Exhibitor Directory


The Gartner Security & Risk Management Summit will help you develop a “short list” of technology and service providers who can meet your particular needs. You’ll receive exclusive access to some of the world’s leading technology and service providers in a variety of settings.



The Balbix predictive breach-risk platform is the industry’s first system to leverage advanced AI to provide enterprises with comprehensive and continuous predictive risk calculations visualized via a searchable, clickable risk heat-map. Balbix’s solution is designed for CIOs, CISOs and IT security teams who wish to proactively understand their breach risk and cyber-resilience, delivering contextually relevant information per viewer. Balbix can predict critical breach scenarios, help users prioritize security operations and projects, and improve cyber-resilience.

Carbon Black

Carbon Black (NASDAQ: CBLK) is a leader in endpoint security dedicated to keeping the world safe from cyberattacks. The company’s big data and analytics platform, the CB Predictive Security Cloud (PSC), consolidates endpoint security and IT operations into an extensible cloud platform that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analyzing billions of security events per day across the globe, Carbon Black has key insights into attackers’ behavior patterns, enabling customers to detect, respond to and stop emerging attacks. More than 5,000 global customers, including 34 of the Fortune 100, trust Carbon Black to protect their organizations from cyberattacks. The company’s partner ecosystem features more than 500 MSSPs, VARs, distributors and technology integrations, as well as many of the world’s leading IR firms, who use Carbon Black’s technology in more than 500 breach investigations per year. Carbon Black and CB Predictive Security Cloud are registered trademarks or trademarks of Carbon Black, Inc. in the United States and/or other jurisdictions.


In a world with more data, more users, and more services, there's more to protect. Meanwhile, cyber threats are constantly evolving, getting smarter and more sophisticated. What's the answer? The traditional approach has been to bolt on the latest threat protection product in the hope that adding to the patchwork of security solutions does the trick. It's time to put cybersecurity above everything. Cisco gives you the scope, scale, and capabilities to keep up with the complexity and volume of threats with its integrated portfolio and industry-leading threat intelligence. Putting security above everything helps you innovate while keeping your assets safe. Cisco prioritizes security in all that we do. Only with Cisco can you attain effective network security to face tomorrow's evolving threats.

Comodo Cybersecurity

In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers globally.


CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture. CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 1 trillion events per week from millions of sensors deployed across 176 countries, uniquely providing crowdsourced protection for the entire customer community.


Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. The company has over 900 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.


For over 30 years F-Secure’s experts and technology have stopped many of the world’s most advanced cyber attacks. We’re one of the only companies in the world providing solutions built on input from cybersecurity consultants working in some of the most challenging security environments, including finance, telecommunications, and aviation. Our portfolio includes a comprehensive range of solutions; everything from risk assessment, threat hunting and incident detection & response to endpoint protection.


Forcepoint is transforming cybersecurity by focusing on what matters most – people’s behavior as they interact with critical data and systems. This human-centric approach frees employees to innovate by understanding the normal rhythm of user behavior and the flow of data in and out of an organization and only enforces security policies when elevated risk is detected at an individual level. Forcepoint’s behavior-based solutions provide risk-adaptive security to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint helps secure thousands of enterprise and government customers in more than 150 countries.

Google Cloud

Google Cloud is widely recognized as a global leader in delivering a secure, open, intelligent, and transformative enterprise cloud platform. Our technology is built on Google’s private network and is the product of nearly 20 years of innovation in security, network architecture, collaboration, artificial intelligence, and open source software. We offer a simply engineered set of tools and unparalleled technology across Google Cloud Platform and G Suite that help bring people, insights, and ideas together. Customers across more than 150 countries trust Google Cloud to modernize their computing environment for today’s digital world.


KnowBe4 is the world’s largest integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using real-world mock attacks, engaging interactive training, continuous assessment through simulated phishing, and vishing attacks and enterprise-strength reporting. Tens of thousands of organizations worldwide use KnowBe4’s platform to mobilize their end users as a last line of defense and enable them to make better security decisions.


MobileIron is redefining enterprise security with the industry’s first mobile-centric, zero trust platform built on the foundation of unified endpoint management (UEM) to secure access and protect data across the perimeter-less enterprise. Zero trust assumes that bad actors are already in the network and secure access is determined by a “never trust, always verify” approach. MobileIron goes beyond identity management and gateway approaches by utilizing a more comprehensive set of attributes before granting access. A mobile-centric, zero trust approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to a device or user. For more information, visit: www.mobileiron.com.

NTT Security

NTT Security is the specialized security company and center of excellence in security for NTT Group. NTT Security deliver specialized managed security services and consulting services from initial assessment through to strategic program planning, hands-on deployment and 24/7 management and support through NTT Group (NTT Communications, NTT DATA, and Dimension Data).


Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,600 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to securely connect their people and technology.


OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management. More than 2,500 customers use OneTrust to implement their privacy programs, automatically generating the specific record keeping needed to demonstrate compliance with the world's privacy regulations. To learn more, visit OneTrust.com.

OneTrust Vendor Risk Management

OneTrust Third-Party Risk Management Software is the way the world manages vendor security and privacy risk at scale. Through a centralized platform, security and privacy professionals can assess, exchange and monitor third-party risk programs for the CCPA, GDPR, ISO27001 and hundreds of the world's privacy regulations and security frameworks. OneTrust Third-Party Risk Management enables teams to automate vendor risks assessments via industry-standard templates, free OneTrust vendor chasing services and bring-your-own assessment capabilities. With Vendorpedia™ Third-Party Risk Exchange, access thousands of vendor security and privacy profiles, pre-completed assessments and tiered assessment validation. Teams can leverage ongoing third-party threat monitoring, including privacy and security scanning, upstream assessment updates and ongoing compliance alerts. For more information about OneTrust Third-Party Risk Management, visit onetrust.com/VRM. To see how OneTrust powers compliance across privacy, security, third-party risk and marketing teams, visit onetrust.com.


Proofpoint is a leading cybersecurity company that protects organizations’ biggest risks and greatest assets: their people. With an integrated suite of cloud-based threat, information and user protection solutions, we help organizations around the world mitigate their most critical security and compliance risks. More than half of the Fortune 100 trust us to stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.


ReliaQuest custom-architects individualized security environments that get smarter over time. By combining existing tools and technologies with the reliability of co-management and the speed and agility of Managed Detection and Response, ReliaQuest transforms organizations into their own security platforms – providing unmatched visibility while normalizing the security spend. ReliaQuest operates 24/7/365 from Security Operations Centers in Tampa, FL, and Las Vegas, NV. ReliaQuest’s model is recognized as the emerging standard for large and complex organizations.


