Boston SecureWorld

2015 Exhibitors
  • A10 Networks is a leader in Application Networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, California, and serves customers globally with offices worldwide.

    Booth: 314
  • Accuvant is the only research-driven information security partner delivering alignment between IT security and business objectives, clarity to complex security challenges and confidence in complex security decisions. Accuvant delivers these solutions through three practice areas: Risk and Compliance Management, Accuvant LABS and Solution Services

    Booth: 414
  • ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for ACPits members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the "profession"). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.

    Founded in 1983, we are an established community of industry experts, educators, practitioners, leaders, facilitators and advocates. Our members view us as connectors and as a vital networking source.

    Booth: TBD
  • AirWatch by VMware is the leader in enterprise mobility management, with more than 15,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for bring your own device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com. VMware is headquartered in Silicon Valley and can be found online at www.vmware.com.

    Booth: 420
  • Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. Our Intelligent PlatformTM removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud

    Booth: 213
  • Comprised of AlgoSec&rsquo's Firewall Analyzer (AFA) and AlgoSec FireFlow workflow automation solution, AlgoSec enables the complete management of the network security policy. With support for all major firewall vendors and security devices, the AlgoSec Security Management Suite automates tasks associated with firewall audits, change management, compliance and risk analysis.

    Booth: 413
  • Founded in 1983, Apricorn designs, manufactures, and supports storage innovations with your data’s security as our top priority. Our unique, patented approach is centered on being 100% hardware-encrypted, software-free, and cross-platform compatible. Trusted by numerous state, national, and international governments, as well as small and large corporations alike, Apricorn delivers advanced data security innovations designed to address today’s threats, as well as tomorrow’s.

    Booth: 417
  • ARMA International is a not-for-profit organization representing the RIM profession. Its primary purpose is the advancement of the profession and the professional through advocacy, education and professional development. ARMA International members include records and information managers, MIS and ADP professionals, imaging specialists, archivists, hospital administrators, legal administrators, librarians, corporate counsel, compliance professionals, and educators. ARMA, its chapters, and its members are dedicated to helping individuals, organizations, and government agencies successfully meet the challenges of the increasingly complex records and information management field.

    Booth: TBD
  • Avecto is a global software company that takes a positive approach to endpoint security. Our unique security solution, Defendpoint, allows enterprises to strike an effective balance between security and user freedoms. By uniquely combining the technologies of Privilege Management, Application Control and Sandboxing, organizations achieve security strength and depth that offers protection against unknown cyber threats. 

    Booth: 207
  • Bit9, the global leader in Advanced Threat Protection, protects the world's intellectual property (IP) by providing innovative, trust-based security solutions to detect and prevent sophisticated cyber threats. The world's leading brands rely on Bit9's award-winning Advanced Threat Protection Platform for endpoint protection and server security. Bit9 stops advanced persistent threats by combining real-time sensors, cloud-based software reputation services, continuous monitoring and trust-based application control and whitelisting, eliminating the risk caused by malicious, illegal and unauthorized software.

    Booth: 208
  • Certes Networks protects data in motion. Certes’ award-winning CryptoFlow™ Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any network without compromising network or application performance. Companies around the world rely on Certes’ encryption products to protect critical data simply and easily. Learn more: certesnetworks.com

    Booth: 210
  • Certified Security Solutions, Inc. (CSS) is an information security company specializing in digital identity management solutions. CSS provides enterprise ready software, managed security services, Security as a Service, and consulting services. CSS’ security solutions allow clients to secure and operate in cloud computing platforms, “Bring Your Own Device” initiatives, and the emerging market of the “Internet of Things.”  

    Booth: 303
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: 110
  • Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages and identify its security vulnerabilities.
    Checkmarx has been Ranked 2nd Fastest Growing Security Company by Deloitte in the latest EMEA Fast 500. www.checkmarx.com

    Booth: 411
  • As a provider of integrated, interoperable safety and security products and services, Cisco is helping to solve some of today?s toughest societal and business challenges. Governments, partners, and private institutions worldwide are using Cisco solutions to increase citizen safety and coordinate rapid responses to emergencies, while maximizing their technology investments.

    Booth: 410
  • Click Security runs real-time stream processing analytics against pre-computed log, network, and file/artifact data sources; automatically produces analyst start points with automated actor/event / relationship views; and provides a full attack activity framework – where analysts can interactively visualize, prune, and augment big security data.

