Boston SecureWorld

2016 Exhibitors
  • ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for ACPits members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the "profession"). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.

    Founded in 1983, we are an established community of industry experts, educators, practitioners, leaders, facilitators and advocates. Our members view us as connectors and as a vital networking source.

    Booth: 202
  • Since 1997, Adaptive Communications has dedicated itself to becoming the premier value-added reseller, designer, and installer of enterprise data networking, enterprise storage and information security solutions in the Northeast.

    From the beginning, our core values of professional commitment, customer focus, technical consistency, and attention to detail have not gone unnoticed. We take great pride in our ability to successfully design, install and support state-of-the-art solutions and meet the critical networking, storage and security needs of the country's largest corporations.

    Booth: 205
  • Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. Our Intelligent PlatformTM removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud

    Booth: 605
  • Whether your company is transitioning infrastructure to the cloud, taking advantage of managed hosting services, or continuing to rely on owned data centers, Alert Logic offers intrusion detection, vulnerability assessment and log management solutions that are coupled with 24??7 monitoring and expert guidance services from our security operations center. More than 1,500 enterprise customers trust Alert Logic to secure and protect their digital information, and rely on us for keeping in step with increasingly complex regulatory issues. In addition to our team of GIAC analysts dedicated to careful observation and assessment of threats to your data, our research team stays on top of emerging developments so we can stop potential security breaches before they strike. We also have a dedicated support team ready to answer any questions you have about our products and services.

    Booth: 422
  • ARMA International is a not-for-profit organization representing the RIM profession. Its primary purpose is the advancement of the profession and the professional through advocacy, education and professional development. ARMA International members include records and information managers, MIS and ADP professionals, imaging specialists, archivists, hospital administrators, legal administrators, librarians, corporate counsel, compliance professionals, and educators. ARMA, its chapters, and its members are dedicated to helping individuals, organizations, and government agencies successfully meet the challenges of the increasingly complex records and information management field.

    Booth: TBD
  • We help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.  We do this using our unique set of solutions, systems, experience and processes - often collecting and analyzing huge volumes of data.

    Booth: 606
  • BDS is a company that works with you to understand your environment, what you have and building defenses to combat what we face today and for the attacks of tomorrow. Technology is continuously changing, businesses change every day – in order to keep up with the changes, BDS has created an extensively flexible yet highly accurate way of detecting attackers. We are attackers, and we know the best ways in detecting how attackers breach your network. An added bonus with BDS – continual penetration tests are performed regularly to enhance and develop additional safeguards. We are here to defend, protect and secure your company.

    Booth: 420
  • Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world’s leading virtualization and cloud technology providers. More information is available at http://enterprise.bitdefender.com

     

    Booth: 409
  • BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums.For more information, please visit www.bitsighttech.com or follow us on Twitter (@BitSight)

    Booth: 320
  • Bradford Networks is the leading provider of rapid threat response solutions that minimize the risk and impact of cyber threats. The company’s patented Network Sentry solution enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals. Through its SmartEdge Platform, Network Sentry seamlessly integrates with the leading Advanced Threat Detection solutions to correlate high-fidelity security alerts with a threat’s foothold. This unique correlation bridges the silos of security, network, and endpoint information to enable confident, automated threat containment before it has an adverse impact on the business.

    Booth: 209
  • Carbon Black is the market leader in next-generation endpoint security. The company expects that by the end of 2015 it will achieve $70M+ in annual revenue, 70 percent growth, 7 million+ software licenses sold, almost 2,000 customers worldwide, partnerships with 60+ leading managed security service providers and incident response companies, and integrations with 30+ leading security technology providers. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2014 Awards, and a 2015 SANS survey found that Carbon Black is being used or evaluated by 68 percent of IR professionals. Companies of all sizes and industries—including more than 25 of the Fortune 100—use Carbon Black to increase security and compliance.

    Booth: 406
  • Centrify provides unified identity management across data center, cloud and mobile environments.  Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

    Booth: 304
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: 108
  • Code42 is the endpoint data protection and management company that provides secure, integrated file sharing and backup at work, at home and everywhere in-between. The company’s award-winning products have become the gold standard for the enterprise, trusted by the most recognized brands in business and education, including Expedia, Procter & Gamble and Harvard.

