Gartner Security & Risk Management Summit will help you develop a short list of technology and service providers who can meet your particular needs. You’ll receive exclusive access to some of the world’s leading technology and service providers in a variety of settings.

A final vendor listing will be confirmed prior to the start of each conference



The enterprise attack surface is massive and growing rapidly. There are practically unlimited permutations and combinations of ways by which the adversary can attack and compromise our networks. Analyzing and improving cybersecurity posture is not a human-scale problem anymore. Our goal is to provide every organization with a comprehensive and real-time view into their breach risk along with specific prioritized insights and integrations to enable them to transform their cybersecurity posture. We envision a world where cyber-defenders are able to use the power of advanced AI to build a cyber-resilient enterprise and stay ahead of attackers. We call this journey of getting from now to this future AI-powered cybersecurity posture transformation.


BitSight is the most widely adopted Security Ratings company with a mission to change the way the world addresses cyber risk. Transforming data into insights, BitSight enables security and risk leaders to make more informed security decisions that result in overall improved security outcomes for a safer, more resilient digital world. BitSight provides broad transparency of security incidents across the internet, enabling customers to take quick action with objective, verifiable and scalable security performance metrics. Participants in the BitSight community gain access to the largest, most-engaged network of security and risk leaders around the world, collectively working together to reduce global systemic cyber risk for a safer, more resilient digital world. Founded in 2011, BitSight helps organizations manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk. Seven of the top 10 cyber insurers, 20% of Fortune 500 companies, and 3 of the top 5 investment banks rely on BitSight to manage cyber risks.

Carbon Black

About VMware Carbon Black: VMware Carbon Black is a leader in cloud-native endpoint protection dedicated to keeping the world safe from cyberattacks. The VMware Carbon Black Cloud consolidates endpoint protection and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analyzing billions of security events per day across the globe, VMware Carbon Black has key insights into attackers’ behaviors, enabling customers to detect, respond to and stop emerging attacks. More than 6,000 global customers, including approximately one third of the Fortune 100, trust VMware Carbon Black to protect their organizations from cyberattacks. The company’s partner ecosystem features more than 500 MSSPs, VARs, distributors and technology integrations, as well as many of the world’s leading IR firms, who use VMware Carbon Black’s technology in more than 500 breach investigations per year.


Cisco is leading the way, transforming businesses, governments, and cities worldwide. Cisco delivers integrated solutions, products, and services that connect networks, big and small, around the world. We help customers build and secure networks, automate, orchestrate, integrate, and protect IT-based products and services. In an ever more connected world, cyber threats are constantly evolving. The Cisco integrated portfolio and industry-leading threat intelligence deliver the scope, scale, and capabilities to keep up with the complexity and volume of threats. Cisco prioritizes security in all that we do, allowing you and your business to grow and innovate while keeping your assets safe. No one can match Cisco's breadth of skill, assets, and experience in security. Protecting What's Now and What's Next. That's Cisco Secure.


CrowdStrike® Inc. (Nasdaq: CRWD), a global cybersecurity leader, is redefining security for the cloud era with an endpoint protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates over 2.5 trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform. There’s only one thing to remember about CrowdStrike: We stop breaches.


Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. The company has over 1000 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.


Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations most critical data and IP, while driving digital transformation and growth. Rather than offering a static one-size fits all approach that stifles innovation and creates vulnerabilities, Forcepoint is attuned to how people interact with data, providing secure access while enabling employees to create value. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers in more than 150 countries.


MobileIron is redefining enterprise security with the industry’s first mobile-centric, zero trust platform built on a unified endpoint management (UEM) foundation to secure access and protect data across the perimeter-less enterprise. As traditional network perimeters become obsolete, organizations must adopt a “never trust, always verify” approach to enterprise security. MobileIron’s mobile-centric, zero trust approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to a device or user. This goes beyond identity management and gateway approaches by utilizing a more comprehensive set of attributes before granting access. The MobileIron security platform combines industry-leading unified endpoint management (UEM) capabilities with zero trust-enabling technologies including zero sign-on (ZSO), multi-factor authentication (MFA), and mobile threat defense (MTD) for a seamless and secure experience that ensures only authorized users, devices, apps, and services can access business resources.

NTT Security

NTT Ltd. partners with organizations around the world to shape and achieve outcomes through intelligent technology solutions. We employ more than 40,000 people and deliver services in over 200 countries and regions. The Security division of NTT helps clients create a digital business that is secure by design, through 10 SOCs, seven R&D centers, and over 2,000 security experts. With unsurpassed threat intelligence, we help you to predict, detect, and respond to cyberthreats, while supporting business innovation and managing risk. Visit us at


Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,600 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to securely connect their people and technology.

OneTrust Privacy

OneTrust is the #1 most widely used privacy, security and trust platform used by more than 5,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange and OneTrust GRC integrated risk management software. OneTrust is co-headquartered in Atlanta and in London, and has additional offices in Bangalore, San Francisco, Melbourne, New York, São Paulo, Munich, Hong Kong and Bangkok. Our fast-growing team surpasses 1,500 employees worldwide. To learn more, visit

OneTrust Vendorpedia

OneTrust Vendorpedia™ is the largest and most widely used technology platform to operationalize third party risk, security, and privacy management. More than 3,000 customers of all sizes use OneTrust to offer the most depth and breadth of any third party risk, security, and privacy solution. To learn more, visit or connect on LinkedIn.


Proofpoint is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.


ReliaQuest custom-architects individualized security environments that get smarter over time. By combining existing tools and technologies with the reliability of co-management and the speed and agility of Managed Detection and Response, ReliaQuest transforms organizations into their own security platforms – providing unmatched visibility while normalizing the security spend. ReliaQuest operates 24/7/365 from Security Operations Centers in Tampa, FL, and Las Vegas, NV. ReliaQuest’s model is recognized as the emerging standard for large and complex organizations.


