Exhibitor Directory


Gartner Identity and Access Management Summit 2019 will help you develop a shortlist of technology and service providers who can meet your particular needs. You’ll receive exclusive access to some of the world’s leading technology and service providers in a variety of settings.



CyberArk, the #1 provider of privileged access security, protects data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the most complete solution to reduce risk created by privileged credentials and secrets and is trusted by more than 50% of the Fortune 100.


Edgile is the trusted cyber risk and compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content. Our strategy-first model optimizes IAM, GRC, and cybersecurity both on-premises and in the cloud. By transforming risk into opportunity, we secure the modern enterprise through solutions that increase business agility and create a competitive advantage for our clients.

Entrust Technologies

Hitachi ID Systems

Hitachi ID Systems delivers access governance and identity administration solutions to large and mid-size organizations globally. Hitachi ID solutions are used for streamlining and securing the management of identities, security entitlements and credentials, for both business users and privileged accounts, on-premises and in the cloud. The Hitachi ID Identity and Access Management Suite is the only fully integrated solution which includes Identity Manager, Group Management, Password Manager and Privileged Access Manager. The Hitachi ID Suite is well known in the marketplace for high scalability, fault tolerance, a pragmatic design and low total cost of ownership (TCO). It is designed to simplify and secure the management of elevated access privileges, user and group lifecycles from onboarding until termination, across most systems and applications. Hitachi ID Mobile Access allows access to IAM services anytime, anywhere. The pre-configured reference-built Identity Express shortens implementation time and significantly reduces costs.


Founded in 1975, Microsoft (Nasdaq “MSFT”) is a Cloud first, Mobile first company delivering technologies that help businesses worldwide take advantage of mobile, enterprise social, and cloud computing trends to drive growth. Microsoft helps you to move to the cloud on your terms; getting the most value from your existing IT investments while giving you the flexibility to respond quickly to changing business needs www.Microsoft.com



Since 2000, Omada has focused on using identity to create measurable business value. Omada enables organizations to achieve compliance, reduce risk exposure, and maximize efficiency. Built on Microsoft technology, our solution delivers a strong identity governance framework based on best practice processes for easy adoption, long term value, and optimized ROI across cloud and on-premises infrastructures. DO MORE WITH IDENTITY

One Identity

One Identity helps organizations worldwide Get Identity and Access Management Right. One Identity’s modular and integrated suite of IAM solutions include powerful tools for identity governance, access management, privileged access management and identity as a service. With more than 7,000 customers, in excess of 200 million identities managed, and a legacy of focusing on customers, One Identity helps its customers achieve successful IAM outcomes.

Ping Identity

Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities.

Radiant Logic

As the market-leading provider of federated identity systems based on virtualization, Radiant Logic delivers simple, standards-based access to all identity within an organization. The RadiantOne FID federated identity and directory service enables customizable identity views built from disparate data silos—along with scalable sync and storage—to drive critical authentication, authorization, and provisioning decisions for WAM, federation, cloud, and cloud directory deployments. Many Fortune 1000 companies rely on RadiantOne FID to deliver quick ROI by reducing administrative effort, simplifying integration and storage, and building a flexible infrastructure to meet changing business demands.


SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.


SecureAuth is leveraged by leading companies, their employees, their customers and their partners to eliminate identity-related breaches. As a leader in access management, identity governance, and penetration testing, SecureAuth is powering an identity security revolution by enabling people and devices to intelligently and adaptively access systems and data, while effectively keeping bad actors from doing harm. By ensuring the continuous assessment of risk and enablement of trust, SecureAuth’s highly flexible Identity Security Automation (ISA) platform makes it easier for organizations to prevent the misuse of credentials and exponentially reduce the enterprise threat surface. To learn more, visit www.secureauth.com, or connect with us at info@secureauth.com, Twitter, and LinkedIn.

Simeio Solutions

Simeio enables secure engagement with anyone, anywhere and at anytime, by providing the industry’s most complete managed identity services. Simeio brings together best-of-breed platform technologies, total visibility, field-proven methodologies, and the most skilled identity experts anywhere.

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.



Auth0 provides authentication and a single-view of users across applications, while improving time to market, security and user experience.

CA Technologies

CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy.


IDMWORKS has been recognized by Gartner as a top identity and access management consultancy. With over 650 IAM engagements, IDMWORKS has the depth and breadth of experience implementing all of the leading IAM vendor software solutions and can help extend the ROI of an organization’s existing IAM and governance software investments. IDMWORKS’ Advisory practice offers an IAM Assessment that helps organizations understand how and where to invest in risk management, data governance, and IAM. This Assessment provides a multi-year, multi-phased roadmap which becomes a blueprint for securing an organization’s data and applications. This framework is then used by the organization’s IT and business stakeholders as a tool to plan and prioritize their security initiatives. IDMWORKS’ Managed Services provide turnkey IAM managed service solutions including managed infrastructure, managed security, and 24x7x365 support, monitoring, and alerting services. What sets IDMWORKS apart from other MSPs is that we don’t box our customers into a single solution. We offer managed services for both on premise and cloud support, along with private or public cloud hosting of any IAM vendor software solution.


We exist to solve the fundamental problems with authentication: user experience, customization, and security. Traditional authentication technologies like OTPs add substantial friction to the user experience and are susceptible to simple attacks. Most implementations force the user to install a separate authenticator app placing a burden on users, reducing the brand value of the customer, and complicating the architecture. We’ve taken a completely fresh approach to authentication that incorporates device security, biometrics, and reporting. Our platform - AuthX - provide access to a variety of device native and network based biometrics including face, fingerprint, palm, and behavior. Our delivery model leverages APIs and SDKs with complete customizability - allowing customers to tailor the user experience, maintain brand value, and deploy with simplicity. In addition, we provide a robust reporting capabilities with SIM integrations. Our mission is simple - we are making authentication customizable, frictionless and secure. We believe doing so will allow the digital world to progress unencumbered by the current challenges of authentication.