RiskRecon’s continuous monitoring solution delivers risk-prioritized action plans that enable precise and efficient elimination of your most critical third-party security risks. Only our SaaS delivers the data-driven evidence necessary for you to pinpoint security weaknesses within a vendor and across your third-party portfolio. Rather than simply provide a laundry list of issues, RiskRecon automatically quantifies and describes the true risks associated with every vendor’s IT assets. Our solution employs passive, direct analysis of each organization’s Internet-facing systems to create detailed IT, security, and asset valuation profiles. Using these profiles, RiskRecon automatically produces risk-prioritized plans based on the severity of security issues present and the impact if the system is compromised. Only RiskRecon enables clients to build a scalable, third-party risk reduction program that compresses remediation cycles, improves analyst productivity, and ensures constructive vendor collaboration. With our SaaS solution, you can monitor large third-party portfolios and make efficient, accurate decisions based on objective findings. Learn more at www.riskrecon.com


Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.


A10 Networks

A10 Networks (NYSE: ATEN) is a provider of intelligent and automated cybersecurity solutions, providing a portfolio of high-performance secure application solutions that enable intelligent automation with machine learning to ensure business critical applications are secure and always available.

AT&T Cybersecurity

AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.


Agari is the only cloud-native solution that uses predictive AI to stop advanced email attacks. Winner of Best Email Security Solution by SC Magazine in 2018, the Agari Email Trust Platform™ prevents ransomware, ATO, phishing, BEC and other identity deception attacks, restoring trust to digital channels for businesses, governments, and consumers worldwide. Learn more at www.agari.com.


BeyondTrust is the worldwide leader in Privilege-Centric Security, offering the most seamless and straightforward approach to preventing data breaches related to stolen credentials, hijacked insider accounts, and misused privileges. Our privileged access management platform is the most extensible on the market, enabling organizations to easily scale their privilege security programs as threats evolve across endpoint, server, cloud and network device environments. Only BeyondTrust unifies the industry’s broadest set of built-in capabilities with centralized management, reporting and analytics, empowering leaders to take decisive and informed actions to defeat attackers. This is backed by a flexible design that simplifies integration with other best-of-breed solutions and boosts the value of our customers’ IT security investments. With BeyondTrust, organizations gain the visibility and control they need to confidently reduce risk, maintain productivity, and stay out of the headlines. We are trusted by over 4,000 customers and a global partner network. Learn more at www.beyondtrust.com.

BitSight Technologies

BitSight is the most widely adopted Security Ratings company with a mission to change the way the world addresses cyber risk. Transforming data into insights, BitSight enables security and risk leaders to make more informed security decisions that result in overall improved security outcomes for a safer, more resilient digital world. BitSight provides broad transparency of security incidents across the internet, enabling customers to take quick action with objective, verifiable and scalable security performance metrics. Participants in the BitSight community gain access to the largest, most-engaged network of security and risk leaders around the world, collectively working together to reduce global systemic cyber risk for a safer, more resilient digital world. Founded in 2011, BitSight helps organizations manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk. Seven of the top 10 cyber insurers, 20% of Fortune 500 companies, and 3 of the top 5 investment banks rely on BitSight to manage cyber risks.


Bitdefender is a global security technology company that provides cutting edge end-to-end cyber security solutions and advanced threat protection to more than 500 million users in more than 150 countries. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a provider of choice in both hybrid infrastructure security and endpoint protection. Through R&D, alliances and partnerships, Bitdefender is trusted to be ahead and deliver robust security you can rely on.


Bitglass, the Next-Gen CASB company, is based in Silicon Valley with offices worldwide. The company’s cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.


Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. Cofense enables thousands of global organizations to stop attacks in progress faster and stay ahead of breaches. Learn more at www.cofense.com.


CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 100, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.


Cybereason is the leader in cybersecurity data analytics, offering EDR, next-gen AV, and active monitoring services. Founded by elite intelligence professionals trained in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason Deep Hunting Platform delivers endpoint detection and response (EDR), next-generation antivirus (NGAV), managed threat hunting, and threat intelligence — all in one solution and one single lightweight sensor. Built using Cybereason's proprietary cybersecurity data analytics architecture, the platform focuses on collecting and analyzing behavioral data and correlating disparate data points to identify malicious operations and facilitate immediate action. The Cybereason Deep Hunting Platform doesn't simply secure your data, it leverages your data to secure.


Cyxtera is the secure infrastructure company. By combining a modern, hybrid-ready information security fabric with an uncommonly diverse and distributed footprint of 57 world-class data centers, Cyxtera delivers a secure platform for connecting and protecting dedicated infrastructure, private clouds and public clouds. For enterprises, government agencies and service providers, Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security. Simply put, we’re a new kind of data center company—one with security integrated as a core service offering into the facilities that sit at the nexus of enterprise IT and the cloud. And we’re a new kind of security company—with solutions built for the way we run our applications today.


ESET is a global cybersecurity provider, #1 endpoint security partner from the European Union, trusted by 110 million users and official protector of Google Chrome. With 13 R&D centers on 4 continents, our malware researchers strive 24/7 to build fortified multilayered security solutions neutralizing existing and future threats.


Fasoo provides unstructured data security and enterprise content platforms that enable our customers to protect, control, trace and analyze critical business information while enhancing productivity. Fasoo has successfully retained our leadership in the unstructured data security market by deploying enterprise-wide solutions for more than 1,500 organizations globally, securing more than 2.7 million users. Fasoo is experiencing continuous improvement in its global market position, based on our unique technology, ongoing R&D and strategic approach to comprehensive product capabilities by extending our core security capabilities into content-centric collaboration, behavioral analytics and information security consulting services.

Forescout Technologies

Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environment and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, 100-percent real-time discovery and classification, as well as continuous posture assessment. As of December 31, 2018, 3,300 customers in over 80 countries rely on Forescout’s infrastructure-agnostic solution to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity. Learn how at www.forescout.com.


Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application or mobile environments, scaling from the edge to the core and from IoT devices to the cloud. Fortinet ranks #1 in the most security appliances shipped worldwide, and more than 385,000 customers trust Fortinet to protect their businesses


Galvanize builds award-winning, cloud-based security, risk management, compliance, and audit software to drive change in some of the world’s largest organizations. We’re on a mission to unite and strengthen individuals and entire organizations through the integrated HighBond software platform. With more than 7,000 customer organizations in 140 countries, Galvanize is connecting teams in 60% of the Fortune 1,000, 72% of the S&P 500, and hundreds of government organizations, banks, manufacturers, and healthcare organizations. Whether these professionals are managing threats, assessing risk, measuring controls, monitoring compliance, or expanding assurance coverage, HighBond automates manual tasks, blends organization-wide data, and broadcasts it in easy-to-share dashboards and reports. But we don’t just make technology—we provide tools that inspire individuals to achieve great things and do heroic work in the process. Visit our booth or weGalvanize.com to learn more. Follow us on Twitter, LinkedIn, or see what we’re up to on Instagram.

