Boston SecureWorld

2016 Exhibitors
  • ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for ACPits members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the "profession"). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.

    Founded in 1983, we are an established community of industry experts, educators, practitioners, leaders, facilitators and advocates. Our members view us as connectors and as a vital networking source.

    Booth: TBD
  • ARMA International is a not-for-profit organization representing the RIM profession. Its primary purpose is the advancement of the profession and the professional through advocacy, education and professional development. ARMA International members include records and information managers, MIS and ADP professionals, imaging specialists, archivists, hospital administrators, legal administrators, librarians, corporate counsel, compliance professionals, and educators. ARMA, its chapters, and its members are dedicated to helping individuals, organizations, and government agencies successfully meet the challenges of the increasingly complex records and information management field.

    Booth: TBD
  • We help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.  We do this using our unique set of solutions, systems, experience and processes - often collecting and analyzing huge volumes of data.

    Booth: 606
  • Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world’s leading virtualization and cloud technology providers. More information is available at http://enterprise.bitdefender.com

     

    Booth: 409
  • Carbon Black is the market leader in next-generation endpoint security. The company expects that by the end of 2015 it will achieve $70M+ in annual revenue, 70 percent growth, 7 million+ software licenses sold, almost 2,000 customers worldwide, partnerships with 60+ leading managed security service providers and incident response companies, and integrations with 30+ leading security technology providers. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2014 Awards, and a 2015 SANS survey found that Carbon Black is being used or evaluated by 68 percent of IR professionals. Companies of all sizes and industries—including more than 25 of the Fortune 100—use Carbon Black to increase security and compliance.

    Booth: 406
  • Centrify provides unified identity management across data center, cloud and mobile environments.  Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

    Booth: 304
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: 108
  • CounterTack’s real-time endpoint threat detection and response platform, Sentinel, delivers unprecedented visibility and context to enterprise security teams around targeted, persistent threats. CounterTack dramatically reduces the impact of advanced attacks, providing real-time, behavioral-based intelligence on attacker activity upon infiltration, so organizations can defend their business leveraging Sentinel’s contextual evidence for a rapid, prioritized response.

    Booth: 404
  • Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason's behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

    Booth: 301
  • Dell® SonicWALL®, provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Securing any organization with multi-threat scanning based on global input at wire speed, Dell SonicWALL is recognized as an industry leader by Gartner and NSS Labs.

    Booth: 616
  • Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in today’s mobile and distributed enterprise. Druva’s award-winning inSync and Phoenix solutions prevent data loss and address governance, compliance, and eDiscovery needs on laptops, smart-devices and remote servers. 

    Booth: 302
  • The role of the U.S. Secret Service has gradually evolved since the agency's 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation's financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service's mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals - all of whom recognize new opportunities to expand and diversify their criminal portfolio.

    Booth: TBD
  • General Dynamics Fidelis Cybersecurity Solutions provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our customers can face advanced threats with confidence through use of our Network Defense and Forensics Services and our Fidelis XPS? Advanced Threat Defense Products.

    Booth: 313
  • Forcepoint safeguards users, data and networks against the most determined adversaries, from insider threats to outside attackers, across the threat lifecycle – in the cloud, on the road, in the office. It simplifies compliance and enables better decision-making for more efficient remediation, empowering organizations to focus on what’s most important to them.

    Booth: 126
  • SafeNet and Gemalto have joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used by more than 30,000 businesses and two billion people in more than 190 countries around the world. We support 3,000 financial institutions and secure more than 80% of the world’s intra-bank fund transfers, and protect the world’s leading software applications.

    Booth: 615
  • Grounded in our work for over 40 years supporting the Intelligence Community, General Dynamics Commercial Cyber Services enables clients to buy the only meaningful business outcome - security.  Our comprehensive, service offerings – Advanced Cyber Security Monitoring, Security Device Management and On-Demand Services – protect your critical I.P. and core business functions. 

    As part of General Dynamics, we employ a highly skilled and impeccably trained workforce, operating approximately 15 Security Operations Centers and Critical Incident Response Teams across the world. As an extension to your team, we help you prioritize how to mitigate the total business risk.

