Exhibitor Directory


Gartner Identity and Access Management Summit 2018 will help you develop a shortlist of technology and service providers who can meet your particular needs. You’ll receive exclusive access to some of the world’s leading technology and service providers in a variety of settings.



BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.


CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 100, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.


Edgile is the trusted cyber risk and compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content. Our strategy-first model optimizes IAM, GRC, and cybersecurity both on-premises and in the cloud. By transforming risk into opportunity, we secure the modern enterprise through solutions that increase business agility and create a competitive advantage for our clients.

Entrust Datacard

Consumers, citizens, and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from financial cards, passports, and ID cards to authentication, certificates, and secure communications.


ForgeRock®, the leader in digital identity management, transforms how businesses build trusted relationships with people, services, and things. Organizations adopt the ForgeRock Identity Platform™ as their digital identity system of record to monetize customer relationships, address regulations for privacy and consent (GDPR, HIPAA, PSD2, Open Banking, etc), and leverage the internet of things. ForgeRock serves hundreds of brands, including Morningstar, Vodafone, GEICO, Toyota, TomTom, and Pearson, as well as governments like Norway, Canada, and Belgium, securing billions of identities worldwide. ForgeRock has offices across the USA, Europe, and Asia. Get free downloads at forgerock.com and follow us @ForgeRock

Hitachi ID Systems

Hitachi ID Systems delivers access governance and identity administration solutions to large and mid-size organizations globally. Hitachi ID solutions are used for streamlining and securing the management of identities, security entitlements and credentials, for both business users and privileged accounts, on-premises and in the cloud. The Hitachi ID Identity and Access Management Suite is the only fully integrated solution which includes Identity Manager, Group Management, Password Manager and Privileged Access Manager. The Hitachi ID Suite is well known in the marketplace for high scalability, fault tolerance, a pragmatic design and low total cost of ownership (TCO). It is designed to simplify and secure the management of elevated access privileges, user and group lifecycles from onboarding until termination, across most systems and applications. Hitachi ID Mobile Access allows access to IAM services anytime, anywhere. The pre-configured reference-built Identity Express shortens implementation time and significantly reduces costs.


Traditional security defenses are no match for today’s relentless well-funded attackers, while disruptive technologies, like Cloud and the Internet of Things, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. We address the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration.


New 8th Gen Intel® Core™ vPro™ processor-based PCs are one of your most strategic assets against security threats. The Intel® vPro™ platform is architected to provide innovative security with Intel® Authenticate for advanced identity protection. Supporting true multifactor authentication, it verifies identities in hardware for added protection below the software, providing IT with the security they need while offering seamless log-on for employees.

Micro Focus

Micro Focus is a global software company with 40 years of experience in delivering and supporting enterprise software solutions that help customers innovate faster with lower risk. Our portfolio enables customers to build, operate and secure applications and IT systems that meet the challenges of change. We are committed to enabling customers to both embrace the latest technologies and maximize the value of their IT investments. Everything we do is based on a simple idea: the fastest way to get results from new technology investments is to build on what you have–bridging the old and the new. From Cloud to mobile, datacenters to the Internet of Things, our solutions create the innovation that embraces new business models, seizes market opportunities and derives competitive advantage. More than 4,000 Micro Focus staff in over 90 global locations offer 40 years of proven expertise in making, selling and supporting software. The Micro Focus portfolio includes products and solutions for identity-based access governance, security, COBOL development, mainframe solutions, application development and testing, IT operations management, host connectivity and collaboration/networking.


Founded in 1975, Microsoft (Nasdaq “MSFT”) is a Cloud first, Mobile first company delivering technologies that help businesses worldwide take advantage of mobile, enterprise social, and cloud computing trends to drive growth. Microsoft helps you to move to the cloud on your terms; getting the most value from your existing IT investments while giving you the flexibility to respond quickly to changing business needs www.Microsoft.com


Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise as well as transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 4,000 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.