Hitachi ID Systems

Hitachi ID Systems delivers access governance and identity administration solutions to large and mid-size organizations globally. Hitachi ID solutions are used for streamlining and securing the management of identities, security entitlements and credentials, for both business users and privileged accounts, on-premises and in the cloud. The Hitachi ID Identity and Access Management Suite is the only fully integrated solution which includes Identity Manager, Group Management, Password Manager and Privileged Access Manager. The Hitachi ID Suite is well known in the marketplace for high scalability, fault tolerance, a pragmatic design and low total cost of ownership (TCO). It is designed to simplify and secure the management of elevated access privileges, user and group lifecycles from onboarding until termination, across most systems and applications. Hitachi ID Mobile Access allows access to IAM services anytime, anywhere. The pre-configured reference-built Identity Express shortens implementation time and significantly reduces costs.


Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration.


At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certifications and skills development training. We also empower all employees with security awareness and training to stay cybersecure at work and home. Founded by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win. Learn more at infosecinstitute.com.


IntSights is redefining cyber security with the industry's first and only enterprise threat management platform that transforms tailored threat intelligence into automated security operations. IntSights groundbreaking data-mining algorithms and unique cyber reconnaissance capabilities continuously monitor an enterprise's external digital profile across the surface, deep and dark web, categorize and analyze tens of millions of potential threats, and automate the risk remediation lifecycle - streamlining workflows, maximizing resources and securing business operations. This has made IntSights' one of the fastest growing cybersecurity companies in the world. IntSights has offices in Amsterdam, Boston, Dallas, New York City, Singapore, Tel Aviv and Tokyo


McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. For businesses, McAfee helps orchestrate holistic cybersecurity environments that work smarter, not harder. For consumers, McAfee helps by securing their digital lifestyle at home and away. www.mcafee.com


MediaPRO security and privacy training solutions are used by organizations of all sizes to protect sensitive data, demonstrate compliance, and reduce the risk to their reputation and bottom line. With MediaPRO, it’s easy to keep employees engaged and track program effectiveness because only MediaPRO comes with CourseFlexTM technology. CourseFlex enables you to automatically personalize training for each employee (test out of topics), take advantage of out-of-the-box courses as-is, or easily tailor them to meet your organization’s priorities. Whether you’re looking to more effectively demonstrate compliance, stop phishing attacks, or want a best-in-class security awareness program, MediaPRO makes training fun, fast and impactful. MediaPRO has been named a leader in Gartner’s Magic Quadrant for Security Awareness Computer-based Training for five years in a row.

Menlo Security

Menlo Security is a visionary in the Gartner Magic Quadrant for Secure Web Gateway and identified as providing a new architectural approach with its isolation-based SWG platform. The new approach executes webpages on isolated browsers and mirrors the rendering to the end user’s machine. The isolation-based solution also protects against phishing and malicious email attachments by isolating links and allowing attachments to be viewed using their content disarm and rendering capability. The isolation SWG service is delivered by a global cloud with integration capabilities with enterprise cloud transformation architectures. Menlo Security is trusted by major global and Fortune 500 businesses, including 7 of the 10 largest banks and 4 out of the 5 largest credit card issuers in the world.

Micro Focus

Micro Focus is a global software company with 40 years of experience in delivering and supporting enterprise software solutions that help customers innovate faster with lower risk. By applying proven expertise in software and security, we enable customers to utilize new technology solutions while maximizing the value of their investments in critical IT infrastructure and business applications. As a result, they can build, operate and secure the IT systems that bring together current business logic and applications with emerging technologies–in essence, bridging the old and the new–to meet their increasingly complex business demands. Micro Focus employs more than 4,000 staff in over 90 global locations and a customer base exceeding 20,000, including 91 of the Fortune Global 100 companies. Micro Focus is listed on the London Stock Exchange (LSE:MCRO) and has annual revenues of approximately $4bn. Its headquarters are in Newbury, United Kingdom.


Founded in 1975, Microsoft (Nasdaq “MSFT”) is a Cloud first, Mobile first company delivering technologies that help businesses worldwide take advantage of mobile, enterprise social, and cloud computing trends to drive growth. Microsoft helps you to move to the cloud on your terms; getting the most value from your existing IT investments while giving you the flexibility to respond quickly to changing business needs www.Microsoft.com

Mimecast North America

Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Known for safeguarding customers against dangerous email, Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive, and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure. Our customer engagement teams and Security Operations Center help organizations of all sizes with proactive support and actionable intelligence. Our easy to use and deploy cybersecurity platform with open APIs makes customers’ existing investments more valuable and teams smarter. The collective intelligence gathered across our global customer base and strong partner network provides a community defense that helps make the world a more resilient place. www.mimecast.com

Morphisec, Inc.

Morphisec offers an entirely new level of innovation to customers in its Endpoint Threat Prevention product, delivering protection against the most advanced cyberattacks. The company’s patented Moving Target Defense technology prevents threats others can’t, including APTs, zero-days, ransomware, evasive fileless attacks and web-borne exploits. Morphisec provides a crucial, small-footprint memory-defense layer that easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient prevention stack that is truly disruptive to today’s existing cybersecurity model.


Netskope is the leader in cloud security — we help the largest organizations in the world take full advantage of the cloud and web without sacrificing security. Our patented Cloud XD technology goes deeper than any other security provider to quickly target and control activities across thousands of cloud services and millions of websites. Delivered from a unified cloud-native platform, our customers benefit from 360-degree data and threat protection that works regardless of location or device type. At Netskope, we call this smart cloud security.

One Identity

One Identity, a Quest Software business, helps organizations get identity and access management (IAM) right. With a unique portfolio of offerings including identity governance, access management, privileged management, and identity as a service, One Identity helps organizations reach their full potential, unimpeded by security, yet safeguarded against threats. www.oneidentity.com


Rapid7 (Nasdaq: RPD) is advancing security with visibility, analytics, and automation delivered through our Insight cloud. Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Over 7,200 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organizations. For more information, visit our website, check out our blog, or follow us on Twitter.


SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.


Sectigo (formerly Comodo CA) provides web security products that help customers protect, monitor, recover, and manage their web presence and connected devices. As the largest commercial Certificate Authority trusted by enterprises globally for more than 20 years, and more than 100 million SSL certificates issued in over 200 countries, Sectigo has the proven performance and experience to meet the growing needs of securing today’s digital landscape. Follow Sectigo on LinkedIn or Twitter @SectigoHQ.


Secureworks is 100% focused on cybersecurity. In fact, it's all we do. For nearly two decades, we've committed to fighting the adversaries in all their forms and ensuring that organisations like yours are protected. Secureworks enriches your defences with intelligence from the 250-billion cyber events we observe each day, across our 4,400 clients in more than 55 countries. By investing in supervised machine learning and analytics, as well as the brightest minds in the industry, we've successfully automated and accelerated event detection, correlation, and contextualisation. That means you can identify threats more quickly and take the right action at the right time to reduce your risk.