RevBits’ Cyber Intelligence Platform (C.I.P.), a full product suite, fundamentally transforms the cybersecurity market. Single source, “best in class”, with patented methodologies eliminates multiple vendors and related integration and training issues. Cutting-edge modules include a) Email Security: leveraging sophisticated and unique algorithms such as a patented, page impersonation detection methodology and probabilistic scoring of emails, b) Endpoint Security: conducts three-phased analysis on threats for maximum protection and eradicating ransomware, c) Deception Technology: utilizes dual-layer virtualization and real honeypot servers, lures attackers with manual and automated implanted credentials to reveal source breached system, d) Privileged Access Management: four-in-one solution that includes privileged access, sessions, passwords, secrets, keys and certificate management system. Native clients available for common operating systems and zero-knowledge encryption model for maximum data security, e) Security Awareness Training: educates and evaluates users against phishing campaigns, f) Pen Test Portal: online workflow solution to manage all aspects of each engagement.


RiskRecon is the only continuous vendor monitoring solution that delivers risk-prioritized action plans custom-tuned to match your risk priorities, providing the world’s easiest path to understanding and acting on third-party cyber risk. Partner with RiskRecon to build your scalable, third-party risk management program and realize dramatically better risk outcomes. To learn more about RiskRecon’s approach or to request a demo, visit


ServiceNow makes the world of work, work better for people. ServiceNow enables organizations to transform the way they handle security and risk. By bringing security, risk, and IT together, on one platform—the Now Platform® - suddenly, you’re able to see and prioritize security incidents, vulnerabilities, and enterprise risks more quickly than ever—and with new certainty. You’re able to monitor and reduce your risk exposure with real-time visibility. And you respond faster using workflows, automation, and orchestration. On the Now Platform your enterprise can stay safe, stay alert, and do it all with ease and simplicity. Visit to learn more.


Symantec is the world’s leading cyber security company, helps organizations, governments & people secure their most important data wherever it lives.



Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph™ detects, defends and deters costly advanced email attacks including business email compromise, spear phishing and account takeover. Learn more at

AT&T Cybersecurity

AT&T Cybersecurity helps to reduce the complexity and cost of fighting cybercrime. Together, the power of the AT&T network, our SaaS-based solutions with advanced technologies including virtualization and actionable threat intelligence from AT&T Alien Labs and the Open Threat ExchangeTM, and our relationship with more than 40 best-of-breed vendors, accelerate your response to cybersecurity threats. Our experienced consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome the skills gap. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.


Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with nearly 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine. We help organizations do 3 things: 1. Understand what you have – get an instant snapshot of every device – managed, unmanaged, or unknown. 2. Discover coverage gaps – use pre-built queries or create your own and get alerted to devices outside of current security policies. 3. Enforce security policies – with every device in your sights, start deploying solutions immediately to secure your network. To learn more, visit


BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering companies to secure and manage their entire universe of privileges. The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance.


Bitglass, the Next-Gen CASB company, is based in Silicon Valley with offices worldwide. The company’s cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.

Code42 Software

Code42 is the leader in insider risk detection and response. Native to the cloud, Code42 rapidly detects insider threats and speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from loss, leak and theft while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks. More than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas.


CyberArk, the #1 leader in privileged access management, protects data, infrastructure and assets across cloud and hybrid environments. CyberArk delivers the most complete solution to reduce risk created by privileged credentials and secrets and is trusted by more than 50% of the Fortune 500. To learn more, visit


BlackBerry Cylance is a global leader in security software and services for enterprises and governments, powered by artificial intelligence (AI) technology to secure the Internet of Things. Based in Waterloo, Ontario, the company is unwavering in its commitment to cybersecurity, safety, and data privacy, and leads in key areas such as endpoint security and management, encryption and embedded systems. To date, we secure more than 500M endpoints including 150M connected cars. For more information, visit and follow @BlackBerry.

Deep Instinct

Harnessing the power of deep learning, Deep Instinct is fundamentally shifting the approach in cybersecurity from reactive to pro-active. Unlike detection and response-based solutions, which wait for the attack before reacting, Deep Instinct’s solution works preemptively. By taking a preventative approach, files and vectors are automatically analyzed prior to execution, keeping customers protected in zero time. This is critical in a threat landscape, where real time is too late. With the aim of eradicating cyber threats from the enterprise, the lightweight, proactive solution protects the most evasive known and unknown malware attacks with unmatched accuracy. Providing protection across endpoints, networks, servers, and mobile devices, it can be applied to most OSs and any file types. Beyond protecting its customers, that include leading MSSPs and F500 companies like HP and Tech Data, Deep Instinct is forming and expanding new partnerships every day. It is led by a highly experienced and interdisciplinary team of deep learning scientists and Ex-IDF Intelligence cyber units.

Dragos, Inc.

Dragos has a global mission: to safeguard civilization from those trying to disrupt the critical industrial infrastructure we depend on daily. The expert practitioners who founded Dragos were drawn to this mission through their decades of experience in the US Military and Intelligence Community going head-to-head with cyber attackers who threaten the world’s industrial infrastructure. Our products and professional services provide advanced asset identification, threat detection, and response capabilities, combined with frontline insights of our elite team of industrial control systems (ICS) cybersecurity experts. For enterprises looking to protect their industrial and operational technology systems, we provide the technology to identify threats and respond to them before they become significant breaches. Dragos currently protects hundreds of organizations worldwide and provides the ICS community with select free technology products, research, and thought leadership.


Elastic is a search company. As the creators of the Elastic Stack (Elasticsearch, Kibana, Beats, and Logstash), Elastic builds self-managed and SaaS offerings that make data usable in real time and at scale for use cases like application search, site search, enterprise search, logging, APM, metrics, security, business analytics, and many more. Founded in 2012, Elastic is a distributed company with Elasticians working in countries around the world. Learn more at

Entrust Datacard

Consumers, citizens and employees increasingly expect anywhere-anytime experiences—whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications.