    Booth: 309
  • Column Information Security is an information security consultancy and solutions provider for enterprise, public sector and government organizations. We ensure mitigation of risk through strategic planning, building and operating security systems and programs, and implementation of industry leading technologies including SailPoint, CyberArk and Veracode. For more information, visit www.columninfosec.com

    Booth: 305
  • The Comodo organization is a global innovator and developer of cybersecurity solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security.  Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information.  With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo’s proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online®.  With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom.  For more information, visit comodo.com

    Booth: 104
  • Confer developed the world’s first cyberthreat prevention network that secures servers, laptops and mobile devices from advanced cyberattacks. Built on an open, wirespeed, threat-sharing platform, Confer enables companies to secure the enterprise with an intelligence-driven, threat-based defense, without requiring complex tools and deep security expertise.

    Booth: 320
  • CounterTack’s real-time endpoint threat detection and response platform, Sentinel, delivers unprecedented visibility and context to enterprise security teams around targeted, persistent threats. CounterTack dramatically reduces the impact of advanced attacks, providing real-time, behavioral-based intelligence on attacker activity upon infiltration, so organizations can defend their business leveraging Sentinel’s contextual evidence for a rapid, prioritized response.

    Booth: 404
  • CrowdStrike is a security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Utilizing Big-Data technologies, CrowdStrike is developing a new and innovative approach to solving today’s most demanding cyber-security challenges.

    Booth: 124
  • Cyber Triage is incident response software that simplifies the collection and analysis of endpoint data. By enabling first responders to quickly determine if a host is compromised, Cyber Triage improves their ability to prioritize systems and make informed decisions. Designed by Basis Technology to be thorough but still easy to use, Cyber Triage makes incident response go faster. 

    Booth: 618
  • Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason's behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

    Booth: 301
  • Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance across many industries. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including 18 offices across the globe.

    Booth: 303
  • Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in today’s mobile and distributed enterprise. Druva’s award-winning inSync and Phoenix solutions prevent data loss and address governance, compliance, and eDiscovery needs on laptops, smart-devices and remote servers. 

    Booth: 302
  • DynTek is a leading provider of professional technology services to mid-market companies, such as state and local governments, educational institutions and commercial entities in the largest IT markets nationwide. From virtualization and cloud computing to unified communications and collaboration, DynTek provides professional technology solutions across the three core areas of our customers' technical environment: Infrastructure/Data Center, Microsoft Platforms and End Point Computing. DynTek's multidisciplinary approach allows our clients to turn to a single source for their most critical technology requirements.

    Booth: 314
  • FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,700 customers across 67 countries, including over 157 of the Fortune 500.

    Booth: 509
  • FireMon is the industry leader in providing enterprises, governments and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite Security Manager, Policy Planner and Risk Analyzer enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

    Booth: 511
  • Flexera Software helps application producers and enterprises increase application usage and security, enhancing the value they derive from their software.  Our software licensing, compliance, cybersecurity and installation solutions are essential to ensure continuous licensing compliance, software investments, and to future-proof businesses against the risks and costs of constantly changing technology. 

     

    Booth: 306
  • Forcepoint safeguards users, data and networks against the most determined adversaries, from insider threats to outside attackers, across the threat lifecycle – in the cloud, on the road, in the office. It simplifies compliance and enables better decision-making for more efficient remediation, empowering organizations to focus on what’s most important to them.

    Booth: 514
  • Foresite delivers a range of cybersecurity and compliance consulting, assessment, testing, and managed security services to provide peace of mind in an age of unprecedented cyber-challenges. Our unique and flexible services offer innovative ways to address the liabilities of today’s cybersecurity and compliance requirements. Foresite includes industry veterans with deep insight into the complexities and requirements of delivering solutions that meet information security and regulatory objectives. We proactively secure digital assets through comprehensive assessment, and vigilant monitoring, response, and remediation through Foresite’s proprietary ProVision platform.

    Booth: 320
  • G2 Deployment Advisors, comprised of a team of technology professionals with over 35 years of experience, is your authoritative source for network security, security policy automation, firewall & network change management and security intelligence.  We are a full service provider including enterprise solution sales, implementation & process design, deployment and training of fully vetted solutions.

    Booth: 303
  • SafeNet and Gemalto have joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used by more than 30,000 businesses and two billion people in more than 190 countries around the world. We support 3,000 financial institutions and secure more than 80% of the world’s intra-bank fund transfers, and protect the world’s leading software applications.