Since 2000, Omada has focused on using identity to create measurable business value. Identity, managed the Omada way, simultaneously improves security, efficiency, cost control, and regulatory compliance. We’ve pioneered many of the best practices in use today and are passionate about taking identity management even further. DO MORE WITH IDENTITY

One Identity

One Identity helps organizations worldwide Get Identity and Access Management Right. One Identity’s modular and integrated suite of IAM solutions include powerful tools for identity governance, access management, privileged access management and identity as a service. With more than 7,000 customers, in excess of 200 million identities managed, and a legacy of focusing on customers, One Identity helps its customers achieve successful IAM outcomes.

Ping Identity

Ping Identity collaborates with the world’s largest organizations to prevent security breaches, increase employee and partner productivity and provide seamless customer experiences. With Ping, enterprises can securely connect users to all applications while managing identity, privacy and profile data at scale. Ping is the enterprise identity company.

Radiant Logic

Radiant Logic, Inc. is the market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization. Since pioneering the first virtual directory in 2000, the company has evolved its groundbreaking technology into a complete federated identity service, enabling Fortune 1000 companies to solve their toughest identity integration and federation challenges. Using model-driven virtualization technology, the RadiantOne Federated Identity Service builds customizable views from disparate data silos, streamlining authentication and authorization for identity management, web access management, context-driven applications, and cloud deployments. Companies in a wide range of sectors rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and enabling future identity and data management initiatives to meet changing business demands.


IT security and digital risk management are converging in response to pressures related to digital transformation, the cyber threat landscape, and increasing regulation. To embrace the convergence, a formula of visibility, insight, response and context—what RSA calls “Business-Driven Security”—must underpin any security or business effort. RSA Business-Driven Security™ solutions link business context with security incidents to help organizations manage digital risk and protect what matters most. RSA solutions protect millions of users around the world and help more than 90 percent of Fortune 500 companies take command of their security posture and thrive in an uncertain, high-risk world. With more than 700 dedicated security practitioners and a global ecosystem of 400+ partners, RSA delivers unified capabilities in the four essential areas of business-driven security: evolved SIEM & threat defense, identity and access assurance, integrated risk management, and fraud prevention, as well as services for risk and cyber security.


SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.


Saviynt delivers intelligent and risk-driven IGA 2.0 solution that combines advanced analytics with fine-grained privilege management. Saviynt enables enterprises to secure critical data, infrastructure and application assets for Cloud (Office 365, AWS, Salesforce, Workday) and Enterprise (SAP, Oracle EBS, AD) in a unified platform.


SecureAuth is leveraged by leading companies, their employees, their customers and their partners to eliminate identity-related breaches. As a leader in access management, identity governance, and penetration testing, SecureAuth is powering an identity security revolution by enabling people and devices to intelligently and adaptively access systems and data, while effectively keeping bad actors from doing harm. By ensuring the continuous assessment of risk and enablement of trust, SecureAuth’s highly flexible Identity Security Automation (ISA) platform makes it easier for organizations to prevent the misuse of credentials and exponentially reduce the enterprise threat surface. To learn more, visit www.secureauth.com, or connect with us at info@secureauth.com, Twitter, and LinkedIn.

Transmit Security

Transmit Security allows organizations to implement frictionless omni-channel authentication without making any modifications to their applications. The company’s technology supports any authentication technology, from any vendor, in one modular, micro-services platform that enables application owners to slash time-to-market and cost-to-market for new identity related projects. For more information visithttp://www.transmitsecurity.com/ or follow us on Twitter @TransmitSec.



Auth0, a global leader in Identity-as-a-Service, provides thousands of enterprise customers with a Universal Identity Platform for their web, mobile, IoT, and internal applications. Its extensible platform seamlessly authenticates and secures more than 1.5B logins monthly, making it loved by developers and trusted by global enterprises.

Google Cloud

Google Cloud is widely recognized as a global leader in delivering a secure, open, intelligent, and transformative enterprise cloud platform. Our technology is built on Google’s private network and is the product of nearly 20 years of innovation in security, network architecture, collaboration, artificial intelligence, and open source software. We offer a simply engineered set of tools and unparalleled technology across Google Cloud Platform and G Suite that help bring people, insights, and ideas together. Customers across more than 150 countries trust Google Cloud to modernize their computing environment for today’s digital world.