Fasoo products span the life-cycle of sensitive unstructured data to discover, classify, protect, monitor, control, track and expire access to content wherever it travels or resides. Our unified solution enables users to securely collaborate internally and externally with sensitive information while consistently meeting corporate governance and regulatory requirements. Our file centric approach using encryption with a unique identifier allows organizations to have more visibility and control over unstructured data without interrupting workflows. We have successfully retained our leadership in the unstructured data security market and engaged in this journey with over 1,500 enterprises globally, securing more than 2.7 million users to field enterprise-wide data-centric solutions that proactively protect corporate brand, competitive position and meet ever-increasing regulatory demands. We are experiencing continuous improvement in our global market position, based on our unique technology, ongoing R&D and strategic approach to comprehensive product capabilities by extending our core security capabilities into content-centric collaboration and behavioral analytics.


FireMon is the #1 security automation solution for hybrid cloud enterprises. FireMon delivers persistent network security for multi-cloud environments through a powerful fusion of real-time asset visibility, compliance and automation. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world. For more information, visit FireMon is on social media: Twitter, LinkedIn, YouTube and Facebook.

Forescout Technologies, Inc.

Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device, as well as continuous posture assessment.


Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the border-less network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security features without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 425,000 customers trust Fortinet to protect their businesses.


Galvanize builds award-winning, cloud-based security, risk management, compliance, and audit software to drive change in some of the world’s largest organizations. We’re on a mission to unite and strengthen individuals and entire organizations through the integrated HighBond software platform. With more than 7,000 customer organizations in 140 countries, Galvanize is connecting teams in 60% of the Fortune 1,000, 72% of the S&P 500, and hundreds of government organizations, banks, manufacturers, and healthcare organizations. Whether these professionals are managing threats, assessing risk, measuring controls, monitoring compliance, or expanding assurance coverage, HighBond automates manual tasks, blends organization-wide data, and broadcasts it in easy-to-share dashboards and reports. But we don’t just make technology—we provide tools that inspire individuals to achieve great things and do heroic work in the process. Visit our booth or to learn more.


Gigamon is the first company to deliver complete network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructures. We aggregate, transform and analyze network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation. In short, we enable you to run fast, stay secure and innovate. Gigamon has been awarded over 75 technology patents and enjoys industry-leading customer satisfaction with more than 3,000 global organizations, including 80 percent of the Fortune 100. For the full story on how Gigamon can help you, please visit

Google Cloud

Google Cloud is widely recognized as a global leader in delivering a secure, open, intelligent, and transformative enterprise cloud platform. Our technology is built on Google’s private network and is the product of nearly 20 years of innovation in security, network architecture, collaboration, artificial intelligence, and open source software. We offer a simply engineered set of tools and unparalleled technology across Google Cloud Platform and G Suite that help bring people, insights, and ideas together. Customers across more than 150 countries trust Google Cloud to modernize their computing environment for today’s digital world.

Hitachi ID Systems

Hitachi ID Systems delivers access governance and identity administration solutions to large and mid-size organizations globally. Hitachi ID solutions are used for streamlining and securing the management of identities, security entitlements and credentials, for both business users and privileged accounts, on-premises and in the cloud. The Hitachi ID Identity and Access Management Suite is the only fully integrated solution which includes Identity Manager, Group Management, Password Manager and Privileged Access Manager. The Hitachi ID Suite is well known in the marketplace for high scalability, fault tolerance, a pragmatic design and low total cost of ownership (TCO). It is designed to simplify and secure the management of elevated access privileges, user and group lifecycles from onboarding until termination, across most systems and applications. Hitachi ID Mobile Access allows access to IAM services anytime, anywhere. The pre-configured reference-built Identity Express shortens implementation time and significantly reduces costs.


Organizations often face disruptive forces that can increase cybersecurity risk. IBM Security works with you to understand your unique challenges. It’s how we drive security into the fabric of your business, helping you to unite your defenses and unlock innovation.


Infosec believes knowledge is the most powerful tool to fight cybercrime and equips everyone with cybersecurity skills so the good guys win. We help IT and security professionals advance their careers with self-paced skills courses and cyber ranges, boot camps and certifications. Our security awareness training platform and phishing simulations empower all employees with the knowledge and confidence to stay cyber secure at work and home. Learn more at


IntSights is redefining cyber security with the industry's first and only enterprise threat management platform that transforms tailored threat intelligence into automated security operations. IntSights groundbreaking data-mining algorithms and unique cyber reconnaissance capabilities continuously monitor an enterprise's external digital profile across the surface, deep and dark web, categorize and analyze tens of millions of potential threats, and automate the risk remediation lifecycle - streamlining workflows, maximizing resources and securing business operations. This has made IntSights' one of the fastest growing cybersecurity companies in the world. IntSights has offices in Amsterdam, Boston, Dallas, New York City, Singapore, Tel Aviv and Tokyo.


Kaspersky is a global cybersecurity company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe.


Most organizations struggle to see and recognize sophisticated cyber threats. Lastline gives you the network visibility and accurate detection you need to contain attacks before they disrupt your business. We protect 20 million users on tens of thousands of networks and are led by the top cyber security researchers in the world.


McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place. By building solutions that work with other companies’ products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

Menlo Security

Menlo Security, Inc., provides a complete, global cloud security platform that secures cloud transformations with zero compromise on risk, user experience, and visibility and control. Its solutions – built on the world’s first and only Isolation Core™ – solve for email security, web security, data protection, and threat prevention. Headquartered in Palo Alto, CA, Menlo Security is trusted by hundreds of companies, including many Global 2000 enterprises and financial services institutions worldwide as they seek to achieve the fullest benefits of SaaS.