    Booth: 312
  • Established in 1998, Column Technologies is a global technology solutions provider.  Our products and services are centered around IT Management and Information Security.  Our consulting services reflect the experience of over 3,000+ IT management implementations worldwide.  As an innovative leader in the IT security space, Column is the preferred managed services partner for SailPoint IdentityIQ.  Column is headquartered in the United States, with over 350 employees and global offices in Canada, India and the United Kingdom.  

    Booth: 306
  • Confer developed the world’s first cyberthreat prevention network that secures servers, laptops and mobile devices from advanced cyberattacks. Built on an open, wirespeed, threat-sharing platform, Confer enables companies to secure the enterprise with an intelligence-driven, threat-based defense, without requiring complex tools and deep security expertise.

    Booth: 100
  • CounterTack’s real-time endpoint threat detection and response platform, Sentinel, delivers unprecedented visibility and context to enterprise security teams around targeted, persistent threats. CounterTack dramatically reduces the impact of advanced attacks, providing real-time, behavioral-based intelligence on attacker activity upon infiltration, so organizations can defend their business leveraging Sentinel’s contextual evidence for a rapid, prioritized response.

    Booth: 203
  • Cyber 360 Solutions, a division of Staffing 360 Solutions (OTC: STAF), is the leading Cybersecurity professional services and staffing firm solely dedicated to identifying the top 10% of security professionals for consulting opportunities. Cyber 360 Solutions has won numerous accolades, including a Diversity Supplier Award and Fastest Growing IT Firm in the US. Headquartered in Boston, MA with offices in the U.S. and Europe.

    Booth: 114
  • Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

    Booth: 106
  • Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort’s software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization’s virtual, physical and cloud infrastructure against sophisticated attacks. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in Santa Clara, California.

    Booth: 100
  • Damballa discovers active threats that bypass all security prevention layers. Damballa has a unique understanding of malicious network behaviors that expose the difference between legitimate users and threat actors.

    Booth: 419
  • DynTek is a leading provider of professional technology services to mid-market companies, such as state and local governments, educational institutions and commercial entities in the largest IT markets nationwide. From virtualization and cloud computing to unified communications and collaboration, DynTek provides professional technology solutions across the three core areas of our customers' technical environment: Infrastructure/Data Center, Microsoft Platforms and End Point Computing. DynTek's multidisciplinary approach allows our clients to turn to a single source for their most critical technology requirements.

    Booth: 310
  • The role of the U.S. Secret Service has gradually evolved since the agency's 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation's financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service's mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals - all of whom recognize new opportunities to expand and diversify their criminal portfolio.

    Booth: TBD
  • EventTracker is a leading provider of comprehensive IT security solutions. Our industry award winning SIEM and log management solutions enable businesses to meet compliance requirements with confidence, increase the security of their IT environments, and reduce overall risk to their enterprise. We serve small and medium size enterprises in regulated industries including healthcare, financial services, utilities, government and retail, and offer solutions for managed security service providers.

    Booth: 214
  • FireMon is the industry leader in providing enterprises, governments and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite Security Manager, Policy Planner and Risk Analyzer enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

    Booth: 418
  • FishNet Security, the No. 1 provider of information security solutions that combine technology, services, support and training, enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to more than 5,000 clients nationwide. For more information about FishNet Security, visit www.fishnetsecurity.com.

    Booth: 414
  • G2 Deployment Advisors, comprised of a team of technology professionals with over 35 years of experience, is your authoritative source for network security, security policy automation, firewall & network change management and security intelligence.  We are a full service provider including enterprise solution sales, implementation & process design, deployment and training of fully vetted solutions.

    Booth: 509
  • Gigamon provides intelligent Traffic Visibility Networking solutions for enterprises, data centers and service providers around the globe. Through patented technologies, the Gigamon GigaVue portfolio of high availability and high density products intelligently delivers the appropriate traffic from physical and virtual networks to security, monitoring and management systems.

    Booth: 424
  • Guidance Software is the purveyor of the market leading products EnCase eDiscovery, EnCase Cybersecurity, and EnCase Analytics. They empower organizations to respond to litigation discovery requests, perform sensitive data discovery for compliance purposes, conduct speedy and thorough security incident response, and reveal previously hidden advanced persistent threats or malicious insider activity. Learn more at www.encase.com.