IDMWORKS has been recognized by Gartner as a top identity and access management consultancy. With over 650 IAM engagements, IDMWORKS has the depth and breadth of experience implementing all of the leading IAM vendor software solutions and can help extend the ROI of an organization’s existing IAM and governance software investments. IDMWORKS’ Advisory practice offers an IAM Assessment that helps organizations understand how and where to invest in risk management, data governance, and IAM. This Assessment provides a multi-year, multi-phased roadmap which becomes a blueprint for securing an organization’s data and applications. This framework is then used by the organization’s IT and business stakeholders as a tool to plan and prioritize their security initiatives. IDMWORKS’ Managed Services provide turnkey IAM managed service solutions including managed infrastructure, managed security, and 24x7x365 support, monitoring, and alerting services. What sets IDMWORKS apart from other MSPs is that we don’t box our customers into a single solution. We offer managed services for both on premise and cloud support, along with private or public cloud hosting of any IAM vendor software solution.

MicroStrategy, Inc.

MicroStrategy (Nasdaq: MSTR) is a worldwide leader in enterprise analytics and mobility software. A pioneer in the BI and analytics space, MicroStrategy delivers innovative software that empowers people to make better decisions and transform the way they do business. We provide our enterprise customers with world-class software and expert services so they can deploy unique intelligence applications.

Open Systems

As the leading global provider of managed SD-WAN solutions, with built-in security and analytics, we enable businesses to confidently create new business models driving market disruption and opportunity. With our unique digital operations platform, customers can pursue a digital-first strategy and leverage new technologies, like IoT and AI, to grow and scale business.


The Oracle Cloud offers complete SaaS application suites for ERP, HCM and CX, plus best-in-class database Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) from data centers throughout the Americas, Europe and Asia. For more information about Oracle (NYSE:ORCL), please visit us at oracle.com.


We exist to solve the fundamental problems with authentication: user experience, customization, and security. Traditional authentication technologies like OTPs add substantial friction to the user experience and are susceptible to simple attacks. Most implementations force the user to install a separate authenticator app placing a burden on users, reducing the brand value of the customer, and complicating the architecture. We’ve taken a completely fresh approach to authentication that incorporates device security, biometrics, and reporting. Our platform - AuthX - provide access to a variety of device native and network based biometrics including face, fingerprint, palm, and behavior. Our delivery model leverages APIs and SDKs with complete customizability - allowing customers to tailor the user experience, maintain brand value, and deploy with simplicity. In addition, we provide a robust reporting capabilities with SIM integrations. Our mission is simple - we are making authentication customizable, frictionless and secure. We believe doing so will allow the digital world to progress unencumbered by the current challenges of authentication.



Aquera infinitely expands the connectivity of identity management platforms for provisioning and governance with the Aquera SCIM Gateway and Connectors. The solution provides out-of-the-box connectivity from any IDM to any cloud or on-premises application, database, directory, server, or device.


Authen2cate is a leading provider of Identity & Access Management solutions for the enterprise. Organizations can feel confident utilizing our cloud-based solutions to securely, and easily manage user access with our suite of Single Sign-On and Multi-Factor Authentication products.


Averon is the developer of the world's easiest, fastest & most secure authentication solution, setting the new global standard of authentication. Averon uses real-time mobile network signaling, delivering an ultra-secure, frictionless identity verification process and boosting customer conversions.


Aware (Nasdaq:AWRE) has been a leading provider of government-grade biometrics software since 1993. Our Knomi™ mobile biometrics suite enables MFA using face, voice, and keystroke, with top-tier matching and spoof detection. Knomi includes FIDO® Certified and server-based options. Come see a demo!


Axiomatics provides externalized authorization management for databases, Big Data, applications, APIs and microservices. Global Fortune 2000 companies use the Axiomatics dynamic authorization suite to protect critical assets, securely share information, meet compliance and enable digital business.