Every day, Microsoft practices security operations at a global scale to protect our customers, in the process analyzing more than 6.5 trillion signals to generate intelligence that we share with our customers and partners through technology solutions spanning identity and access management, threat protection, information protection, security management, and infrastructure security. We drive a broad set of industry and policy partnerships in support of our unique responsibility to make the world a safer place.​


Mimecast (NASDAQ: MIME) is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure. Mimecast Email Security protects against; malware, spam, phishing, and whaling. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages. Mimecast Enterprise Information Archiving unifies email, file, and instant messaging data to support e-discovery and give employees fast access to their personal archives via PC, Mac and mobile apps.


The network perimeter is dissolving. A new perimeter is needed that can protect data and users everywhere, without introducing friction to the business. The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope.

One Identity

One Identity, a Quest Software business, enables organizations to achieve an identity-centric security strategy with our uniquely broad and integrated portfolio of identity management offerings, including account management, identity governance and administration and privileged access management solutions. One Identity empowers organizations to securely operate at their full potential. When identity is at the core of the security program, organizations can enable proper access across all user types, systems and data, whether on-prem, in the cloud or in a hybrid environment. With more than 7,500 customers and over 125 million identities managed, One Identity solutions are trusted worldwide by corporations and government agencies to enhance their agility and efficiency while securing access. For more information, visit


Rapid7 (Nasdaq: RPD) is advancing security with visibility, analytics, and automation delivered through our Insight cloud. Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Over 7,200 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organizations. For more information, visit our website, check out our blog, or follow us on Twitter.


Secureworks® (NASDAQ: SCWX) is a technology-driven cybersecurity leader that protects organizations in the digitally connected world. Built on proprietary technologies and world-class threat intelligence, our applications and solutions help prevent, detect, and respond to cyber threats. Red Cloak™ software brings advanced threat analytics to thousands of customers, and the Secureworks Counter Threat Platform™ processes over 300B threat events per day. We understand complex security environments and are passionate about simplifying security with Defense in Concert™ so that security becomes a business enabler. More than 4,000 customers across over 50 countries are protected by Secureworks, benefit from our network effect and are Collectively Smarter. Exponentially Safer.™


SecurityScorecard is an ecosystem risk management solution that enables security professionals to instantly rate and understand the security risk of any company. The platform identifies vulnerabilities, active exploits, and advanced threats in your vendor and partner ecosystem as well as your own IT infrastructure.


SonicWall has been fighting the cybercriminal industry for over 28 years defending small and medium businesses, enterprises and government agencies worldwide. Backed by research from SonicWall Capture Labs, our award-winning, real-time breach detection and prevention solutions secure more than a million networks, and their emails, applications and data, in over 215 countries and territories. These organizations run more effectively and fear less about security.


As a worldwide leader in next-generation cybersecurity, Sophos protects nearly 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats. Sophos’ cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.

Splunk, Inc.

Splunk Inc. (NASDAQ: SPLK) turns data into doing with the Data-to-Everything Platform. Splunk technology is designed to investigate, monitor, analyze and act on data at any scale, from any source over any time period. The Data-to-Everything platform removes the barriers between data and action, so our customers -- regardless of size or business -- have the freedom to deliver meaningful outcomes across their entire organization. Our unique approach to data has empowered companies to improve service levels, reduce operations costs, mitigate risk, enhance DevOps collaboration and create new product and service offerings.

SureCloud Inc.

SureCloud is the new simple, modern and streamlined approach to Governance, Risk and Compliance (GRC) and data privacy management software. Rapid implementation in days not months, an intuitive user experience to maximize business user involvement, and best practices out-of-the-box that drive both GRC and data privacy program maturity. SureCloud focuses on maximizing our customer’s success by providing SureCloud Assist, a managed software admin service that reduces your need for tool admin time and effort. SureCloud has been recognized in the 2019 Gartner Magic Quadrant for Integrated Risk Management (IRM) Solutions and IT Vendor Risk Management Solutions, and is a leading vendor in the Gartner IRM Voice of Customer report.


Delivering comprehensive security testing with actionable results, securing continuously with the world's most skilled ethical hackers and AI technology, we are Synack, the most trusted Crowdsourced Security Platform. Headquartered in Silicon Valley with regional offices around the world, Synack has conducted thousands of crowdsourced security tests to protect global brands. Synack's investors represent the largest names in technology and security, including Google Ventures, M12 (formerly Microsoft Ventures), Hewlett Packard Enterprise, Intel Capital, Kleiner Perkins, and GGV Capital. For more information, please visit or check out our 5-star reviews at

Tanium Inc.

Tanium gives organizations the power to secure & manage endpoints across the enterprise within seconds no matter where the device exists; in the cloud, on premise, anywhere. Tanium provides complete and accurate information on endpoints to defend against threats & improve operational efficiency.

Tenable, Inc.

Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies.


Trustwave is a leading cybersecurity and managed security services provider that helps businesses fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. Trustwave is a Singtel company and the global security arm of Singtel, Optus and NCS, with customers in 96 countries.

Varonis Systems

Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance.


Vectra® is transforming cybersecurity by applying advanced AI to detect in-progress attacks and hunt for hidden threats. Vectra and its flagship Cognito® platform enable the world’s most consequential organizations to detect cyberattacks in real time and empower threat hunters to perform highly conclusive incident investigations. Vectra reduces business risk by eliminating security gaps in cloud, data center and enterprise environments. Behind the Cognito platform, Vectra threat researchers identify and investigate cyberattacks, vulnerabilities and malicious behaviors that are unknown to the world. With data sets from this research, data scientists develop the machine learning algorithms and behavioral analysis that drive Cognito.


Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world. With its combination of automation, integrations, process, and speed, Veracode helps companies make security a seamless part of the development process. This allows them to both find and fix security defects so that they can use software to achieve their missions.