    Booth: 311
  • GuidePoint Security, LLC provides customized, innovative and valuable Information Security solutions and proven cybersecurity expertise that enable commercial and federal organizations to successfully achieve their security and business goals. By embracing new technologies, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: www.guidepointsecurity.com.

    Booth: 104
  • HTCIA continues to solidify its position as the leader in professional organizations devoted to the prevention, investigation and prosecution of crimes involving advanced technologies. Protecting Critical Infrastructure, which includes the generation of electricity, water, sewer, food production and transportation is one of our primary focuses. Understanding how Industrial Control Systems (ICS) are targeted help in the development of response guidelines and educating our members. Another area of concern is the threat of BioTech accidents or deliberate events. The organization faces many challenges, including how to best deliver high quality training to our members. We view these challenges as opportunities, but are determined to remain the premier professional organization concerned with high tech investigations.

    Booth: TBD
  • IBM Security offers one of the world?s broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio provides security intelligence to help protect identities, infrastructure, data and applications against advanced threats in today?s hyper-connected world. For more information please visit us at: www.ibm.com/security

    Booth: 212
  • IBM Security offers one of the world?s broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio provides security intelligence to help protect identities, infrastructure, data and applications against advanced threats in today?s hyper-connected world. For more information please visit us at: www.ibm.com/security

    Booth: 405
  • iboss cybersecurity defends organizations against advanced threats and data loss with innovative Web Security, Mobile Security and FireSphere™ APT defense. iboss’ patented, technology and advanced data protection tools provide visibility and control over all inbound/outbound data movement, allowing you to detect and mitigate the evasive infections other solutions miss.

    Booth: 511
  • Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. The company’s award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. Sensitive Data Manager discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.

    Booth: 204
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: 506
  • As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Booth: 301
  • Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

    Booth: 504
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: 515
  • Ixia provides the industry's most comprehensive converged IP network validation and network visibility solutions. Ixia solutions test, assess and optimize networks and data centers to accelerate and secure application delivery.

    Only Ixia delivers complete visibility into your network, data center, and the applications and services that fuel your business. From the lab to the network to the cloud, Ixia solutions optimize networks and data centers to accelerate, secure, and scale the delivery of applications and services.

    Ixia solutions are the industry's most scalable, easy-to-use, and adaptable, automatically providing companies with the most comprehensive coverage of the latest applications and security attacks in order to optimize performance and protect against threats.

    Booth: 409
  • In 1999, Kaspersky Lab was the first company to introduce integrated antivirus software for workstations, file servers and application servers running on Linux/FreeBSD operating systems. Today, the company offers a whole range of effective corporate security solutions for the most popular operating systems specifically designed for different types of businesses. The company?s product range covers all of the main information security requirements that businesses and large state organizations have to adhere to, including: excellent protection levels, adaptability to changing circumstances, scalability, compatibility with different platforms, high performance, high fault tolerance, ease of use and high value.

    One of the primary advantages of Kaspersky Lab?s corporate range is the easy, centralized management provided by Kaspersky Security Center that extends to the entire network regardless of the number and type of platforms used.

    Booth: 304
  • LogRhythm provides enterprise-class Log Management, Log Analysis and SIEM 2.0 solutions that empower organizations to comply with regulations, secure their networks and optimize IT operations. LogRhythm?s rapidly growing customer base includes Fortune 500 corporations and midsize enterprises spanning a variety of industries including retail, financial services, utilities, healthcare and higher education as well as military and civilian government agencies and managed security service providers.

    Booth: 408
  • Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension is known for providing world-class customer support and services 365 days a year. Lumension: IT Secured. Success Optimized.™

    Booth: 422
  • Managed Methods builds Cloud Access Security Broker software, designed to discover, secure, and govern the connection of enterprises to the cloud. Our products – for Security and IT teams – discover and protect the flow of information between people and applications inside and outside the enterprise.

    Booth: 315
  • McAfee is the world’s largest dedicated security technology company. Delivering proactive and proven solutions and services that help secure systems and networks around the world, McAfee protects consumers and businesses of all sizes from the latest malware and emerging online threats. Our solutions are designed to work together, integrating antimalware, antispyware, and antivirus software with security management features that deliver unsurpassed real-time visibility and analytics, reduce risk, ensure compliance, improve Internet security, and help businesses achieve operational efficiencies.