Bitglass the Next-Gen CASB company is based in Silicon Valley. The company’s solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by industry veterans with a track record of innovation.

CA Technologies

CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy.


Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach.

Citrix Systems

Citrix powers a better way to work with unified workspace, networking, and analytics solutions that help organizations unlock innovation, engage customers, and boost productivity, without sacrificing security. With Citrix, users get a seamless work experience and IT has a unified platform to secure, manage, and monitor diverse technologies in any cloud environment. Citrix solutions are used by more than 400,000 organizations including 99 percent of the Fortune 100 and 98 percent of the Fortune 500.

Cognizant Security

Cognizant Security delivers the outcomes which leading organizations demand. Our end-to-end security solutions deliver industry expertise through Advisory, Transformation & Managed services. We take a future-focused approach to eliminate blind spots & provide the foresight to solve future threats.

Column Information Security

Column Information Security is a leading consulting and solutions provider focused on Identity and Access Management, Privileged Account Management, and Data Governance. Column Information Security leverages domain expertise from our Dev Ops and IT Service Management business units to provide holistic Information Security solutions to foster long-term strategic partnerships with our clients. Established in 1998, Column is a global organization headquartered in Chicago, IL. We have regional offices in New York, Dallas and DC and global offices in Canada, the United Kingdom, and India.

Concensus Technologies

Concensus Technologies is a national professional IT services company located near Pittsburgh, PA that specializes in Identity and Access Management. We also provide hardware, software, services and support to customers of all sizes.

Crossmatch (part of HID Global)

Crossmatch helps organizations solve identity management challenges through advanced authentication solutions. DigitalPersona provides the broadest set of risk-based authentication options allowing IT administrators to create the right security posture for each user, each application & each device.

Duo Security

Duo Security is a cloud-based Trusted Access provider protecting thousands of the world’s largest and fastest-growing organizations.


EmpowerID is the award winning all-in-one Identity Management and Cloud Security suite that manages millions of Cloud and on-premise identities for organizations around the globe. EmpowerID delivers the broadest range of ready to use IAM functionality coupled with highly flexible customizability.

EST Group

We deliver successful IAM programs to organizations looking for a corporate-wide, wholistic solution to automating, managing, securing your IT environment now and in the future, including GDPR; or call us in to rescue a stalled IAM project. We developed 5 Steps to a Successful IAM Implementation.

Evident ID

Evident provides a simple, secure platform that lets businesses confidently know who they are dealing with without handling sensitive personal data.

Fischer Identity

Fischer Identity empowers organizations to control their success and risk by enabling full operational control of identity governance & administration at predicable cost, quality, and time-to-value. Consistently control security and compliance across business operations 24/7. Identity is Control™.

Focal Point Data Risk

Focal Point Data Risk is a market-leading provider of integrated risk management services. Our expertise spans cyber security, data privacy and analytics, identity governance and access management, hands-on security training and internal audit.

GCA Technology Services

For over 15 years, GCA has helped companies assess, deploy and manage enterprise-wide governance, compliance and identity & access management (IAM) programs. We can manage any size program from inception through implementation and provide co-managed services for those programs on an on-going basis.


Gemalto is the global leader in digital security. We bring trust to an increasingly connected world. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.


Gurucul’s Identity Analytics leverages machine learning models to define, review and confirm accounts and entitlements for access. It uses dynamic risk scores and advanced analytics data as key indicators for provisioning, de-provisioning, authentication and privileged access management.

HID Global

HID Global is the trusted leader in products, services and solutions related to the creation, management, and use of secure identities.


IAMCompare is a cloud-based solutions innovator helping organizations maintain compliance with account access security policy through perpetual auditing. Simple and scalable design allows companies to quickly extend sound governance monitoring practices across their entire IT landscapes.

Identity Automation

Identity Automation helps organizations embrace security, increase business agility, and deliver an enhanced user experience with RapidIdentity, the most complete identity, access, governance, and administration platform available.