VMware is a leading innovator in enterprise software. We connect, manage, automate and secure the world's digital infrastructure. Our cloud, digital workspace, networking and security offerings form an essential, ubiquitous digital foundation that powers the applications, services and experiences transforming the world. With VMware, organizations can flex and harness new technology quickly, without disrupting operations or introducing risk. We enable digital transformation for more than 500,000 customers globally, aided by an ecosystem of 75,000 partners. Headquartered in Palo Alto, California, we are committed to being a force for good, from our breakthrough innovations to our global impact.

WhiteHat Security

WhiteHat Security is the leading advisor for application security with the most comprehensive platform powered by artificial and human intelligence. Trusted for nearly two decades by mid-sized to Fortune 500 organizations, WhiteHat Security empowers secure DevOps by continuously assessing the risk of software assets throughout the software development life cycle (SDLC). The company is an independent, wholly-owned subsidiary of NTT Security and is based in San Jose, California, with regional offices across the U.S. and Europe.


Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, the Zscaler multi-tenant, distributed security cloud protects thousands of customers from cyberattacks and data loss, so they can embrace cloud agility, speed, and cost containment—securely.



A-LIGN is one of only a few globally recognized cybersecurity and privacy solutions providers. A-LIGN is a HITRUST CSF Assessor firm, Qualified Security Assessor Company, accredited ISO 27001, ISO 22301 and ISO 9001 Certification Body, accredited FedRAMP 3PAO and licensed CPA firm.

Abnormal Security

Abnormal Security’s cloud email security platform stops targeted attacks that bypass traditional solutions. We model the identity of both employees and external senders, profile relationships, and analyze email content. It sets up in minutes through API-based Office 365 and G Suite integration.

AC Global Risk (ACGR)

ACGR is a voice technology company using the power of an AI-enabled voice analytics platform to accurately and quickly identify risk levels and build trust. Global commercial and government customers use our technology to screen for hiring, insider threat, fraud, 3rd-party contractors & compliance.

Airlock Digital

Airlock Digital is a specialist application whitelisting software provider, developed for the sole purpose of making the application whitelisting process a much simpler, efficient and repeatable process.


ALTR’s Data Security as a Service embeds data monitoring, governance, and at-rest protection natively into application code to provide a portable data security model that is simpler and more effective. ALTR delivers assurance along with innovation without adding breach or compliance risk.


AppGate is bringing together a set of differentiated cloud- and hybrid-ready security and analytics products and services. These include AppGate SDP, the industry’s leading Software-Defined Perimeter solution, the Total Fraud Protection suite of risk-based authentication and digital threat protection capabilities and threat management and analytics offerings including the Brainspace digital investigations platform and the company’s Immunity range of offense-oriented software and adversary simulation services.


Appsian provides contextual data security and privacy solutions for ERP applications such as SAP and Oracle. Appsian solutions are designed for customers to mitigate the myriad of security and compliance risks associated with ERP data including hacking, fraud, theft and human error.

Arctic Wolf

Through the industry’s original Concierge Security™ Team, Arctic Wolf provides the 24x7 managed cybersecurity protection IT-constrained companies need to keep their valuable business data safe.

Area1 Security

Area 1 Security stops phishing attacks, the #1 cyberattack vector threatening all organizations. Google's Partner of the Year for Security, Area 1 is the industry’s first and only preemptive cybersecurity solution that defeats phishing attacks before they cause damage.

Armor Cloud Security

Armor is a global cybersecurity software company that simplifies protecting data & applications in private, public, or hybrid clouds. We combine workload protection, cloud-native sourced analytics, & other security data to provide unparalleled insight into threats facing organizations.


Atlassian unleashes the potential of every team. Our collaboration software helps teams organize, discuss and complete shared work. Teams at more than 144,000 customers, across large and small organizations use Atlassian’s project tracking, content creation and sharing, and service management products to work better together and deliver quality results on time. Learn more about products including Jira Software, Confluence, Trello, Bitbucket, Opsgenie, Jira Service Desk, and Jira Align at

Attivo Networks

Attivo Networks®, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network cyberattacks. For more information, visit


Avanan is a cloud email security platform that installs in one click. It uses AI and machine learning to block phishing, malware, and data leakage in the line of communications. Avanan is built on a patented, API-based architecture which adds a transparent layer of full-suite security.

AWAKE Security

The only advanced network traffic analysis company that delivers answers, not alerts. By combining artificial intelligence with human expertise, Awake models and hunts for both insider and external attacker behaviors, while providing full forensics across traditional, IoT and cloud networks.


Bitdefender is a global cybersecurity leader protecting over 500 million systems in more than 150 countries. Since 2001, Bitdefender innovation has consistently delivered award-winning security products and threat intelligence for the smart connected home, mobile users, modern businesses and their networks, devices, data centers and Cloud infrastructure. Today, Bitdefender and its Labs is also the provider vendor of choice, embedded in over 38% of the world’s security solutions. Recognized by industry, respected by vendors and evangelized by customers, Bitdefender is the cybersecurity company you can trust and rely on.


BlueVoyant offers robust cybersecurity solutions and services. Through our advanced Threat Intelligence, Third-Party Risk, Managed Security Services, and Professional Services, we excel in intelligence gathering, cybersecurity defense, and detection of attacks with response coupled with remediation.

BMC Software

BMC delivers software, services, and expertise to help more than 10,000 customers around the world run and reinvent their businesses with efficiency, security, and momentum for the future.

BTB Security

BTB Security helps organizations detect, defend, and defeat security breaches. From ethical hacking, threat and vulnerability assessments, managed detection and response, incident response and vCISO; our services are designed to improve the security posture for organizations of all sizes.


Checkmarx is the leader in software security solutions for enterprise software development. Checkmarx delivers the most comprehensive software security platform that unifies with DevOps and provides static and interactive application security testing, SCA and developer AppSec training.


Claroty's mission is to protect industrial control systems (ICS) and networks from cyberattacks, ensuring safe and continuous operation of the world's most critical infrastructures. Enjoy the benefits of connected control systems without compromising the safety and security of industrial assets.