SecurityScorecard provides instant visibility into enterprise security posture as well as the cyberhealth of all vendors and partners in any organization’s ecosystem. The platform uses trusted commercial and open-source threat feeds, and nonintrusive data collection methods, to quantitatively evaluate and continuously monitor the security posture of thousands of organizations worldwide. SecurityScorecard delivers the most accurate, transparent, and comprehensive security risk ratings available for small to large enterprises in every industry sector.

ServiceNow, Inc

ServiceNow makes work, work better for people. Our cloud‑based platform and solutions deliver digital experiences that help people do their best work. Now, security, risk and IT teams can identify and prioritize security incidents, vulnerabilities, and enterprise risks quickly, and respond faster using digital workflows, automation, and orchestration. ServiceNow® Security Operations is a security orchestration, automation, and response engine built on the Now Platform®. Workflows and business prioritization help security and IT teams respond faster. ServiceNow® Governance, Risk, and Compliance transforms inefficient processes through an integrated risk program built on the Now Platform®. Continuous monitoring, prioritization, and automation ensure rapid identification and response to risks.


Siemplify, the leading independent security orchestration, automation and response (SOAR) provider, is redefining security operations for enterprises and MSSPs worldwide. The Siemplify platform is an intuitive workbench that enables security teams to manage their operations from end to end, respond to cyberthreats with speed and precision, and get smarter with every analyst interaction. Founded in 2015 by Israeli Defense Forces experts with extensive experience running and training numerous security operations centers worldwide, Siemplify is headquartered in New York, with offices in Tel Aviv. Visit us at siemplify.co or follow us on Twitter at @siemplify


Sophos makes IT security simple with next generation solutions that protect networks, servers and devices, wherever they are. Today, more than 100 million users in 150 countries and a global network of channel partners trust Sophos to deliver simple solutions to complex security challenges. Focused on innovation and backed by a global network of SophosLabs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain and manage, enabling organizations to focus on performance and growth. Sophos – Cybersecurity made Simple.

Splunk, Inc.

Splunk Inc. (NASDAQ: SPLK) was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Organizations use market-leading Splunk solutions with machine learning to monitor, investigate and act on all forms of business, IT, security, and Internet of Things (IoT) data. Use Splunk software in the cloud and on-premises to improve service levels, reduce operations costs, mitigate security risks, enable compliance, enhance DevOps collaboration and create new product and service offerings. Join millions of passionate users by trying Splunk software for free: www.splunk.com/free-trials.


Delivering comprehensive penetration testing with actionable results, securing continuously with the world's most skilled ethical hackers and AI technology, we are Synack, the most trusted Crowdsourced Security Platform. Headquartered in Silicon Valley with regional offices around the world, Synack has conducted thousands of crowdsourced penetration tests to protect global brands. Synack's investors represent the largest names in technology and security, including Google Ventures, M12 (formerly Microsoft Ventures), Hewlett Packard Enterprise, Intel Capital, Kleiner Perkins, and GGV Capital. For more information, please visit www.synack.com or check out our 5-star reviews at https://www.gartner.com/reviews/.

Tanium Inc.

Tanium gives organizations the power to secure, control, and manage all endpoints across the enterprise within seconds. With the unprecedented speed, scale, and simplicity of Tanium, security and IT operations teams now have complete and accurate information on their endpoints to protect against threats and realize efficiency in IT operations.

Tenable, Inc.

Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies.


Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place. To learn more about our threat intelligence platform (TIP) or security orchestration, automation, and response (SOAR) solutions, visit www.ThreatConnect.com.


Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries.


The world is changing quickly as advances in cloud, mobile and edge computing, IoT and AI unlock innovation at unprecedented speed. For enterprises, embracing disruptive change while keeping everything running smoothly is a constant challenge, resulting in imperfect compromises between delivering today and investing for tomorrow. VMware software connects, manages, automates and secures the world’s digital infrastructure to reliably deliver the apps, services and experiences transforming business and society. The company enables organizations to flex and harness new technology quickly, without disrupting operations. VMware streamlines the journey for customers to become digital businesses that deliver better experiences to their customers and empower employees to do their best work, in turn driving growth. VMware’s compute, cloud, mobility, networking and security offerings provide a dynamic and efficient digital foundation to more than 500,000 customers globally, aided by an ecosystem of 75,000 partners, so businesses can embrace innovation at scale for competitive advantage.

ValueMentor, an Ampcus Company

ValueMentor, an Ampcus company, is a Cyber Security Partner that helps organizations identify threats, manage compliance, close gaps and thereby effectively manage risks. ValueMentor’s ability to innovate helps the continued process of thinking outside the box in adapting business processes to specific needs, increasing efficiency and delivering secure precise solutions. We help organizations achieve this by offering Risk & Compliance Services, PCI DSS Compliance, Penetration Testing, Cyber Engineering, Security Testing & Managed Security services. ValueMentor has initiated, 25+ PCI projects, 75+ consulting projects, 300+ application security assessments, and resolved over 4000+ vulnerability assessments for more than 150 clients, spanning 17 countries across many insdustries. Our ultimate success is defined by our ability to maximize the potential of our People, the Process and varying Technology in the solutions we provide to our customers. As such, maintaining these components is critical to establishing a foundation for success.

Varonis Systems

Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data on-premises and in the cloud: sensitive files and emails; confidential customer, patient and employee data; financial records; strategic and product plans; and other intellectual property. The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity, perimeter telemetry, and user behavior; prevents and limits disaster by discovering, classifying and locking down sensitive, regulated and stale data; and efficiently sustains a secure state with automation. With a focus on data security, Varonis serves a variety of use cases including data protection, threat detection and response, and compliance. Varonis started operations in 2005 and, as of December 31, 2018, had approximately 6,600 customers worldwide — comprised of industry leaders in many sectors including technology, consumer, retail, financial services, healthcare, manufacturing, energy, media, and education.

Vectra AI

Vectra® is the world leader in applying artificial intelligence to detect cyberattackers in real time and hunt for threats before they do damage. Powered by AI, Vectra and its flagship Cognito™ platform enable the world’s most consequential enterprise organizations to automatically detect hidden cyberattacks and empower threat hunters to conduct conclusive incident investigations. Comprehensive, enterprise-wide cyberattack detection and threat hunting are mandatory in today’s vulnerable data environments and the stakes have never been higher. No other company comes close to Vectra in proactively hunting down cyberattackers and reducing business risk. Our core team consists of threat researchers, white hats, data scientists, security engineers, and UI designers. We’re passionate and committed to making a difference in a world where cybersecurity is a paramount concern, and we constantly push the boundaries of what’s possible to drive the next-generation of security.


Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world.


Protect against today’s cyber threats—and prepare for what’s next. Today’s enterprise security landscape is a battlefield. And it’s intensifying every day. As technologies like the internet of things and mobility continue to evolve and expand, your data needs to reach more devices in more places—creating new vulnerabilities and attack surfaces. However, defending against every threat is impossible. Our cyber security solutions use data and analytics to help you understand your security posture and protect your business from the threats most likely to impact it. We tap into our vast global network and over 25 years of security experience to analyze attack trends and activity, helping enterprises make more informed, data-driven decisions. It’s how we help deliver comprehensive threat intel and response capabilities to Fortune 1000 companies around the globe.

