds, Intezer can quickly detect code reuse to known malware, as well as code that was seen in trusted applications. For more information, visit www.intezer.com."


Qihoo-360-web.png"Founded in August 2005, Qihoo 360 has become the largest Internet security company in China. It covers more than 90% individual users on the market. It is also a leading company in the enterprise security market. Internet and security are two genes of Qihoo 360 infused to the company at its birth time. The company integrates security technology seamlessly with AI, big data, and cloud computing technologies. It is also an innovative player that developed its own multiple antivirus engines. Its idea of 'Internet+' also brings disruptive revolution to the traditional security industry. As the largest security vendor from China, Qihoo 360 is taking an active role to help building the global security community. To promote the development of security communities, Qihoo 360 actively participates in various collaborations with industrial partners, academic professionals, and research institutions."


TotalAV-logo.jpg"TotalAV launched in 2016 and has since become one of the fastest growing anti-malware products in the market.

"Identifying and understanding our customers' needs was paramount to the development of TotalAV. A clean and easy to use interface was created around Avira's SAVAPI engine and our own cloud-based URL detection technology, making the complicated world of cybersecurity effortless to understand.

"As communities continue to rely further on day to day digital products, we have ensured our software is available across all widely used platforms, with a support network readily available at the click of a button.

"As a company, we are always pushing forward, and since launching, we have seen rapid growth and downloads from across the globe. 2019 is projected to be our most successful year to date as we move from strength to strength."



Next Gen Patron

android_wordmark_rgb_green.png"Google's mission is to organize the world's information and make it universally accessible and useful. Through products and platforms like Search, Maps, Gmail, Android, Google Play, Chrome and YouTube, Google plays a meaningful role in the daily lives of billions of people and has become one of the most widely-known companies in the world. Google is a subsidiary of Alphabet Inc."



Evening networking partner

malwarebytes.png"Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions. Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia. For more information, please visit us at http://www.malwarebytes.com/."



Getting connected partner

Secudit-internet-sponsor.jpg"Secudit combines global cyber-threat intelligence with local network traffic monitoring and penetration testing to provide an enterprise with a continuously updated IT vulnerability dashboard. This dashboard provides enterprises with diagnostics of their overall cyber-health while indicating the specific sources of their greatest exposures to successful cyber attack. "The Secudit dashboard operates at two diagnostic levels, both of which are continuously updated: Organized view of component vulnerabilities – an organized presentation of the current cyber-health of individual components of IT vulnerability. Correlated view of patterns of vulnerability evolution – cross-correlation of component indicators to discern and present patterns of emerging vulnerability that might otherwise be hidden. "Secudit provides vulnerability detection and actionable recommendations for vulnerability mitigation. Secudit is not an operational incident response system (i.e. Secudit is not another SIEM). Rather than supporting real-time responses to specific security incidents, Secudit supports the continual improvement of incident response preparedness by exposing weaknesses in the current incident response plan, policies and deployment."



Sponsor of the Threat Intelligence Practitioners' Summit

CTA-web.jpg"The Cyber Threat Alliance (CTA) is a not-for-profit, US-based organization that improves the cybersecurity of the global digital ecosystem by enabling near real-time, high-quality cyber threat information sharing among companies and organizations in the cybersecurity field. With over 20 members based in eight different countries and with global reach, we seek to protect end-users, disrupt malicious actors, and elevate overall security for everyone. Members use our automated platform to share, validate, and deploy actionable threat intelligence to their customers in near-real time. They share research findings and priorities with each other at human speed as well. Based on our shared intelligence, CTA and its members create outputs, collaborate on actions, and respond to cyber incidents to reduce the overall effectiveness of malicious actors’ tools and infrastructure. Finally, CTA shares content, establishes partnerships, and promotes policies that enhance the overall security and resilience of the digital ecosystem."


Supporting organizations


 "The Anti-Malware Testing Standards Organization (AMTSO) is an international non-profit association that focuses on addressing the global need for improvement in the objectivity, quality, and relevance of anti-malware testing methodologies. AMTSO is a member-driven organization, and all our activities are directed and steered by our 60+ members from across the security and testing industries, around the world."


Avira.jpg"Avira protects people across all devices, both directly and via our OEM partnerships. Avira OEM licenses technology and delivers world-class cyber threat intelligence to the industry’s most successful cyber-security companies.

"Our portfolio of cyber-security technologies includes anti-malware SDKs, cloud sandboxes, APIs, threat intelligence feeds, on-premise machine learning and white-labelled solutions.

"We enable you to get to market quicker and protect your customers better by building a relationship unique to your business needs. Learn more at oem.avira.com. Linkedin: Avira Insights. Twitter: @AviraInsights"


CSA.jpg"The Clean Software Alliance is a non-profit organization, originally established in 2014 by Microsoft with the main goal of forming a channel of communication between the software distribution and monetization industry constituents.

"The Clean Software Alliance (CSA) champions sustainable, consumer-friendly practices within the software distribution ecosystem by establishing and enforcing best practices by and among its members and the industry at large. Comprised of antimalware vendors, software distribution and monetization firms, and major software platforms, the CSA works across its constituents to codify and operationalize industry best practices through guidelines, policies, and technology that balance the software industry's needs while preserving customer choice and customer control."

The Clean Software Alliance will host the 5th Annual Summit, to be held on October 5th 2019 at the Novotel London West Hotel in London, UK immediately after the annual Virus Bulletin conference (VB2019). Details about the 5th Annual CSA Summit, agenda and feedback can be found at the RSVP page. https://csaannualsummit.splashthat.com/


SE-Labs.jpg"SE Labs aims to improve information technology security by assessing products and services designed to detect attacks, protect against intrusions, or both. We test a range of solutions including endpoint software, network appliances and cloud services. Our tests are technically accurate and relevant, and are conducted with the utmost integrity.

"Constantly innovating, SE Labs has developed next-generation testing to prove the abilities of 'next-generation' security products using a comprehensive, full-stack approach to security assessment powered by true and detailed threat intelligence. Our end-to-end, targeted attack detection, protection and response testing is world class and capable of evaluating endpoint, appliance and cloud-based products and services."

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.