    Booth: 416
  • GuidePoint Security, LLC provides customized, innovative and valuable Information Security solutions and proven cybersecurity expertise that enable commercial and federal organizations to successfully achieve their security and business goals. By embracing new technologies, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: www.guidepointsecurity.com.

    Booth: 118
  • HTCIA continues to solidify its position as the leader in professional organizations devoted to the prevention, investigation and prosecution of crimes involving advanced technologies. Protecting Critical Infrastructure, which includes the generation of electricity, water, sewer, food production and transportation is one of our primary focuses. Understanding how Industrial Control Systems (ICS) are targeted help in the development of response guidelines and educating our members. Another area of concern is the threat of BioTech accidents or deliberate events. The organization faces many challenges, including how to best deliver high quality training to our members. We view these challenges as opportunities, but are determined to remain the premier professional organization concerned with high tech investigations.

    Booth: TBD
  • Infoblox is a global leader in automated IT network control solutions.  Our appliance platforms combine real-time IP address management (IPAM) with network configuration and change capabilities.  The solutions help Infoblox’s more than 5,000 end customers achieve more dynamic and reliable networks, and value from their virtualization and cloud computing initiatives.

    Booth: 603
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: TBD
  • As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Booth: 301
  • Advancing Information Security One Community at a Time
    As anyone seriously involved in the information security profession can attest, peer networking is an invaluable resource. (ISC)² Eastern Massachusetts Chapter provide members with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create new ways to earn CPE credits!

    Member Benefits
    Being a member of an (ISC)² Eastern Massachusetts Chapter has its benefits. Not only will you gain a sense of fellowship with colleagues in your profession, you will also be able to network and exchange ideas with fellow (ISC)² credential holders and other information security professionals in your local area. Other opportunities consist of:

    Booth: TBD
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: 515
  • Ixia provides the industry's most comprehensive converged IP network validation and network visibility solutions. Ixia solutions test, assess and optimize networks and data centers to accelerate and secure application delivery.

    Only Ixia delivers complete visibility into your network, data center, and the applications and services that fuel your business. From the lab to the network to the cloud, Ixia solutions optimize networks and data centers to accelerate, secure, and scale the delivery of applications and services.

    Ixia solutions are the industry's most scalable, easy-to-use, and adaptable, automatically providing companies with the most comprehensive coverage of the latest applications and security attacks in order to optimize performance and protect against threats.

    Booth: 614
  • In 1999, Kaspersky Lab was the first company to introduce integrated antivirus software for workstations, file servers and application servers running on Linux/FreeBSD operating systems. Today, the company offers a whole range of effective corporate security solutions for the most popular operating systems specifically designed for different types of businesses. The company?s product range covers all of the main information security requirements that businesses and large state organizations have to adhere to, including: excellent protection levels, adaptability to changing circumstances, scalability, compatibility with different platforms, high performance, high fault tolerance, ease of use and high value.

    One of the primary advantages of Kaspersky Lab?s corporate range is the easy, centralized management provided by Kaspersky Security Center that extends to the entire network regardless of the number and type of platforms used.

    Booth: 300
  • NEDRIX (Northeast Disaster Recovery Information X-Change) is a non-profit organization, formed in 1991, that provides continuity and crisis management professionals access to real time governmental agencies information during a crisis or event. This is accomplished through our Public / Private Sector (PPS) Directive and our automated notification tool, NEDRIX Notify*.

    Booth: TBD
  • OpenDNS is the world’s largest Internet-wide security network, protecting two percent of the Internet’s active users every day. The cloud-based OpenDNS service delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. OpenDNS is easy to deploy and manage, with no hardware or software to install, no need to reconfigure networks and no new latency.

    Booth: 405
  • Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

    Booth: 414
  • Quantivate is a leading provider of SaaS governance, risk, compliance (GRC), and IT risk management solutions. Quantivate’s award winning customizable platform and solutions enable organizations to implement risk management and compliance processes that are aligned with organizational strategy while still adapting to the specific needs of each business area.

    Booth: 617
  • Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

    Booth: 401
  • Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 3,500 organizations, including 30% of the Fortune 1000. From the endpoint to cloud, we provide comprehensive real-time data collection, advanced correlation, and unique insight into attacker techniques to fix critical vulnerabilities, stop attacks, and advance security programs.