Identity Defined Security Alliance

The IDSA is an industry community focused on becoming an independent source of education and information on identity centric security strategies, by harnessing the collective expertise, enabling vendor collaboration and developing bests practices, resources and tools for customer implementations.

Imanami Corporation

Our software suite provides a powerful set of solutions to provision users and get them into the correct distribution and security groups immediately. This is the most basic and important tenet to Identity Management, getting users in the system and productive immediately.

iovation, a TransUnion Company

iovation, a TransUnion company, protects online businesses and their end users against fraud and abuse, and identifies trustworthy customers through a combination of advanced device identification, shared device reputation, device-based authentication and real-time risk evaluation.


Iraje is a security solutions company that specializes in protecting enterprise data. Iraje focuses on cutting edge capabilities to secure customer’s critical infrastructure that includes servers, databases, routers, switches, firewalls, applications, storage, security devices etc.


Janrain leads customer identity and access management (CIAM) with industry-first innovations. The Janrain Identity Cloud® enables transformational experiences, delivers insights and ensures privacy and security with highly personalized, consent-driven experiences. The company manages 1.75 billion digital identities for global brands including Pfizer, Philips, McDonald’s and Coca-Cola.


Jumio, the creator of Netverify®, leverages advanced technology including augmented AI, biometric facial recognition, machine learning and human review to help organizations meet regulatory compliance and definitively establish the digital identity of their customers. Learn more: www.jumio.com.


Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.


Krontech is a software company established in 2007 and produces and integrates advanced technology software in the fields of Privileged Access Management Systems, Network Packet Brokerage, Streaming Analytics, Fast Data & Real Time Data Processing, and Next-generation Security and Audit.

LastPass by LogMeIn

LastPass provides secure password management to reduce the risk of breach and remove employee password frustration. With secure password sharing, customizable policies, and comprehensive user management, LastPass gives businesses of all sizes the tools to create an enterprise security posture.


NextLabs provides data-centric security software to protect business-critical data and applications. Our patented dynamic authorization technology and industry-leading attribute-based policy platform help enterprises identify and protect data, monitor and control access to sensitive data, and help prevent regulatory violations—whether in the cloud or on-premises. The software automates enforcement of security controls and compliance policies to enable secure information sharing across the extended enterprise. NextLabs has some of the largest global enterprises as customers and has strategic relationships with industry leaders.


NoPassword offers the next generation of Identity Platform that substitutes passwords with Human and Hidden Multi-Factor Authentication. Securely and privately leveraging biometrics and frictionless MFA, NoPassword empowers enterprises to simplify user access, reduce IT costs, and enhance security.


For more than three decades, OKIOK has been pushing the limits of innovation to help our clients address their most challenging cyber security challenges. OKIOK`s seamless products and services provide a distinctive advantage, such as a full service, risk free, Identity and Access Governance offer.


OneLogin is the leader in Unified Access Management, Empowering Organizations to Access the World™. OneLogin makes it simpler and safer for organizations to access the apps and data they need anytime, everywhere.

OpenText Inc

Covisint now OpenText, provides highly secure cloud identity & access management across the people, systems and things within, and external to your enterprise’s digital ecosystem. We securely connect and provide access to a number of industries including the largest supply chains in the world.

Optimal IdM

Optimal IdM provides innovative and affordable IAM solutions that meet security and scalability needs of our clients. Optimal IdM solutions are offered on premise and in the cloud as a 100% managed service offering. Optimal was also featured in the 2018 Gartner Magic Quadrant for Access Management.


The world’s most trusted security solutions integrator, Optiv provides stronger, simpler and less costly cyber security programs. Optiv's business, strategic and technical experiences, combined with in-depth product knowledge, bring order to the cyber security chaos. www.optiv.com


Orkus secures access to cloud data, applications, and infrastructure. The Orkus Access Governance Platform builds a real-time graph that connects data, infrastructure, and identities; and, then continuously tracks and learns access patterns to secure access and authorization for your hybrid cloud.