Cloudflare is the leading performance and security company helping to build a better Internet. Today the company runs one of the world’s largest networks that powers more than 16 million Internet properties. More than 10 trillion Internet requests flow through Cloudflare’s global network each month.

Cofense Inc.

Cofense, formerly PhishMe, is uniting humanity against phishing. We enable thousands of enterprise customers worldwide to identify phishing threats in minutes and prevent breaches.


ColorTokens Inc. delivers a new-generation approach to cybersecurity by unifying network and endpoint security into a single, cloud-delivered ZeroTrust platform, empowering enterprises with continuous visibility and proactive protection across users, devices, applications, data and workloads.

Contrast Security

Contrast Security enables applications to automatically detect and fix vulnerabilities, identify attacks, & defend themselves. Contrast employs security instrumentation to strengthen applications before they deploy, protect in production and provide visibility throughout the application lifecycle.


Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”).

CyberProof Inc.

A security services company that intelligently manages your incident detection and response. Our advanced cyber defense platform enables operational efficiency with complete transparency to dramatically reduce the cost and time needed to respond to security threats and minimize business impact.


CyberSaint’s mission is to empower organizations to build a cybersecurity program that is as clear, actionable, and measurable as any other business function. CyberSaint's CyberStrong platform empowers teams, CISOs, and Boards to assess, measure, report, and mitigate risk with agility and alignment.


CyberVista provides premium cybersecurity and IT training for developing the workforce — both individuals and organizations. Through comprehensive training, organizations can better develop human capital, acquire the best talent, and prepare to respond to today's evolving threats and IT challenges.


Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to test, measure and optimize the effectiveness of your security controls any time, all the time.


Devo Security Operations helps teams analyze real-time data with historical and threat context for threat hunting, investigation, and IR.

Digital Defense, Inc.

Digital Defense’s Frontline.Cloud Security SaaS platform delivers foundational vulnerability and threat management solutions that streamline security programs. Our systems: Frontline Vulnerability Manager™, Frontline Web Application Scanning™, Frontline Active Threat Sweep™ and Frontline Pen Test™.

Digital Guardian

Digital Guardian is no-compromise data protection. The company’s cloud-delivered data protection platform is purpose-built to stop data loss by both insiders and outsiders on Windows, Mac and Linux. The platform performs across the corporate network, endpoints, and cloud applications.

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds.


Eclypsium is the industry’s leading enterprise firmware protection platform—providing a new layer of security to protect laptops, servers and network devices from firmware vulnerabilities, implants and back doors that are invisible to most organizations today.

Edgewise Networks

Edgewise is a microsegmentation platform that eliminates your network attack surface to stop the spread of malware and prevent lateral movement by attackers with a single click. Edgewise protects 100% of communications 10x faster and with 1/10th the number of policies compared to ANY competitor.


Egress provides human layer security, helping users receive, manage and share sensitive data securely and meet compliance requirements. Using contextual machine learning, the platform ensures data is protected relative to the risk of a breach and that files are delivered to the correct recipient.

ELC Information Security

ELC is a global provider of customized security training since 2007. We offer a suite of engaging, interactive cybersecurity, phishing, and privacy courses in multiple languages, including optional hosting with learner segmentation, and global 24/7 support. Ask about our new microtraining products.

EPAM Systems Inc

EPAM is a leading global product development, digital platform engineering, and top digital and product design agency.


Expanse is an enterprise software company and the leader in Internet Operations Management. Expanse improves visibility, governance, and IT operations, reducing risk associated with Internet Assets and enabling a secure digital transformation.

ExtraHop Networks

ExtraHop provides cloud-native network detection and response that helps you quickly investigate threats, deliver critical applications, and secure your investment in the cloud.

Fischer Identity

Fischer Identity provides the protection and predictability organizations need. Our IGA solutions enforce security and compliance across business operations with predicable cost and time-to-value.


ForgeRock, the leader in digital identity, delivers modern and comprehensive Identity and Access Management solutions for consumers, employees, and things to simply and safely access the connected world. Designed for any cloud environment, ForgeRock is used by over a thousand major brands worldwide.

Fusion Risk Management

Fusion Risk Management is a leading industry provider of cloud-based software solutions for business continuity, risk, IT disaster recovery, and crisis management. Its products and services empower organizations to make data-driven decisions with an integrated and agile approach.


GreatHorn safeguards cloud email from advanced threats like impersonations, credential theft, malware, and social engineering attacks by protecting organizations before, during, and after an email attack. GreatHorn works with your email security management team so that they can focus on other tasks.

GTB Technologies Data Security that Works

As the creator of DLP for IP, GTB offers the market’s only data security platform that’s able to prevent data breaches from insider and external threats. Delivered via the cloud or on-premises, including hybrid & managed services.


HackerOne is the #1 hacker-powered security platform. More than 1,400 organizations trust HackerOne to find critical software vulnerabilities.


HanSight is dedicated to changing the cyber security landscape by unifying SIEM, UEBA and NTA in a unified big data analytics platform. Our mission is to empower organizations to detect and prevent to cyber breaches, fraud, and insider threats, in real time and with greater accuracy.


The iboss cloud secures user Internet access on any device, from any location, in the cloud. Shift the focus from following perimeters to following users so that consistent cloud security is applied while users are in the office or on the road.


Illumio, a cybersecurity leader delivering segmentation solutions, prevents the spread of breaches inside data center and cloud environments.


Imperva is an analyst-recognized, cybersecurity leader—championing the fight to secure data and applications wherever they reside. Once deployed, our solutions proactively identify, evaluate, and eliminate current and emerging threat. Protect the pulse of your business.

Inky Technology

INKY leads the industry in mail protection powered by unique computer vision, artificial intelligence, & machine learning INKY's software uses these novel techniques to "see" each email much like a human does, to block phishing attacks that get through other systems.