WhiteHat Security

WhiteHat Security has honed its 17 years of experience in the application security space to provide developers with the tools and services they need to write and deliver the most secure software at the speed of business. The award-winning WhiteHat Application Security Platform, which has been featured on the Gartner Magic Quadrant for Application Security Testing for the last five years, is empowering true DevSecOps by continuously assessing the risk for organizations’ software assets and helping them to embed security throughout–and beyond– the software life cycle (SLC). The company is based in San Jose, California, with regional offices across the U.S. and Europe.


Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler protects thousands of customers from cyber attacks and data loss.


The iboss cloud secures user Internet access on any device, from any location, in the cloud. Shift the focus from following perimeters to following users so that consistent cloud security is applied while users are in the office or on the road.



A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits across SOC 1, SOC 2, ISO 27001, HITRUST, PCI DSS, penetration testing, and more.

AC Global Risk

AC Global Risk is a technology company that provides an entirely new human risk assessment technology known as RRA (Remote Risk Assessment). RRA has been deployed throughout the world to identify potential threats and risk levels, including fraud, insider threats, and IP/property theft.


ALTR is the first company to make the powerful security benefits of blockchain real for the enterprise. Built on a deep patent portfolio, the ALTR platform uses high-performance private blockchain technology to protect valuable data by transforming the way that it is monitored, accessed, and stored.

Active Countermeasures

AI-Hunter™ is a Network Threat Hunting solution that can identify compromised hosts on your network regardless of the operating system, hardware or network link speed. The simple-to-use interface is focused on enabling threat hunting success for everyone from junior analyst to seasoned pros.

Airlock Digital

Airlock Digital is a specialist application whitelisting software provider, developed for the sole purpose of making the application whitelisting process a much simpler, efficient, and repeatable process.


The leading provider of business-driven security management solutions, AlgoSec helps over 1,500 enterprises align security with their business processes, to make their organizations more agile, secure and compliant.


Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand adversaries, and respond effectively. Visit www.anomali.com.

Arctic Wolf

The industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. Our CyberSOC™ service is anchored by Concierge Security™ teams who provide custom threat hunting, alerting, and reporting that are cloud-based and offer 24x7 monitoring.

Area1 Security

Area 1 Security stops phishing attacks, the #1 cyberattack vector threatening all organizations. Google's Partner of the Year for Security, Area 1 is the industry’s first and only preemptive cybersecurity solution that defeats phishing attacks before they cause damage.


Armis eliminates the IoT security blind spot, letting enterprises discover unmanaged devices, analyze behavior to identify risks and attacks, and protect critical information and systems. Fortune 1000 companies trust Armis’ agentless IoT security platform to see and control any device or network.

Armor Cloud Security

Armor provides managed security solutions that take complexity out of cloud security. We protect critical data across public, private & hybrid cloud environments from current & emerging cyber threats through technology, audit-ready compliance controls & real-time intelligence from security experts.


Armorblox brings textual understanding to security, protecting organizations against hackers and human error. Armorblox's natural language understanding (NLU) platform for cybersecurity analyzes context, tone and writing styles across communications platforms, stopping today's biggest attacks.

Aruba, a Hewlett Packard Enterprise company

Aruba, a HPE company, delivers market leading1 secure networking, comprehensive visibility, policy-based access control, and AI-powered behavioral and security analytics-driven threat detection and response for networks, users, systems and IoT. 1 https://connect.arubanetworks.com/2018_Gartner_MQ

Attivo Networks

Attivo Networks®, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network cyberattacks. For more information, visit www.attivonetworks.com.


Avanan secures Software-as-a-Service (SaaS) solutions with a multi-layer, artificially intelligent platform that scales across enterprise architectures. It deploys in minutes via API to block phishing, malware, data leakage, account takeover, and shadow IT for cloud applications.

BAE Systems Applied Intelligence

BAE Systems Applied Intelligence is a commercial cyber security business and one of the world's largest trusted suppliers to nation states, government and law enforcement. Backed by BAE Systems means we provide the same technical expertise, delivery capability, geographical reach and stability.

BMC Software, Inc

BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years. Our solutions offer speed, agility, and efficiency to tackle business challenges in service management, automation, operations, and the mainframe.

Binary Defense

Binary Defense serves as an extension of your internal security and surety teams. Our world-class experts design, support, and architect industry leading, technology-agnostic security solutions including EDR/MDR, SIEM Implementation & Management, and advanced Counterintelligence services.

BlueCat Networks (USA) Inc.

BlueCat is the Enterprise DNS Company™. BlueCat provides the foundation for digital transformation strategies like cloud migration, virtualization and cybersecurity. Our Enterprise DNS platform enables organizations to centralize and automate DNS services for security and operational efficiency.


CenturyLink is the second largest U.S. communications provider to global enterprise customers. With customers in more than 60 countries and an intense focus on the customer experience, CenturyLink strives to be the world’s best networking company by solving customers’ increased demand for reliable and secure connections. The company serves as its customers’ trusted partner, helping them manage increased network and IT complexity and providing managed network and cyber security solutions that help protect their business.

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point protects over 100,000 organizations of all sizes.


Checkmarx is the Software Exposure Platform for the enterprise. Organizations rely on Checkmarx to manage software security risk. Checkmarx serves five of the world’s top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises.


CipherCloud, a leader in cloud security, provides end-to-end protection for data resident in the cloud. Our cloud access security broker (CASB+) delivers comprehensive visibility, data security, threat protection, and compliance for cloud-based assets.


Claroty protects industrial control systems and networks from cyber attacks, ensuring safe continuous operation of the world's most critical infrastructures. Users avoid costly downtime and benefit from connected control systems without compromising the security of personnel or industrial assets.


Cleafy protects internet banking and online services against advanced attacks from unmanaged endpoints (web & mobile), by delivering real-time threat detection and adaptive protection. Cleafy combines patented deterministic malware detection, passive behavioral analysis & transactional risk analysis


Cloudflare is the leading performance and security company helping to build a better Internet. Today the company runs one of the world’s largest networks that powers more than 16 million Internet properties. More than 10 trillion Internet requests flow through Cloudflare’s global network each month.

Code42 Software

Code42 is the leader in next-gen data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response.


ColorTokens Inc. delivers a new-generation approach to cybersecurity by unifying network and endpoint security into a single, cloud-delivered ZeroTrust platform, empowering enterprises with continuous visibility and proactive protection across users, devices, applications, data and workloads.

Contrast Security

Contrast Security enables applications to automatically detect and fix vulnerabilities, identify attacks, & defend themselves. Contrast employs security instrumentation to strengthen applications before they deploy, protect in production and provide visibility throughout the application lifecycle.