OverWatchID is “Identity Security Reinvented™.” OverWatchID delivers the Converged Identity Security Solution that comprises privileged access management (PAM), identity access management (IAM/SSO), multi-factor authentication (MFA) and cloud access security brokering (CASB).


PlainID provides a simple and intuitive way for organizations to create and manage their authorization policies, down to one point of decision, control and view. Our agile, standards-based platform acts as a master policy layer, managing multiple policies seamlessly between all facets of IAM.

Preempt Security

Preempt protects organizations by eliminating internal threats and security breaches. Threats are not black or white, and the Preempt Platform is the only solution that delivers identity and access threat prevention that continuously preempts threats based on identity, behavior and risk.


PrimeKey is one of the world’s leading companies for PKI and digital signing solutions. Delivered on-prem or in the cloud, our products EJBCA, SignServer and the PKI Appliance, deliver the capability to implement an enterprise grade PKI system.


Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. Taking a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access, nothing else makes PAM this easy.

RF IDeas

RF IDeas, Inc. is the leading manufacturer of in-building identification and access control readers. Our badge readers support nearly all proximity and contactless smart card credentials worldwide. Our readers are used for identity & access management, secure print management and more.


SAASPASS is your key to the world. By providing a comprehensive and frictionless solution fully-secured with dynamic passcodes and multi-factor authentication, SAASPASS is the only identity and access management tool you need to secure your corporate network or your own personal data.

SAP Customer Data Cloud

The SAP Customer Data Cloud helps businesses build trusted digital relationships with customers. With our solution, businesses can identify consumers across devices, build trust with customers through enhanced transparency and control, and fuel great digital experiences with first-party data.

Sath, Inc.

Sath, founded in 2004, is an information security consulting and managed services company.We also provide cloud based products to manage information security,compliance and identity access management.We strive to improve and achieve excellence while operating with the highest standards of integrity.

SDG Corporation

SDG is a leading provider of IAM solutions that strengthen enterprise businesses. Change is inevitable when Consumers & Employees are driving the change in the very nature of how businesses work and providing the power to operate within a secure and digitally smart experience by redefining IT.


Our purpose-built security analytics platform analyzes logs & network events in real time to identify actionable threats. Securonix provides out-of-the-box content to detect insider threat, cyber threats, cloud threats, and fraud activity.


SecZetta is the leading provider of third party identity risk and lifecycle management software solutions. Organizations around the globe use the software to manage non-employees: create, control and respond to identity requirements and processes, meet compliance, and minimize risk.


Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.

Simeio Solutions

Simeio enables secure engagement with anyone, anywhere and at anytime, by providing the industry’s most complete managed identity services. Simeio brings together best-of-breed platform technologies, total visibility, field-proven methodologies, and the most skilled identity experts anywhere.

SSH Communications Security

SSH.COM - secure access to your digital core: your critical data, applications and services. Secure Shell is the bedrock of trusted data flow and the secure transactions that grease the digital economy. We are the company behind it and we are quietly revolutionizing secure access and encryption.

STEALTHbits Technologies

STEALTHbits is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.


Thycotic security tools limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise privilege management accessible by eliminating dependency on overly complex security tools and prioritizing productivity and control.


Trusona, the global leader in identity authentication, verifies the true persona behind any digital interaction. Providing identity-proofing and passwordless multi-factor authentication, Trusona enables organizations to dramatically improve security while creating a frictionless user experience.

Tuebora Inc

Tuebora represents the “third-wave” of IAM. With the application of machine learning and natural language, Tuebora is a “self-driven”, adaptive, scalable and real-time cloud-first IAM solution. Customers deploy it on-premise or in the Cloud and experience increased productivity and lowered risk.

Varonis Systems

Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification, and threat analytics.


Venafi is the cyber security market leader in machine identity protection, securing connections and communications between machines. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH.


Veridium is a leader in the development of strong authentication software for enterprises seeking to eliminate passwords or tokens. By capturing biometrics from a smartphone, Veridium provides multi-factor security with single-step convenience.


Yubico sets new global standards for simple and secure access to computers, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services.

Get the insights and solutions you need.