Inspired eLearning

Inspired eLearning creates industry leading educational products that are designed to impact change on the behavioral level. We offer Security Awareness and Compliance training programs including phishing assessment software, a web-based Learning Management System, and more.

IronNet Cybersecurity

Founded in 2014 by GEN (Ret) Keith Alexander, IronNet is a global cybersecurity leader that is revolutionizing how enterprises, industries, and governments secure their networks by delivering the first-ever collective defense platform operating at scale.

Kenna Security

When your organization has millions of vulnerabilities, how do you know which pose the greatest risk? Kenna Security uses data science to deliver risk-based vulnerability management across your infrastructure and applications.


Keyfactor empowers forward-thinking companies to protect sensitive data and securely connect devices, machines, and applications critical to their business and people’s lives. Our customers are free to unlock the value from exponential growth in connectivity without compromise.

LastPass by LogMeIn

LastPass provides simple control and visibility across every entry point to your business through single sign-on, enterprise password management and multi-factor authentication in one unified solution.

Living Security

We are a cybersecurity training company, working to reduce cyber risk through impactful, human-focused training. Our training programs use science-based techniques including immersive learning and gamification to energize employees and motivate behavior change.


Lookout is a cybersecurity company for the post-perimeter, cloud-first, mobile-first world. Powered by the largest dataset of mobile code in existence, the Lookout Security Cloud provides visibility into the entire spectrum of mobile risk.


MediaPRO security and privacy training solutions are used by organizations of all sizes to protect sensitive data, demonstrate compliance, and reduce the risk to their reputation and bottom line. With MediaPRO, it’s easy to keep employees engaged and track program effectiveness.

Merlin Cyber

Constantly measure and score your risk and compliance against manufacturers’ best practices and compliance frameworks. Get alerts to gaps in coverage and see how deviations raise your threat risk. The cybersecurity solutions that organizations need to protect their most critical business assets.


MetricStream is the market leader in GRC. Through our enterprise platform and cloud software, we enable enterprises across industries to drive exceptional business performance based on a foundation of good governance, trust, and integrity.

Morphisec, Inc.

Morphisec fundamentally alters the cyber security landscape with its moving target defense technology, which keeps organizations consistently ahead of attacks. Morphisec Endpoint Threat Prevention blocks zero-days and advanced attacks in real time, before they cause any damage.

NAVEX Global

A complete solution for automating risk, ethics and compliance, NAVEX Global's platform is made up of five core products designed to work independently or together.

NopSec Inc.

NopSec provides ML-based vulnerability risk prioritization and remediation solutions to help businesses proactively protect their IT environments from security breaches.


NormShield enables enterprises to monitor cyber risk posture and perform nonintrusive cyber risk assessments of suppliers, subsidiaries and target acquisitions. Scorecards provide standards-based letter grades on various risks along with mitigation data to address each risk in priority order.


NorthStar enables organizations to easily incorporate threat intelligence and business risk into their vulnerability management program. We provide advanced vulnerability prioritization technology that automates the tedious, manual and error-prone process of risk and vulnerability prioritization.

Nozomi Networks

Nozomi Networks is the leader of industrial cybersecurity, delivering the best solution for real-time visibility to manage cyber risk and improve industrial operations resilience. With one solution, customers gain advanced cybersecurity, improved operational reliability and easy IT/OT integration.

Nucleus Security

Nucleus automates vulnerability analysis, prioritization, and triage to help your organization make better risk decisions and mitigate vulnerabilities much faster than they can today.


ObserveIT, the leader in Insider Threat Management delivers complete visibility into user and data activity to stop insider threats.

Onapsis Inc.

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats.


OneLogin is the identity platform for simple, secure, scalable and smart experiences that connect people to technology. With OneLogin, customers can connect all of their applications, identify potential threats and act quickly, so you can focus on what matters most-growing your business.


Onspring provides intelligent automation and real-time reporting for teams looking to gain efficiency and transparency across their business. Flexibility in our no-code platform means customers can create workflows, reports, and dashboards on their own for better control and decision making.

Open Systems

Open Systems is a secure access service edge (SASE) pioneer delivering a complete solution to network and security. Open Systems’ managed services offer cloud-native architecture, secure intelligent edge, hybrid cloud support, 24x7 operations by level-3 engineers, and predictive analytics.


PacketViper provides cyber deception solutions with automated threat detection, prevention and response for IT and OT networks. It uses agentless deception internally and externally to stop outside threats from getting in and manage risk from threats already on the network, preventing harm.


Paladion is a next-generation cybersecurity provider to technology, manufacturing, and cloud-first companies. They are consistently recognized for their Managed Detection and Response, Cloud security, and VM services, which is anchored by their patented Artificial Intelligence platform – AI.saac.

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life.


PerimeterX is the leading provider of application security solutions that keep your business safe in the complex digital world. The world’s largest and most reputable websites and mobile applications count on PerimeterX to safeguard their consumers’ digital experience.


PlainID Inc. is the recognized leader of Policy-Based Access Control (PBAC). Our simple, straightforward solution to authorization management enables organizations to govern, administer and control who can access assets across their digital landscape.


With Pluralsight’s technology skills platform, you can upskill your teams into modern tech roles, speed up release cycles and build reliable, secure products.

Preempt Security

Preempt Security delivers a modern approach to authentication and securing identity in the enterprise. Using patented technology for Conditional Access, and based on identity, behavior, and risk, Preempt helps enterprises optimize ID hygiene and stop attacks in real-time before they impact business.


ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation.

Pulse Secure

Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services. Over 23,000 enterprises and service providers entrust Pulse Secure to empower their mobile workforce to securely access applications and information from any device, anywhere.

Radiant Logic

Based on advanced virtualization, RadiantOne FID federated identity and directory service delivers customizable identity views built from disparate data silos, to successfully secure WAM/cloud/federation deployments.

Recorded Future

Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams by informing decisions in real time with contextual, actionable intelligence.


