{"id":11622,"date":"2023-06-18T17:04:43","date_gmt":"2023-06-18T22:04:43","guid":{"rendered":"https:\/\/texascyber.org\/?post_type=sponsor_post&p=11622"},"modified":"2023-08-22T20:42:49","modified_gmt":"2023-08-23T01:42:49","slug":"uptycs","status":"publish","type":"sponsor_post","link":"https:\/\/texascyber.org\/sponsor\/uptycs\/","title":{"rendered":"Uptycs"},"content":{"rendered":"
\n

Shift up your cybersecurity<\/h2>\n

Uptycs secures every point of your attack surface and streams structured and normalized security telemetry into your detection cloud. Searching for the answers is easy, providing visibility to deep asset inventory, and key insights. Add unified CNAPP+XDR, and compliance capabilities and you’re set to defend against your greatest threats.<\/p>\n

\n
\n
Uptycs – Unified CNAPP & XDR<\/span><\/div>\n<\/div>\n
\n

The era of point solutions is over<\/h1>\n
\n

Too many security teams are working in isolated data silos, hindering productivity and collaboration. Uptycs connects insights across your modern attack surface, promotes teamwork, and tackles compliance, vulnerabilities, and threats.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":11791,"template":"","sponsor_level":[11],"sponsored_year":[],"acf":[],"yoast_head":"\nUptycs - Texas Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texascyber.org\/sponsor\/uptycs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uptycs - Texas Cyber\" \/>\n<meta property=\"og:description\" content=\"Shift up your cybersecurity Uptycs secures every point of your attack surface and streams structured and normalized security telemetry into your detection cloud. Searching for the answers is easy, providing visibility to deep asset inventory, and key insights. Add unified CNAPP+XDR, and compliance capabilities and you’re set to defend against your greatest threats. Uptycs – […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texascyber.org\/sponsor\/uptycs\/\" \/>\n<meta property=\"og:site_name\" content=\"Texas Cyber\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/texascyber\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T01:42:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/06\/uptycs_logo_2C_on-dark_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"801\" \/>\n\t<meta property=\"og:image:height\" content=\"238\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@texascyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/uptycs\/\",\"url\":\"https:\/\/texascyber.org\/sponsor\/uptycs\/\",\"name\":\"Uptycs - Texas Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/texascyber.org\/#website\"},\"datePublished\":\"2023-06-18T22:04:43+00:00\",\"dateModified\":\"2023-08-23T01:42:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/texascyber.org\/sponsor\/uptycs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texascyber.org\/sponsor\/uptycs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/uptycs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texascyber.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uptycs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texascyber.org\/#website\",\"url\":\"https:\/\/texascyber.org\/\",\"name\":\"Texas Cyber\",\"description\":\"Texas Cyber Summit\",\"publisher\":{\"@id\":\"https:\/\/texascyber.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texascyber.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texascyber.org\/#organization\",\"name\":\"Texascyber\",\"url\":\"https:\/\/texascyber.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"contentUrl\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"width\":150,\"height\":150,\"caption\":\"Texascyber\"},\"image\":{\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/texascyber\",\"https:\/\/twitter.com\/texascyber\",\"https:\/\/www.instagram.com\/texascybersummit\/\",\"https:\/\/www.linkedin.com\/company\/texas-cyber\",\"https:\/\/www.youtube.com\/texascybersummit\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Uptycs - Texas Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texascyber.org\/sponsor\/uptycs\/","og_locale":"en_US","og_type":"article","og_title":"Uptycs - Texas Cyber","og_description":"Shift up your cybersecurity Uptycs secures every point of your attack surface and streams structured and normalized security telemetry into your detection cloud. Searching for the answers is easy, providing visibility to deep asset inventory, and key insights. Add unified CNAPP+XDR, and compliance capabilities and you’re set to defend against your greatest threats. Uptycs – […]","og_url":"https:\/\/texascyber.org\/sponsor\/uptycs\/","og_site_name":"Texas Cyber","article_publisher":"https:\/\/facebook.com\/texascyber","article_modified_time":"2023-08-23T01:42:49+00:00","og_image":[{"width":801,"height":238,"url":"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/06\/uptycs_logo_2C_on-dark_rgb.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@texascyber","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/texascyber.org\/sponsor\/uptycs\/","url":"https:\/\/texascyber.org\/sponsor\/uptycs\/","name":"Uptycs - Texas Cyber","isPartOf":{"@id":"https:\/\/texascyber.org\/#website"},"datePublished":"2023-06-18T22:04:43+00:00","dateModified":"2023-08-23T01:42:49+00:00","breadcrumb":{"@id":"https:\/\/texascyber.org\/sponsor\/uptycs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texascyber.org\/sponsor\/uptycs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/texascyber.org\/sponsor\/uptycs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texascyber.org\/"},{"@type":"ListItem","position":2,"name":"Uptycs"}]},{"@type":"WebSite","@id":"https:\/\/texascyber.org\/#website","url":"https:\/\/texascyber.org\/","name":"Texas Cyber","description":"Texas Cyber Summit","publisher":{"@id":"https:\/\/texascyber.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texascyber.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texascyber.org\/#organization","name":"Texascyber","url":"https:\/\/texascyber.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/","url":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","contentUrl":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","width":150,"height":150,"caption":"Texascyber"},"image":{"@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/texascyber","https:\/\/twitter.com\/texascyber","https:\/\/www.instagram.com\/texascybersummit\/","https:\/\/www.linkedin.com\/company\/texas-cyber","https:\/\/www.youtube.com\/texascybersummit"]}]}},"_links":{"self":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post\/11622"}],"collection":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post"}],"about":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/types\/sponsor_post"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media\/11791"}],"wp:attachment":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media?parent=11622"}],"wp:term":[{"taxonomy":"sponsor_level","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_level?post=11622"},{"taxonomy":"sponsored_year","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsored_year?post=11622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}