Conventus believes it’s time to factor business context into vulnerability management. Effective prioritization begins with understanding the risk involved, most importantly, understanding what matters MOST to the business. That’s where NorthStar Navigator comes in.


Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”).

Covered Security

Covered makes improving online security super simple, fast, and personally rewarding. It’s revolutionary platform drives incentive and capability to end users to enable them to avoid the time and hassle of identity compromise – and reduce breach and fraud risk for their employer, bank, and vendors.


CyberProof introduces a game-changing approach to managed security services called Risk-Based Cyber Services. Part of UST Global, Cyberproof aims to help businesses worldwide achieve risk clarity, confidence, and a smarter security investment.


CyberVista provides premium cybersecurity and IT training for developing the workforce — both individuals and organizations. Through comprehensive training, organizations can better develop human capital, acquire the best talent, and prepare to respond to today's evolving threats and IT challenges.


Demisto a Palo Alto Networks company is the only Security Orchestration, Automation, and Response (SOAR) platform that combines security orchestration, incident management, and interactive investigation to serve security teams across the incident lifecycle.


Devo is the data engine of digitally driven, security-aware enterprises. Devo Security Operations helps security teams analyze real-time data while leveraging historical and threat context for incident response, threat hunting and forensic analysis in a single, integrated platform.

Digital Defense, Inc.

Digital Defense’s Frontline.Cloud Security SaaS platform delivers unparalleled accuracy and efficiencies through multiple systems: Frontline Vulnerability Manager™, Frontline Web Application Scanning™, Frontline Active Threat Sweep™ and Frontline Pen Test™, all accompanied with incomparable support.

Digital Guardian

Digital Guardian provides the industry’s only data protection platform purpose-built to stop data theft from risky insiders and external adversaries. For more than 15 years, it has enabled data-rich organizations to protect their most valuable assets without slowing the pace of their business.

ELC Information Security

ELC is a global provider of customized security training since 2007. We offer a suite of engaging, interactive cybersecurity, phishing, and privacy courses in multiple languages, including optional hosting with learner segmentation, and global 24/7 support. Ask about our new microtraining products.

Edgewise Networks

Edgewise makes microsegmentation simple in any environment--on premises, public cloud or across containers using a zero trust/CARTA approach. Edgewise's patented technology uses machine learning to recommend adaptive policies that eliminate 98% of the network attack surface and protect the rest.


Endgame's endpoint protection platform brings certainty to security with the most powerful scope of protections and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting.


Expanse helps organizations discover, track, and monitor their internet-exposed attack surface. Our outside-in approach can find previously unknown security exposures, and provides global visibility into communication between your assets and those that may be risky or out of policy.

ExtraHop Networks

ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.


FireMon delivers continuous security for multi-cloud enterprises with vulnerability management, compliance and orchestration. Since creating the first network security policy management solution, FireMon has delivered real-time visibility for nearly 1,700 customers around the world.

Focal Point Data Risk

Focal Point Data Risk is a market-leading provider of integrated risk management services. Our expertise spans cyber security, data privacy and analytics, identity governance and access management, hands-on security training and internal audit.


ForgeRock​®​ is the Digital Identity Management company transforming the way organizations build trust and securely interact with customers, employees, devices, & things. ForgeRock helps ​monetize customer relationships, address privacy regulations and leverage IoT.

Fractal Industries

Fractal Industries is a software firm that applies artificial intelligence to solve complex, real-world problems at scale. Fractal OS™, is a Data Analytics-as-a-Service platform that blends capabilities to drive optimization and enable timely, insightful decision-making across the enterprise.


Fugue identifies security risks and policy violations and uses self-healing infrastructure to prevent them from reoccurring. Fugue eliminates data breaches caused by infrastructure misconfigurations and leverages powerful visualization and reporting tools to easily demonstrate compliance.

GTB Technologies Data Protection that Works

The leader in data protection, GTB Technologies provides data protection & compliance solutions preventing sensitive data ex-filtration from within the network, at the endpoint, & the cloud; either agent /agent-less, in files /streams. Delivered on-premises, off, including hybrid & managed services.

General Dynamics Mission Systems

General Dynamics Mission Systems provides high-grade data security with over fifty years of experience protecting the Nation's most valuable information, a pedigree of penetration testing, and adherence to strict coding standards – all while ensuring a seamlessly low-friction user experience.


Gigamon is the recognized leader in network visibility solutions. We provide the Network Visibility Fabric required to optimize the security and performance of our global customer’s Digital Enterprise, across physical, virtual and cloud networks.

Global Learning Systems

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change, protect your organization and Strengthen Your Human Firewall®.

GlobalSign Inc.

GlobalSign is the leading provider of trusted PKI identity and security solutions enabling businesses, service providers and IoT innovators to secure online communications, manage millions of digital identities and automate authentication and encryption for machines, devices, mobile, email and more.


GreatHorn combines a highly sophisticated threat detection engine with user context tools and integrated incident response capabilities to protect against more advanced threats better than any other email security platform, freeing the security team to focus on faster response to genuine threats.


Guardicore is an innovator in data center and cloud security that protects your organization’s core assets using flexible, quickly deployed, and easy to understand micro-segmentation controls. Our solutions provide a simpler, faster way to guarantee persistent and consistent security — for any application, in any IT environment.


Gurucul protects enterprises against cyber fraud, insider threats and external intruders on-premises and in the cloud. Our distinct behavior-based security analytics solutions reduce the attack surface for accounts, eliminate unnecessary access rights, and identify, predict and prevent breaches.


Over 1,200 organizations, including The U.S. Department of Defense, General Motors, Google, and Dropbox trust HackerOne to find critical software vulnerabilities before criminals can exploit them. HackerOne customers have resolved over 95,500 vulnerabilities and awarded over $46M in bug bounties.


Post-perimeter cyber defense for healthcare, ICS and IoT.


Illumio, the leader in micro-segmentation, prevents the spread of breaches inside data center and cloud environments.


Imperva is an analyst-recognized, cybersecurity leader—championing the fight to secure data and applications wherever they reside. Once deployed, our solutions proactively identify, evaluate, and eliminate current and emerging threats. Imperva—Protect the pulse of your business.

Informatica LLC

Informatica is the world’s leader in Enterprise Cloud Data Management. We recognize a generational market disruption is underway, where data powers digital transformation. Our market leading solutions help you protect data, use it ethically, and manage privacy across the enterprise.

Inspired eLearning

Inspired eLearning creates industry leading educational products that are designed to impact change on the behavioral level. We offer Security Awareness and Compliance training programs including phishing assessment software, a web-based Learning Management System, and more.


InteliSecure provides a portfolio of Consulting, Technical, and Managed Security Services to develop data protection programs that grow as client needs change. Our proprietary Critical Asset Protection Program (CAPP) methodology provides a more effective solution than traditional MSSP offerings.

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company that provides advanced proactive network security to secure and protect data communications, improve performance, and eliminate vulnerabilities in your critical infrastructure. IN solutions do not hunt for vulnerabilities, they remove them.