    Booth: 613
  • Grounded in our work for over 40 years supporting the Intelligence Community, General Dynamics Commercial Cyber Services enables clients to buy the only meaningful business outcome - security.  Our comprehensive, service offerings – Advanced Cyber Security Monitoring, Security Device Management and On-Demand Services – protect your critical I.P. and core business functions. 

    As part of General Dynamics, we employ a highly skilled and impeccably trained workforce, operating approximately 15 Security Operations Centers and Critical Incident Response Teams across the world. As an extension to your team, we help you prioritize how to mitigate the total business risk.

    Booth: 416
  • Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric™ and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently. As data volumes and network speeds grow and threats become more sophisticated, tools are increasingly overburdened. One hundred percent visibility is imperative. Gigamon is installed in more than three-quarters of the Fortune 100, more than half of the Fortune 500, and seven of the 10 largest service providers.

    Booth: 505
  • At Guidance, we exist to turn chaos and the unknown into order and the known–so that companies and their customers can go about their daily lives as usual without worry or disruption, knowing their most valuable information is safe and secure. Makers of EnCase®, the gold standard in digital investigations and forensic security, Guidance provides a mission-critical foundation of applications have been deployed on an estimated 25 million endpoints and provide the industry’s only 360-degree forensic visibility.

    Used with confidence by 74 of the Fortune 100 and hundreds of agencies worldwide, our field-tested and court-proven enterprise forensic security solutions,including EnCase Endpoint Security, EnCase Endpoint Investigator and our newest addition, EnForce Risk Manager work in concert with other leading enterprise technologies from companies such as Cisco, Intel, Box, Dropbox, Blue Coat Systems, and LogRhythm. For more information, contact experts@guid.com, online at guidancesoftware.com and follow @encase.

    Booth: 515
  • GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com.

    Booth: 118
  • HTCIA continues to solidify its position as the leader in professional organizations devoted to the prevention, investigation and prosecution of crimes involving advanced technologies. Protecting Critical Infrastructure, which includes the generation of electricity, water, sewer, food production and transportation is one of our primary focuses. Understanding how Industrial Control Systems (ICS) are targeted help in the development of response guidelines and educating our members. Another area of concern is the threat of BioTech accidents or deliberate events. The organization faces many challenges, including how to best deliver high quality training to our members. We view these challenges as opportunities, but are determined to remain the premier professional organization concerned with high tech investigations.

    Booth: TBD
  • HUB Technical Services, LLC. delivers End2End Virtualization, network analysis, wireless design, storage solutions and server migrations. We are determined to make every customer a lifelong client while supporting your network infrastructure and Enterprise computing environment. HUB Tech is an award winning Hewlett Packard Enterprises Platinum Partner and a holds several Massachusetts state approved contract designations.

    Booth: 203
  • IBM Security offers one of the world's broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio provides security intelligence to help protect identities, infrastructure, data and applications against advanced threats in today's hyper-connected world. For more information please visit us at: www.ibm.com/security

    Booth: 516
  • Illumio delivers adaptive security that works across legacy data centers and cloud computing environments. We provide live visibility, adaptive traffic segmentation, and instant encryption through activating and centrally managing the native security controls in the host. We do this for the world’s largest, most demanding computing environments with no dependency on the network or hypervisor.

    Booth: 501
  • Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success generating $164 million in 2014, with over 3,700 customers and 300 partners in more than 90 countries worldwide.

    Booth: 502
  • Infoblox is a global leader in automated IT network control solutions.  Our appliance platforms combine real-time IP address management (IPAM) with network configuration and change capabilities.  The solutions help Infoblox’s more than 5,000 end customers achieve more dynamic and reliable networks, and value from their virtualization and cloud computing initiatives.

    Booth: 312
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: 208
  • At IntraSystems, our mission is to provide secure access and network security solutions centered on the principles of excellence, service, and quality. IntraSystems delivers customer satisfaction through technical competence, the highest echelon of partnerships, and the professional integrity of all employees. Because our specialized core of knowledge and experience in Access, Network Security, Virtualization and Infrastructure is impossible to duplicate, we can offer customers a trusted relationship with the highest level of personalized service in the industry.

    Booth: 708
  • Advancing Information Security One Community at a Time
    As anyone seriously involved in the information security profession can attest, peer networking is an invaluable resource. (ISC)² Eastern Massachusetts Chapter provide members with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create new ways to earn CPE credits!