    Booth: 426
  • Available as a highly-scalable on-premise or cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices. MobileIron is the only solution with DLP for native email, end-to-end apps security, and single-system scale of 100,000 devices. MobileIron is positioned in Gartner's Leaders Quadrant for Mobile Device Management.

     

    Booth: 403
  • NEDRIX (Northeast Disaster Recovery Information X-Change) is a non-profit organization, formed in 1991, that provides continuity and crisis management professionals access to real time governmental agencies information during a crisis or event. This is accomplished through our Public / Private Sector (PPS) Directive and our automated notification tool, NEDRIX Notify*.

    Booth: TBD
  • Netanium is an information technology security reseller and integrator focused on security solutions. We provide best-in-breed data and network security products and expert services to reduce exposure to information theft and destruction. Our sales and engineering professionals work with our clients to design and implement strategies, regulatory compliance, ongoing maintenance, support and training. Netanium specializes in IBM Qradar and Check Point and have certified engineers offering professional services and we are a Authorized Training center for Check Point Technologies.

    Booth: 100
  • ObserveIT, a pioneer in User Activity Monitoring, provides a new user-centric approach to IT security to address user-based attacks. ObserveIT provides video recordings of user activity, analytics and alerting to respond rapidly to security incidents and operationalize forensics. Over 1,200 companies use ObserveIT. Visit http://www.observeit.com for more information.

    Booth: 503
  • OpenDNS is the world’s largest Internet-wide security network, protecting two percent of the Internet’s active users every day. The cloud-based OpenDNS service delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. OpenDNS is easy to deploy and manage, with no hardware or software to install, no need to reconfigure networks and no new latency.

    Booth: 202
  • Proofpoint secures and improves enterprise email infrastructure with solutions for email security, archiving, encryption and data loss prevention. Proofpoint solutions defend against spam and viruses, prevent leaks of confidential and private information, encrypt sensitive emails and archive messages for retention, e-discovery and easier mailbox management. Proofpoint solutions can be deployed on-demand (SaaS), on-premises (appliance) or in a hybrid architecture for maximum flexibility and scalability. For more information, please visit http://www.proofpoint.com.

    Booth: 407
  • Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). 

    For more information, please visit www.qualys.com.

    Booth: 206
  • As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments.

    Organizations in a wide range of sectors—including government, defense, banking, and manufacturing—rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands.

    Booth: 300
  • Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

    Booth: 209
  • Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 3,500 organizations, including 30% of the Fortune 1000. From the endpoint to cloud, we provide comprehensive real-time data collection, advanced correlation, and unique insight into attacker techniques to fix critical vulnerabilities, stop attacks, and advance security programs.

    Booth: 112
  • Raytheon Cyber Products, a leading provider of commercial-off-the-shelf cyber security solutions for government and industry, is a wholly owned subsidiary of Raytheon Company.  Founded on deep knowledge of cyber security, the company’s portfolio of products address cyber challenges including insider threat, secure information sharing, data loss prevention, and data analysis. 

    Booth: 215
  • Resilient Systems (formerly Co3 Systems) empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s Incident Response Platform (IRP) arms teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter. Resilient’s customers are some of the world’s most trusted organizations.

    Resilientsystems.com

     

    Booth: 512
  • Booth: 402
  • SafeNet and Gemalto have joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used by more than 30,000 businesses and two billion people in more than 190 countries around the world. We support 3,000 financial institutions and secure more than 80% of the world’s intra-bank fund transfers, and protect the world’s leading software applications.

    Booth: 205
  • Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal protection of critical information assets.

    Booth: 513
  • SecureAuth IdP is the only solution that combines SSO with native two-factor authentication in a single product across all platforms. In the same solution, SecureAuth includes Versatile Authentication (VAS) that enables IT to deploy single, two, or three-factor authentication to meet current and future regulatory requirements for cloud and web applications whether accessed from desktop or mobile device. Bringing the same level of security and control to cloud applications that enterprises experience with on-premise applications, SecureAuth IdP makes multi-product deployments obsolete while minimizing risk, increasing productivity, and reducing management costs. SecureAuth IdP has been deployed to over 7 million users worldwide with customers in financial services, healthcare, retail, government, and other industries.

    Booth: 412
  • Sentrix Cloud-DMZ™ enables enterprises to eliminate the most costly Web Attacks such as DDoS, defacement and the OWASP Top- 10 by leveraging global cloud platforms as an extension of their DMZ.