JASK is modernizing the SOC to reduce risk and improve human efficiency. Through tech consolidation, AI and ML, the JASK ASOC platform automates the correlation and analysis of alerts, helping SOC analysts focus on high-priority threats to streamline investigations and deliver faster response times.

Jazz Networks

Jazz Networks simplifies insider threat detection and breach prevention. The platform automates employee training the instant they make a mistake, applies policies while data is in motion to prevent data loss, and provides the fastest threat hunting and forensic capabilities for investigations.

Juniper Networks

Juniper Networks simplifies the complexities of networking in the cloud era with products, solutions and services to transform the way we connect, work and live. We enable our customers and partners to deliver automated, scalable and secure networks that connect the world.

Kenna Security

Kenna Security is a leader in cyber risk management. The Kenna Security platform, powered by Cyber Risk Context Technology™, tracks and predicts real-world exploitations, enabling organizations to work cross-functionally to mitigate cyber risk. Many Fortune 100 companies rely on Kenna Security.


Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.


Lacework automates security across AWS, Azure and GCP, providing a comprehensive view of risks across workloads & containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation and simplifies cloud compliance.


LastPass is an award-winning password manager that helps millions around the world organize their online lives. LastPass provides secure password storage to make going online easier and safer, with convenient access from any internet-enabled device.


Lockpath is a leader in IRM solutions. Lockpath’s Keylight Platform gives companies of all sizes and risk maturity levels the flexibility to start where they are and mature their programs as needed. It features pre-built templates and drag and drop reporting to get you up and running quickly.


We built the LogRhythm NextGen SIEM Platform with you in mind. Our single, end-to-end platform is designed by security experts for security experts. It gives your team the advanced solutions they need to reduce the challenges and complexities they face every day.


Lookout is a cybersecurity company for the post-perimeter, cloud-first, mobile-first world. Powered by the largest dataset of mobile code in existence. Lookout is trusted by hundreds of millions of individual users, enterprises and government agencies and partners like Microsoft, Apple, and others.


MCPc is a global data protection company. Our suite of Chain-of-Custody Security SolutionsSM spans secure technology logistics, IT asset management, managed security operations, and sustainable asset disposition. We provide holistic real-time defense of your most vulnerable cyber-attack surfaces.


Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Learn more at malwarebytes.com/business.


Masergy owns and operates the world’s largest independent Software Defined Platform. We deliver Hybrid Networking with SD-WAN, Managed Security with Detection and Response, and Cloud Communication with AI-powered Contact Center solutions -- all with the industry’s best customer experience.

Merlin Cyber

Constantly measure and score your risk and compliance against manufacturers’ best practices and compliance frameworks. Get alerts to gaps in coverage and see how deviations raise your threat risk. The cybersecurity solutions that organizations need to protect their most critical business assets.


MetricStream is the market leader in GRC. Through our enterprise platform and cloud software, we enable enterprises across industries to drive exceptional business performance based on a foundation of good governance, trust, and integrity.


NetSPI is the leading provider of app and network security testing solutions that supports businesses in scaling and operationalizing their threat and vulnerability management programs. The portfolio includes security testing, vulnerability orchestration software platform, and advisory services.


Nominet’s cyber security solution - NTX - cuts through your sea of security data and gives immediate visibility of threats and anomalies on your network. NTX reduces the risks and eliminate threats such as malware, phishing and data exfiltration before they cause harm. Chosen by UK Government.


NormShield enables enterprises to monitor cyber risk posture and perform nonintrusive cyber risk assessments of suppliers, subsidiaries and target acquisitions. Scorecards provide standards-based letter grades on various risks along with mitigation data to address each risk in priority order.

Nozomi Networks

Nozomi Networks is the leader of industrial cybersecurity, delivering the best solution for real-time visibility to manage cyber risk and improve resilience for industrial operations. With one solution, customers gain advanced cybersecurity, improved operational reliability and easy IT/OT integration. Innovating the use of artificial intelligence, the company helps the largest industrial sites around the world see and secure their critical industrial control networks. Today Nozomi Networks supports over a quarter of a million devices in critical infrastructure, energy, manufacturing, mining, transportation and utility sectors, making it possible to tackle the escalating cyber risks to operational networks (OT). www.nozominetworks.com


Nyotron pioneered a new threat-agnostic approach to protecting laptops, desktops and servers, while providing precise visibility into the attack. Our product automatically whitelists trusted OS behavior and rejects everything else. We call it Endpoint Prevention and Response (EPR).


ObserveIT is the only insider threat solution that empowers security teams to detect insider threats, investigate & address data exfiltration.

Onapsis Inc.

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats.


Onspring empowers business users to innovate and solve problems for themselves. We deliver solutions for risk management, incident management, compliance, legal, internal audit and operations teams—all built on a flexible, cloud-based platform. Learn more at onspring.com.


OpenText, is the maker of EnCase®, the gold standard in forensic security. With 360-degree visibility across all endpoints, devices & networks, EnCase provides superior threat detection, improves business intelligence, ensures compliance and mitigates digital risk.


PacketViper is a cyber deception company that uses agentless, lightweight, network-based deception tools early in the cyber kill chain to produce practical, tangible results including: active network defense, relief of security operational costs and 3rd party risk monitoring with policy enforcement.


Paladion is a global cyber defense company that provides Managed Detection and Response Services by tightly bundling its AI platform.

Panda Security

Panda Security is a leading innovator and 28-year veteran of the cybersecurity space with 30 million users in 180 countries. Led by our flagship offering, Adaptive Defense 360, our solutions hold some of the highest independent test scores in the industry.


PerimeterX protects the world’s largest websites and mobile applications from malicious activities, future-proofing digital businesses from automated bot attacks and client-side “stealth attacks” through predictive security intelligence with reinforcement learning techniques. www.perimeterx.com


PhishLabs partners with enterprises to protect against cyber threats exploiting employees, customers, and brands. By addressing social engineering attacks across email, social media, web, mobile, and SMS, Enterprises rely on us to protect against stolen credentials, malware, brand abuse, and fraud.


PlainID provides a simple and intuitive way for organizations to create and manage their authorization policies, down to one point of decision, control and view. Our agile, standards-based platform acts as a master policy layer, managing multiple policies seamlessly between all facets of IAM.


With Pluralsight’s technology skills platform, you can benchmark expertise across roles, speed up release cycles and build reliable, secure products.


ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. www.processunity.com.


PwC New Ventures provides solutions designed to help enterprises improve the resilience of critical business services. PwC combines a unique methodology with advanced automation and analytics to bring always-current and relevant visibility to security, risk, and line-of-business stakeholders.


RSA offers business-driven security solutions that provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, sophisticated insights and coordinated actions. RSA solutions are designed to effectively reduce business risk, fraud, and cybercrime.

Radiant Logic

Based on advanced virtualization, RadiantOne FID federated identity and directory service delivers customizable identity views built from disparate data silos, to successfully secure WAM/cloud/federation deployments.