    Member Benefits
    Being a member of an (ISC)² Eastern Massachusetts Chapter has its benefits. Not only will you gain a sense of fellowship with colleagues in your profession, you will also be able to network and exchange ideas with fellow (ISC)² credential holders and other information security professionals in your local area. Other opportunities consist of:

    Booth: 204
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: 215
  • Ixia provides the industry's most comprehensive converged IP network validation and network visibility solutions. Ixia solutions test, assess and optimize networks and data centers to accelerate and secure application delivery.

    Only Ixia delivers complete visibility into your network, data center, and the applications and services that fuel your business. From the lab to the network to the cloud, Ixia solutions optimize networks and data centers to accelerate, secure, and scale the delivery of applications and services.

    Ixia solutions are the industry's most scalable, easy-to-use, and adaptable, automatically providing companies with the most comprehensive coverage of the latest applications and security attacks in order to optimize performance and protect against threats.

    Booth: 614
  • In 1999, Kaspersky Lab was the first company to introduce integrated antivirus software for workstations, file servers and application servers running on Linux/FreeBSD operating systems. Today, the company offers a whole range of effective corporate security solutions for the most popular operating systems specifically designed for different types of businesses. The company?s product range covers all of the main information security requirements that businesses and large state organizations have to adhere to, including: excellent protection levels, adaptability to changing circumstances, scalability, compatibility with different platforms, high performance, high fault tolerance, ease of use and high value.

    One of the primary advantages of Kaspersky Lab?s corporate range is the easy, centralized management provided by Kaspersky Security Center that extends to the entire network regardless of the number and type of platforms used.

    Booth: 300
  • We have a passion to help IT professionals win through technology. We do this by putting in their hands a set of powerful, intuitive and integrated tools that give them visibility and allow them to get control over an increasingly fragmented technology landscape, empowering them to deliver business advantage for their customers and organizations. Our integrated IT Service Management platform is cloud-based, full-featured and easy to implement via a simple unified dashboard. It integrates best-of-breed technologies into a single coherent environment that reduces the maintenance burden faced by IT professionals, allowing them to focus on the things that will differentiate their businesses in the competitive, connected business world in which they operate.

    Booth: 602
  • LogRhythm provides enterprise-class Log Management, Log Analysis and SIEM 2.0 solutions that empower organizations to comply with regulations, secure their networks and optimize IT operations. LogRhythm's rapidly growing customer base includes Fortune 500 corporations and midsize enterprises spanning a variety of industries including retail, financial services, utilities, healthcare and higher education as well as military and civilian government agencies and managed security service providers.

    Booth: 512
  • Lookout is a cybersecurity company that makes it possible for individuals and enterprises to be both mobile and secure. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseen -- predicting and stopping mobile attacks before they do harm.

    Booth: 317
  • NEDRIX (Northeast Disaster Recovery Information X-Change) is a non-profit organization, formed in 1991, that provides continuity and crisis management professionals access to real time governmental agencies information during a crisis or event. This is accomplished through our Public / Private Sector (PPS) Directive and our automated notification tool, NEDRIX Notify*.

    Booth: TBD
  • Netanium is an information technology security reseller and integrator focused on security solutions. We provide best-in-breed data and network security products and expert services to reduce exposure to information theft and destruction. Our sales and engineering professionals work with our clients to design and implement strategies, regulatory compliance, ongoing maintenance, support and training. Netanium specializes in IBM Qradar and Check Point and have certified engineers offering professional services and we are a Authorized Training center for Check Point Technologies.

    Booth: 320
  • Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, New York, Minnesota, Ohio, Wisconsin and Indiana as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.

    Nexum believes that by remaining absolutely focused on its clients’ needs, success necessarily follows. Nexum meets those needs through a holistic, value-based approach that includes best-in-breed products, professional services, Nexum-branded manufacturer support, authorized training, and monitored and managed security services. At Nexum, We Mean Security.

    Booth: 201
  • Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems including Network TAPs, External Bypass Switches, and Network Packet Brokers that integrate with monitoring systems, inline networking appliances, IPS, UTM, Load Balancing, WAN acceleration, and other mission-critical IT and security appliances. Formerly part of Interface Masters, a Silicon Valley based network solutions company, Niagara Networks recently spun off from Interface Masters to focus on its core competencies, and developed an independent company identity.