    Booth: 402
  • Resilient Systems (formerly Co3 Systems) empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s Incident Response Platform (IRP) arms teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter. Resilient’s customers are some of the world’s most trusted organizations.

    Resilientsystems.com

     

    Booth: TBD
  • SecureAuth IdP is the only solution that combines SSO with native two-factor authentication in a single product across all platforms. In the same solution, SecureAuth includes Versatile Authentication (VAS) that enables IT to deploy single, two, or three-factor authentication to meet current and future regulatory requirements for cloud and web applications whether accessed from desktop or mobile device. Bringing the same level of security and control to cloud applications that enterprises experience with on-premise applications, SecureAuth IdP makes multi-product deployments obsolete while minimizing risk, increasing productivity, and reducing management costs. SecureAuth IdP has been deployed to over 7 million users worldwide with customers in financial services, healthcare, retail, government, and other industries.

    Booth: 413
  • SIM is Where IT Leaders Connect. At the Boston Chapter of SIM, we provide leading information technology executives, consultants, and academics with a place to share ideas. Our collaborative community shares best practices, trends and lessons learned for you: the person that is responsible for shaping and influencing the future of IT and IT management. Our goal is to provide you with access to a robust community of the area’s top IT leaders so you can exchange ideas, share best practices, and stimulate your mind. As a senior-level IT profession providing both strategic and tactical direction to your division on a daily basis, you need someplace to turn for advice, answers and guidance too.

    We give you the tools you need to grow during each stage of your career. As you work with our other members, leading IT professionals from a variety of industries, you’ll find you’re contributing to the progression and innovation of the IT industry. Become a member today, and become a part of our management revolution that is changing the way the world communicates, educates, and conducts business. As a member, you have access to our global network of leading international IT professionals—over 30 chapters with more than 4,000 members from over 500 major organizations—as well as a variety of resources, including monthly meetings and a variety of programs.

    Booth: TBD
  • SMS PASSCODE® is a technology leader in Adaptive Multi-factor Authentication using SMS, voice call, or secure e-mail. The solution offers a secure challenge and session-specific login process tightly integrated into leading authentication systems such as Citrix, Cisco, Microsoft, VMware, and many other VPN systems. The platform is designed as scalable and fault tolerant from the ground up and offers a much lower TCO compared with alternatives.

    Booth: 306
  • Spirent Communications is the industry leader in security and applications testing solutions.  Today’s IT needs granular visibility of data, giving rise to a new generation of network security solutions like Next Generation Firewalls, SDN, IDS, and IPS. To better-prepare and protect your network, Spirent offers state-of-the-art testing technology to help you gauge the performance and effectiveness of your security environment by emulating the most realistic traffic volumes, stressing with high rate DDoS attacks, assessing security strength with real threat and attack scenarios,  and testing security robustness with advanced fuzzing capabilities.

    Booth: 600
  • Tavve’s ZoneRanger is an application-layer proxy firewall for management protocols. This edge solution eliminates the need for open firewall ports and their corresponding firewall rules. The ZoneRanger is vendor independent supporting SNMP, ICMP, Syslog, Netflow, TACACS+, and numerous other management protocols. Current ZoneRanger environments support an extensive list of management applications, including Splunk, ArcSight, Solarwinds, HPNA, CA Unicenter. The ZoneRanger is installed at two of the top 10 banks in the US, as well as numerous financial institutions and credit card companies around the world.

    Booth: 400
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

    Booth: 408
  • WatchGuard builds affordable, all-in-one network and content security solutions to provide defense in depth for corporate content, networks and the businesses they power. WatchGuard's award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions.

    Booth: 414
  • Zensar’s Infrastructure Management services enable leading companies worldwide to optimize, secure, manage and support their mission-critical infrastructure. Zensar partners with clients to align IT programs and goals with enterprise strategy to deliver solutions that drive business process as well as improve the availability, reliability and performance of data center, network, end user computing, and security and compliance infrastructure.

    Booth: 603
  • Zensar’s Infrastructure Management services enable leading companies worldwide to optimize, secure, manage and support their mission-critical infrastructure. Zensar partners with clients to align IT programs and goals with enterprise strategy to deliver solutions that drive business process as well as improve the availability, reliability and performance of data center, network, end user computing, and security and compliance infrastructure.

    Booth: 108
  • Zscaler's Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

    Booth: 407