Recorded Future

Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster.


Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. Taking a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access, nothing else makes PAM this easy.

RevCult - Security for Salesforce

"Elegantly Simple" Security & Privacy solutions for Salesforce. RevCult offers 5-star AppExchange security and privacy products and services that allow clients to continue to grow on the Salesforce platform with confidence their data is protected.

RiskIQ, Inc.

RiskIQ catalogs, maps, and enriches the structure of the internet to let you take charge of your attack surface and combat threats to your organization. Using RiskIQ advanced internet reconnaissance and analytics, you can prioritize risk remediation and protect your business, brand, and customers.


Get insight into your security portfolio investment in technology and people. What works? What doesn’t? And why. All within the context of your business impact. The SCYTHE platform allows you to bound the attack space to provide real data insights.

STEALTHbits Technologies

STEALTHbits is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.


How secure are you? Can your security defenses stand up to an attack? SafeBreach, a Gartner Cool Vendor, answers these questions! Our Breach and Attack Simulation platform safely and continuously simulates attacks so security teams can validate controls, minimize exposure and improve SOC response.


SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure. With SaltStack SecOps, you can detect security vulnerabilities and non-compliant systems allowing you to remediate -- keeping your infrastructure secure, compliant, and up-to-date.

Saltworks Security

Saltworks is an application security company. We partner with organizations to build world class application security programs from Policy to Production. Our integrated approach to AppSec provides each unique development team with resources to create and maintain security initiatives at every stage.


Saviynt is a leading provider of Identity Governance & Administration (IGA) and Cloud Security solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud and Enterprise applications.

Scytale Inc

Founded by seasoned engineers from Amazon Web Services, Google, Okta, PagerDuty, and Duo Security, Scytale helps enterprise security engineering teams standardize and accelerate service authentication across cloud, container, and on-premise infrastructure.

Security Compass

Security Compass is a leader in helping customers proactively manage cybersecurity risk, without slowing down business. Offering our award-winning software platform, SD Elements, and Verification Services, we deliver technology that’s secure by design.

Security Mentor, Inc.

Security Mentor is a visionary and global leader in employee security education. Our Training Platform provides integrated services for security awareness training, phishing simulation, policy compliance, awareness materials, quizzes, pre/post training assessments, and gamification.


Our purpose-built security analytics platform enriches, analyzes and scores events into actionable intelligence. Using machine learning techniques, Securonix detects insider threat, cyber threat and fraud attacks in real-time. www.securonix.com.


SentinelOne was founded by international defense and intelligence experts who saw the need for a dramatic new approach to endpoint protection. SentinelOne's breakthrough platform unifies prevention, detection, and response, driven by machine learning and intelligent automation. www.sentinelone.com.


Sila is a technology & management consulting firm that provides solutions in the areas of cybersecurity, integrated risk management, data analytics, software engineering & integration, strategy & transformation, and digital & creative services for Fortune 500 companies and Federal agencies.

Simeio Solutions

Simeio provides the industry’s most complete set of enterprise-grade identity security capabilities as a managed service. Simeio’s Identity Orchestrator provides IAM as a Service & allows customers to integrate their legacy IAM tools into a unified platform.

Skybox Security

Skybox provides the industry’s broadest cybersecurity management platform to address challenges within complex networks, with use cases in managing vulnerabilities, threats, firewalls and security policies.


Smarsh helps organizations get ahead - and stay ahead - of the risk within their electronic communications. We're headquartered in beautiful Portland, Oregon, and have offices worldwide.

Spanning Cloud Apps, a Kaseya company

Spanning Cloud Apps, a Kaseya company, is the leading provider of backup and recovery for SaaS applications, protecting more than 10,000 organizations from data loss due to user error, malicious activity and more.

SureCloud Inc

SureCloud is a provider of cloud-based, integrated Risk Management products, which reinvent the way you manage risk. SureCloud is underpinned by a highly configurable technology platform, which is simple, intuitive and flexible.


Swimlane is at the forefront of the security orchestration, automation and response (SOAR) solution market and was founded to deliver scalable security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages.


Synopsys, a recognized leader in Application Security Testing, offer the most comprehensive solution for building security & quality into your SDLC and supply chain. We are uniquely positioned to adapt and apply best practices to new technologies and trends such as IoT, DevOps, CI/CD, and the Cloud

System Soft Technologies

System Soft Technologies delivers a wide range of IT products and services, including IT consulting, digital transformation services, Big Data and Analytics Services, Security and Assessment services, as well as our products: Elysium Analytics cybersecurity & Delphian options backtesting/prediction.


TITUS solutions enable organizations to discover, classify, protect, analyze and confidently share information.Organizations use TITUS to meet regulatory compliance. www.titus.com.

Terranova Security

Global leader in building cyber security, phishing and GDPR awareness programs. Organizations leverage the Security Awareness 5-step framework providing a step by step approach to successful programs. Training content is rich, highly interactive, adaptable and available in 40+ languages.


Thycotic makes enterprise privilege management accessible for everyone by eliminating dependency on overly complex tools and prioritizing productivity, flexibility, and control. Thycotic's security tools limit privileged account risk, implement least privilege policies, and demonstrate compliance.


Tripwire is a leading provider of integrity assurance solutions that drive security, compliance and operational excellence.Tripwire’s award-winning portfolio includes configuration management, file integrity management, asset discovery, vulnerability management and log collection.


TruOps, based in Norwalk, CT was founded to deliver an integrated security, risk and compliance management cloud based platform to address your company's GRC requirements.

Tuebora Inc

Tuebora represents the “third-wave” of IAM. With the application of machine learning and natural language, Tuebora is a “self-driven”, adaptive, scalable and real-time cloud-first IAM solution. Customers deploy it on-premise or in the Cloud and experience increased productivity and lowered risk.


TypingDNA is a behavioral biometrics company that authenticates users based on how they type on their keyboards. Organizations worldwide use TypingDNA to enable passive, frictionless authentication and prevent fraudulent activity and identity theft.


Valimail is an anti-phishing company, driving global trustworthiness of digital communications since 2015, with the only complete platform for stopping fake email, protecting brands, and helping ensure compliance. Valimail is based in San Francisco.


Venafi is the cyber security market leader in machine identity protection, securing connections and communications between machines. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH.

Wallarm, Inc.

Wallarm AI-powered security platform protects APIs and applications with adaptive WAF and automated application security testing across microservices, public, and private clouds. Application-specific dynamic WAF rules proactively test for vulnerabilities for improved detection accuracy.


Yubico sets new global standards for simple and secure access to computers, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services.


Zimperium, global leader in mobile security, offers real-time, on-device protection against Android/iOS threats. Zimperium's platform leverages award-winning machine learning-based engine, z9, to protect mobile data, apps and sessions against device compromises, network attacks and malicious apps.

Get the insights and solutions you need.