    Booth: 711
  • Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile device, Okta helps IT become more secure, make people more productive, and maintain compliance.

    Booth: 500
  • Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

    Booth: 506
  • Proofpoint secures and improves enterprise email infrastructure with solutions for email security, archiving, encryption and data loss prevention. Proofpoint solutions defend against spam and viruses, prevent leaks of confidential and private information, encrypt sensitive emails and archive messages for retention, e-discovery and easier mailbox management. Proofpoint solutions can be deployed on-demand (SaaS), on-premises (appliance) or in a hybrid architecture for maximum flexibility and scalability. For more information, please visit http://www.proofpoint.com.

    Booth: 704
  • Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). 

    For more information, please visit www.qualys.com.

    Booth: 315
  • Quantivate is a leading provider of SaaS governance, risk, compliance (GRC), and IT risk management solutions. Quantivate’s award winning customizable platform and solutions enable organizations to implement risk management and compliance processes that are aligned with organizational strategy while still adapting to the specific needs of each business area.

    Booth: 617
  • As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments.

    Organizations in a wide range of sectors—including government, defense, banking, and manufacturing—rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands.

    Booth: 604
  • Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

    Booth: 401
  • Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 3,500 organizations, including 30% of the Fortune 1000. From the endpoint to cloud, we provide comprehensive real-time data collection, advanced correlation, and unique insight into attacker techniques to fix critical vulnerabilities, stop attacks, and advance security programs.

    Booth: 402
  • Resilient Systems empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s leading Incident Response Platform (IRP) arms response teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter. Resilient’s security, privacy, and action modules provide organizations with agile, collaborative, and comprehensive action plans – enabling teams to modify responses to suit organizational needs, adapt in real time as incidents evolve, and focus on critical incidents before they become full-blown crises. Headquartered in Massachusetts, USA, Resilient’s customers are some of the world’s most trusted organizations. Learn more at resilientsystems.com.

    Booth: 415
  • RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's technology, business and industry solutions - coupled with professional services and dozens of strategic third-party partnerships - help organizations bring trust to millions of user identities, the activities that they perform and the data that is generated.

    Booth: 513
  • SAINT Corporation offers integrated vulnerability assessment, penetration testing, and security checklist compliance. Examine your network with the SAINT® vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with the SAINTexploit® penetration testing tool and exploit the vulnerability to prove its existence.

    Booth: 316
  • Founded twenty-eight years ago, Sayers is an industry-leading IT services and solution provider, offering the latest and most sophisticated technologies. We partner with world-class vendors. Over the past three decades, we have established a powerful track record of success, highly personalized service and lasting client relationships.

    Booth: 217
  • SecureAuth IdP is the only solution that combines SSO with native two-factor authentication in a single product across all platforms. In the same solution, SecureAuth includes Versatile Authentication (VAS) that enables IT to deploy single, two, or three-factor authentication to meet current and future regulatory requirements for cloud and web applications whether accessed from desktop or mobile device. Bringing the same level of security and control to cloud applications that enterprises experience with on-premise applications, SecureAuth IdP makes multi-product deployments obsolete while minimizing risk, increasing productivity, and reducing management costs. SecureAuth IdP has been deployed to over 7 million users worldwide with customers in financial services, healthcare, retail, government, and other industries.

    Booth: 413
  • At Securonix, we focus on the application of advances in the fields of computing, statistics, behavioral sciences, machine learning and artificial intelligence for solving core security problems. Securonix provides the industry’s first signature-less Behavior Based Threat Detection technology, the industry’s first risk based access outlier detection technology, and provides the industry’s first fuzzy logic based identity correlation engine.

    Booth: 503
  • SIM is Where IT Leaders Connect. At the Boston Chapter of SIM, we provide leading information technology executives, consultants, and academics with a place to share ideas. Our collaborative community shares best practices, trends and lessons learned for you: the person that is responsible for shaping and influencing the future of IT and IT management. Our goal is to provide you with access to a robust community of the area’s top IT leaders so you can exchange ideas, share best practices, and stimulate your mind. As a senior-level IT profession providing both strategic and tactical direction to your division on a daily basis, you need someplace to turn for advice, answers and guidance too.