SSH.COM helps organizations control secure access to their digital core: their critical data, applications & services. 3,000+ customers globally trust us to solve their cybersecurity challenges.



Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment


Column Information Security is a leading consulting and solutions provider focused on Identity and Access Management, Privileged Account Management, and Data Governance. Column Information Security leverages domain expertise from our Dev Ops and IT Service Management business units to provide holistic Information Security solutions to foster long-term strategic partnerships with our clients. Established in 1998, Column is a global organization headquartered in Chicago, IL. We have regional offices in New York, Dallas and DC and global offices in Canada, the United Kingdom, and India.

EST Group

We deliver successful IAM programs to organizations looking for a corporate-wide, wholistic solution to automating, managing, securing your IT environment now and in the future, including GDPR; or call us in to rescue a stalled IAM project. We developed 5 Steps to a Successful IAM Implementation.

Fischer International

Fischer Identity empowers organizations to control their success and risk by enabling full operational control of identity governance & administration at predicable cost, quality, and time-to-value. Consistently control security and compliance across business operations 24/7. Identity is Control™.

Focal Point

Focal Point Data Risk is a market-leading provider of integrated risk management services. Our expertise spans cyber security, data privacy and analytics, identity governance and access management, hands-on security training and internal audit.

Fractal Industries

Fractal Industries is a software firm that applies artificial intelligence to solve complex, real-world problems at scale. Fractal OS™, is a Data Analytics-as-a-Service platform that blends capabilities to drive optimization and enable timely, insightful decision-making across the enterprise.

Gemalto - SafeNet Inc

HID Global

HID Global is the trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Identity Automation

Identity Automation helps organizations embrace security, increase business agility, and deliver an enhanced user experience with RapidIdentity, the most complete identity, access, governance, and administration platform available.


Our software suite provides a powerful set of solutions to provision users and get them into the correct distribution and security groups immediately. This is the most basic and important tenet to Identity Management, getting users in the system and productive immediately.


Jumio, the creator of Netverify®, leverages advanced technology including augmented AI, biometric facial recognition, machine learning and human review to help organizations meet regulatory compliance and definitively establish the digital identity of their customers. Learn more: www.jumio.com.


Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.

LastPass by LogMeIn

LastPass provides secure password management to reduce the risk of breach and remove employee password frustration. With secure password sharing, customizable policies, and comprehensive user management, LastPass gives businesses of all sizes the tools to create an enterprise security posture.


NoPassword offers the next generation of Identity Platform that substitutes passwords with Human and Hidden Multi-Factor Authentication. Securely and privately leveraging biometrics and frictionless MFA, NoPassword empowers enterprises to simplify user access, reduce IT costs, and enhance security.


For more than three decades, OKIOK has been pushing the limits of innovation to help our clients address their most challenging cyber security challenges. OKIOK`s seamless products and services provide a distinctive advantage, such as a full service, risk free, Identity and Access Governance offer.

Optimal IdM

Optimal IdM provides innovative and affordable IAM solutions that meet security and scalability needs of our clients. Optimal IdM solutions are offered on premise and in the cloud as a 100% managed service offering. Optimal was also featured in the 2018 Gartner Magic Quadrant for Access Management.


OverWatchID is “Identity Security Reinvented™.” OverWatchID delivers the Converged Identity Security Solution that comprises privileged access management (PAM), identity access management (IAM/SSO), multi-factor authentication (MFA) and cloud access security brokering (CASB).


PlainID provides a simple and intuitive way for organizations to create and manage their authorization policies, down to one point of decision, control and view. Our agile, standards-based platform acts as a master policy layer, managing multiple policies seamlessly between all facets of IAM.

Preempt Security

Preempt protects organizations by eliminating internal threats and security breaches. Threats are not black or white, and the Preempt Platform is the only solution that delivers identity and access threat prevention that continuously preempts threats based on identity, behavior and risk.


Trusted by governments and enterprises worldwide, PrimeKey is leading PKI, digital signatures and applied cryptography vendor. Software and hardware designed for IoT scale of business.

RF IDeas

RF IDeas is a leading manufacturer of identity & access control readers supporting proximity and smart card credentials globally.


Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. Taking a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access, nothing else makes PAM this easy.

SDG Corporation

SDG is a leading provider of IAM solutions that strengthen enterprise businesses. Change is inevitable when Consumers & Employees are driving the change in the very nature of how businesses work and providing the power to operate within a secure and digitally smart experience by redefining IT.

STEALTHbits Technologies

STEALTHbits is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.

SecureLink, Inc


Our purpose-built security analytics platform enriches, analyzes and scores events into actionable intelligence. Using machine learning techniques, Securonix detects insider threat, cyber threat and fraud attacks in real-time. www.securonix.com.


Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.

Tuebora Inc

Tuebora represents the “third-wave” of IAM. With the application of machine learning and natural language, Tuebora is a “self-driven”, adaptive, scalable and real-time cloud-first IAM solution. Customers deploy it on-premise or in the Cloud and experience increased productivity and lowered risk.

Varonis Systems

We are a pioneer in data security & analytics, specializing in software for data security, governance, compliance, classification, & threat analytics.


Veridium is a leader in the development of strong authentication software for enterprises seeking to eliminate passwords or tokens. By capturing biometrics from a smartphone, Veridium provides multi-factor security with single-step convenience.


Yubico sets new global standards for simple and secure access to computers, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services.

Get the insights and solutions you need.