By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal, enterprises improve their resilience to security events by understanding what’s on their networks, how it’s all connected, and the associated risk.


Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. Taking a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access Just-In-Time. Nothing else makes PAM this easy.

RevCult- Salesforce Security & Goverance

"Elegantly Simple" Security & Privacy solutions for Salesforce. RevCult offers 5-star AppExchange security and privacy products and services that allow clients to continue to grow on the Salesforce platform with confidence their data is protected.

RiskIQ, Inc.

Cataloging, mapping, and enriching the structure of the internet for the past decade, RiskIQ has developed unmatched internet visibility, allowing organizations to accurately discover and inventory their digital attack surface and monitor it for outside-the-firewall threats.


RiskLens, the leading provider of cyber risk quantification (CRQ) and cyber risk management solutions, which included SaaS and professional services offerings, helps cyber risk leaders build programs that manage cybersecurity risk from the business perspective by quantifying it in financial terms.


RSA offers business-driven security solutions that provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, sophisticated insights and coordinated actions. RSA solutions are designed to effectively reduce business risk, fraud, and cybercrime.


SafeBreach is the leader in Breach & Attack Simulation. The groundbreaking platform provides a “hacker's view” of an enterprise’s security posture to proactively predict attacks, validate security controls, improving SOC analyst response by automatically executing thousands of breach methods.

Schellman & Company, LLC

Schellman is a leader in attestation and compliance assessments and is the only company in the world that is a CPA firm, PCI QSA, an ISO Certification Body, HITRUST CSF Assessor, a FedRAMP 3PAO, and an APEC AA. This allows clients to achieve multiple compliance objectives through a single assessor.


Get insight into your security portfolio investment in technology and people. What works? What doesn’t? And why. All within the context of your business impact. The SCYTHE platform allows you to bound the attack space to provide real data insights.


SDG’s IT security & risk management solutions help businesses minimize threats & risks to critical corporate information and related assets. We help clients realize their business vision through a mix of actionable strategic advice, expert systems integration, & relevant technology recommendations.


Sectigo is the industry-leading provider of PKI & digital identity management solutions that allow organizations to secure their websites, connected devices & applications. Recognized for its award-winning technology & customer support, Sectigo meets the needs of securing today’s digital landscape.


The Securonix platform delivers positive security outcomes with zero infrastructure to manage. It provides analytics-driven next-generation SIEM, UEBA, and security data lake capabilities as a pure cloud solution, without compromise. For more information visit


SecZetta solutions help organizations execute risk-based identity access and lifecycle strategies for diverse non-employee populations. With its purpose-built, easy-to-use solutions, organizations can enable commercial initiatives, support regulatory compliance, and reduce third-party risk.


SentinelOne delivers autonomous endpoint protection that successfully prevents, detects and responds to attacks across all major vectors. SentinelOne applies AI to automatically eliminate threats in real time and provides full visibility across networks directly from the endpoint.

Silo by Authentic8

Founded in 2010, Authentic8 is redefining how the browser is used with Silo, a secure, remote browser in the cloud designed to insulate and isolate web data.


Sixgill uses automation to provide cyber threat intelligence on the deep, dark, and surface web. It is the only vendor to automate all phases of the intel cycle — collection, analysis and dissemination of data — providing faster access to relevant data with lower dependency on human interaction.

Skybox Security

With Skybox, you’re able to control security without restricting business agility. Our cybersecurity management solutions reduce complexity, minimize risk and take security to the next level.


Sonatype, the inventors of software supply chain automation, helps more than 1,000 enterprises harness the good that open source offers, without the risk. It’s Nexus Platform combines in-depth intelligence with real-time remediation to automate and scale OSS governance across the DevOps pipeline.

Stealthbits Technologies

Stealthbits is a customer-driven cybersecurity software company focused on protecting an organization's sensitive data & the credentials attackers use to steal that data. Leveraging our technology, you can reduce security risk, fulfill compliance requirements, & decrease operational expense.


StorMagic develops virtual storage appliance (VSA) solutions for virtual server environments. Our software simplifies the deployment & management of storage area networks in distributed, virtualized IT environments and significantly reduces costs for achieving highly-available on-site applications.


Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in application security, provides static analysis, software composition analysis, and dynamic analysis solutions.

Telos Corporation

Telos Corporation empowers and protects the world’s most demanding enterprises with solutions and services for cyber security to defend your systems, networks, and information and secure mobility to enable you to work with confidence across and beyond the enterprise.

Terranova Security

Terranova Security is a global leader in security awareness training, with 1000+ successful phishing and security awareness programs spanning over 6 million users. The people-centric security awareness solution is available in 40 languages and includes industry’s richest and most interactive content.

Thinkst Canary

Most companies find out way too late that they've been breached. Thinkst Canary changes this. Canaries deploy in minutes and provide you high fidelity notifications when your other controls have failed. Deployed on all 7 continents and loved by some of the smartest security teams in the world.


Designed by analysts but built for the team, ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, & workflows in a single platform. To learn more about our TIP and SOAR solutions, visit


TokenEx's enterprise-class cloud-based tokenization platform specializes in reducing risk, minimizing scope, and simplifying compliance. We can secure and desensitize any structured data set, offer omnichannel acceptance, and send data to any endpoint for maximum utility, agility, and flexibility.


Venafi is the cybersecurity market leader of machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, code signing, mobile and SSH.

Wallarm, Inc.

Wallarm AI-powered security platform protects APIs and applications with adaptive WAF and automated application security testing across microservices, public, and private clouds. Application-specific dynamic WAF rules proactively test for vulnerabilities for improved detection accuracy.


Wandera, a cloud security company, protects modern enterprises beyond the traditional perimeter. When remote users access applications from their smartphones or laptops, Wandera’s unified security cloud provides real-time threat protection, content filtering, and zero-trust network access.


Yubico's core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services.

Get the insights and solutions you need