    We give you the tools you need to grow during each stage of your career. As you work with our other members, leading IT professionals from a variety of industries, you’ll find you’re contributing to the progression and innovation of the IT industry. Become a member today, and become a part of our management revolution that is changing the way the world communicates, educates, and conducts business. As a member, you have access to our global network of leading international IT professionals—over 30 chapters with more than 4,000 members from over 500 major organizations—as well as a variety of resources, including monthly meetings and a variety of programs.

    Booth: 200
  • SMS PASSCODE® is a technology leader in Adaptive Multi-factor Authentication using SMS, voice call, or secure e-mail. The solution offers a secure challenge and session-specific login process tightly integrated into leading authentication systems such as Citrix, Cisco, Microsoft, VMware, and many other VPN systems. The platform is designed as scalable and fault tolerant from the ground up and offers a much lower TCO compared with alternatives.

    Booth: 314
  • Spirent Communications is the industry leader in security and applications testing solutions.  Today’s IT needs granular visibility of data, giving rise to a new generation of network security solutions like Next Generation Firewalls, SDN, IDS, and IPS. To better-prepare and protect your network, Spirent offers state-of-the-art testing technology to help you gauge the performance and effectiveness of your security environment by emulating the most realistic traffic volumes, stressing with high rate DDoS attacks, assessing security strength with real threat and attack scenarios,  and testing security robustness with advanced fuzzing capabilities.

    Booth: 600
  • Splunk® Inc. provides the engine for machine data. Splunk software collects, indexes and harnesses the machine data generated by the websites, applications, servers and mobile devices that power business. Over 4,000 customers use Splunk Enterprise and gain operational intelligence to improve service and uptime, reduce cost and mitigate cyber-security risk.

    Booth: 504
  • Tanium provides the unique power to secure, control and manage endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint, retrieve data on their current state, and execute change all within seconds. 

    Booth: TBD
  • Tavve’s ZoneRanger is an application-layer proxy firewall for management protocols. This edge solution eliminates the need for open firewall ports and their corresponding firewall rules. The ZoneRanger is vendor independent supporting SNMP, ICMP, Syslog, Netflow, TACACS+, and numerous other management protocols. Current ZoneRanger environments support an extensive list of management applications, including Splunk, ArcSight, Solarwinds, HPNA, CA Unicenter. The ZoneRanger is installed at two of the top 10 banks in the US, as well as numerous financial institutions and credit card companies around the world.

    Booth: 400
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

    Booth: 408
  • Founded by David Kennedy, TrustedSec is a leader in the Information Security Industry, composed of exclusively senior level security experts. TrustedSec is driven by our relationships with our clients to meet your security concerns and exceed your expectations. We offer many services which include Penetration Testing, Red/Purple Teaming, and Program Maturity Reviews. We are your Trusted Source for Information Security.

    Booth: 420
  • Based in Mountain View, CA, vArmour is the data center security company that transforms how organizations protect their virtualized and cloud assets as they transform to a multi-cloud world. The company was founded in 2011 and is backed by top investors including Highland Capital Partners, Menlo Ventures, Columbus Nova Technology Partners, Citi Ventures, Work-Bench Ventures and Allegis Capital. The vArmour Distributed Security System is deployed in a significant number of the world’s largest banks, telecom service providers, government agencies, healthcare providers, and retailers, and is leading the industry with a new patented, distributed approach to data security that allows organizations to deliver IT at the speed of business. Along with partners like Amazon and VMware, vArmour secures many of the largest data center and cloud environments in the world.

    Booth: 320
  • Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice.

    As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility.

    Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

    Booth: 508
  • Veriato provides User Behavior Analytics and User Activity Monitoring solutions. 

    Over 36,000 organizations worldwide trust Veriato to gain insight into human activity on their network.

    Veriato's award-winning solutions include Veriato Recon (behavioral analytics based insider threat detection), 

    Veriato 360 (enterprise-grade User Activity Monitoring), and Veriato Investigator (employee investigation tool).

    Booth: 308
  • WatchGuard builds affordable, all-in-one network and content security solutions to provide defense in depth for corporate content, networks and the businesses they power. WatchGuard's award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions.

    Booth: 414
  • Zensar’s Infrastructure Management services enable leading companies worldwide to optimize, secure, manage and support their mission-critical infrastructure. Zensar partners with clients to align IT programs and goals with enterprise strategy to deliver solutions that drive business process as well as improve the availability, reliability and performance of data center, network, end user computing, and security and compliance infrastructure.

    Booth: 312, Booth 108