    Traditional Web security solutions rely on incoming traffic inspection, resulting in unmanageable rule sets, security risks and extended deployment cycles.

    Unlike traditional solutions the Cloud-DMZ snaps onto any system architecture within hours and automatically eliminates over 99% of the web system’s attack surface. It uses closed loop architecture, which continuously adapts to application updates and seamlessly applies security controls and policy even to the most agile applications.

     

    Booth: 313
  • SIM is an association of senior IT executives, prominent academicians, selected consultants, and other IT thought leaders built on the foundation of local chapters, who come together to share and enhance their rich intellectual capital for the benefit of its members and their organizations.

    Booth: TBD
  • Sophos makes IT security simple with complete solutions that protect networks, servers and devices, wherever they are located. Today, more than 100 million users in 150 countries and a global network of channel partners rely on Sophos for trusted solutions to complex security challenges. Focused on innovation and backed by a global network of SophosLabs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain and manage, enabling organizations to focus on performance and growth. Sophos – Security made Simple.  Learn more at www.sophos.com.

    Booth: 116
  • Symantec is a global leader in providing security, storage and systems management solutions to help our customers secure and manage their information and identities independent of device. Symantec does this by bringing together leading software and cloud solutions that work seamlessly across multiple platforms, giving customers the freedom to access, store and transmit information anytime, anywhere.

    Booth: 500
  • Founded by the leading privacy law expert Professor Daniel Solove, TeachPrivacy provides computer-based privacy and data security training specializing in many data security topics. Our training incorporates videos, quizzes and interactive elements which makes it highly engaging. Our philosophy is training that inspires employees to think and care.

    Booth: 309
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • Thales e-Security is a leading global provider of data protection solutions with more than 40 years of experience securing the world’s most sensitive information. Thales customers —businesses, governments and technology vendors with a broad range of challenges—use our products and services to improve the security of applications that rely on encryption and digital signatures. By protecting the confidentiality, integrity, and availability of sensitive information that flows through today’s traditional, virtualized and cloud-based infrastructures, Thales helps organizations reduce risk, demonstrate compliance, enhance agility and pursue strategic goals with greater confidence. Thales solutions not only deliver high levels of assurance, backed by independent certifications, but also offer significant advantages in ease of deployment and ongoing management.

    Booth: 305
  • Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.

    Booth: 502
  • Tufin™ is the leading provider of Security Policy Orchestration solutions enabling companies to cost-effectively automate and accelerate network configuration changes while maintaining security and compliance. Tufin's award-winning Orchestration Suite™ gives IT organizations the power and agility to enforce security policy across complex, multi-vendor enterprise networks.

    Booth: 509
  • Varonis is the foremost innovator and solution provider of comprehensive, actionable data governance solutions for unstructured and semi-structured data with over 4000 installations spanning leading firms in financial services, government, healthcare, energy, media, education, manufacturing and technology worldwide. Based on patented technology, Varonis' solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times.

    Booth: 106
  • Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice.

    As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility.

    Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

    Booth: 501
  • Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. Visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog.

    Booth: 201
  • Verisign powers the invisible navigation that takes people to where they want to go on the Internet. The company operates the infrastructure for a portfolio of top-level domains, including .com and .net, and offers a suite of infrastructure assurance services—including Managed DNS, DDoS Protection and iDefense Security Intelligence Services.

    Booth: 308
  • Trusted by businesses and governments for over a decade, Vormetric’s data-centric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through:

    • Data Encryption and Centralized Key Management

    • Access Policies and Privileged User Control

    • Security Intelligence

    Booth: 400
  • WatchGuard builds affordable, all-in-one network and content security solutions to provide defense in depth for corporate content, networks and the businesses they power. WatchGuard's award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions.

    Booth: 118
  • Websense, Inc., a global leader in unified web security, email security, and data loss prevention (DLP) solutions, delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as software, appliance and Security-as-a-Service (SaaS), Websense content security solutions help organizations leverage web 2.0 and cloud communication, collaboration, and social media while protecting from advanced persistent threats, preventing the loss of confidential information and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com.

    Booth: 404
  • Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

    Booth: 307
  • Zensar’s Infrastructure Management services enable leading companies worldwide to optimize, secure, manage and support their mission-critical infrastructure. Zensar partners with clients to align IT programs and goals with enterprise strategy to deliver solutions that drive business process as well as improve the availability, reliability and performance of data center, network and security infrastructure.

    Booth: 110