Boston SecureWorld

2015 Exhibitors
  • A10 Networks is a leader in Application Networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, California, and serves customers globally with offices worldwide.

    Booth: 314
  • ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for ACPits members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the "profession"). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.

    Founded in 1983, we are an established community of industry experts, educators, practitioners, leaders, facilitators and advocates. Our members view us as connectors and as a vital networking source.

    Booth: TBD
  • AirWatch by VMware is the leader in enterprise mobility management, with more than 15,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for bring your own device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at VMware is headquartered in Silicon Valley and can be found online at

    Booth: 420
  • Comprised of AlgoSec&rsquo's Firewall Analyzer (AFA) and AlgoSec FireFlow workflow automation solution, AlgoSec enables the complete management of the network security policy. With support for all major firewall vendors and security devices, the AlgoSec Security Management Suite automates tasks associated with firewall audits, change management, compliance and risk analysis.

    Booth: 413
  • ARMA International is a not-for-profit organization representing the RIM profession. Its primary purpose is the advancement of the profession and the professional through advocacy, education and professional development. ARMA International members include records and information managers, MIS and ADP professionals, imaging specialists, archivists, hospital administrators, legal administrators, librarians, corporate counsel, compliance professionals, and educators. ARMA, its chapters, and its members are dedicated to helping individuals, organizations, and government agencies successfully meet the challenges of the increasingly complex records and information management field.

    Booth: TBD
  • Certes Networks protects data in motion. Certes’ award-winning CryptoFlow™ Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any network without compromising network or application performance. Companies around the world rely on Certes’ encryption products to protect critical data simply and easily. Learn more:

    Booth: 210
  • Certified Security Solutions, Inc. (CSS) is an information security company specializing in digital identity management solutions. CSS provides enterprise ready software, managed security services, Security as a Service, and consulting services. CSS’ security solutions allow clients to secure and operate in cloud computing platforms, “Bring Your Own Device” initiatives, and the emerging market of the “Internet of Things.”  

    Booth: 303
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: 110
  • Click Security runs real-time stream processing analytics against pre-computed log, network, and file/artifact data sources; automatically produces analyst start points with automated actor/event / relationship views; and provides a full attack activity framework – where analysts can interactively visualize, prune, and augment big security data.

    Booth: 312
  • Established in 1998, Column Technologies is a global technology solutions provider.  Our products and services are centered around IT Management and Information Security.  Our consulting services reflect the experience of over 3,000+ IT management implementations worldwide.  As an innovative leader in the IT security space, Column is the preferred managed services partner for SailPoint IdentityIQ.  Column is headquartered in the United States, with over 350 employees and global offices in Canada, India and the United Kingdom.  

    Booth: 306
  • Cyber 360 Solutions, a division of Staffing 360 Solutions (OTC: STAF), is the leading Cybersecurity professional services and staffing firm solely dedicated to identifying the top 10% of security professionals for consulting opportunities. Cyber 360 Solutions has won numerous accolades, including a Diversity Supplier Award and Fastest Growing IT Firm in the US. Headquartered in Boston, MA with offices in the U.S. and Europe.

    Booth: 114
  • DynTek is a leading provider of professional technology services to mid-market companies, such as state and local governments, educational institutions and commercial entities in the largest IT markets nationwide. From virtualization and cloud computing to unified communications and collaboration, DynTek provides professional technology solutions across the three core areas of our customers' technical environment: Infrastructure/Data Center, Microsoft Platforms and End Point Computing. DynTek's multidisciplinary approach allows our clients to turn to a single source for their most critical technology requirements.

    Booth: 310
  • The role of the U.S. Secret Service has gradually evolved since the agency's 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation's financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service's mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals - all of whom recognize new opportunities to expand and diversify their criminal portfolio.

    Booth: TBD
  • FireMon is the industry leader in providing enterprises, governments and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite Security Manager, Policy Planner and Risk Analyzer enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

    Booth: 418
  • G2 Deployment Advisors, comprised of a team of technology professionals with over 35 years of experience, is your authoritative source for network security, security policy automation, firewall & network change management and security intelligence.  We are a full service provider including enterprise solution sales, implementation & process design, deployment and training of fully vetted solutions.

    Booth: 509
  • Guidance Software is the purveyor of the market leading products EnCase eDiscovery, EnCase Cybersecurity, and EnCase Analytics. They empower organizations to respond to litigation discovery requests, perform sensitive data discovery for compliance purposes, conduct speedy and thorough security incident response, and reveal previously hidden advanced persistent threats or malicious insider activity. Learn more at

    Booth: 311
  • GuidePoint Security, LLC provides customized, innovative and valuable Information Security solutions and proven cybersecurity expertise that enable commercial and federal organizations to successfully achieve their security and business goals. By embracing new technologies, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at:

    Booth: 104
  • HTCIA continues to solidify its position as the leader in professional organizations devoted to the prevention, investigation and prosecution of crimes involving advanced technologies. Protecting Critical Infrastructure, which includes the generation of electricity, water, sewer, food production and transportation is one of our primary focuses. Understanding how Industrial Control Systems (ICS) are targeted help in the development of response guidelines and educating our members. Another area of concern is the threat of BioTech accidents or deliberate events. The organization faces many challenges, including how to best deliver high quality training to our members. We view these challenges as opportunities, but are determined to remain the premier professional organization concerned with high tech investigations.

    Booth: TBD
  • iboss cybersecurity defends organizations against advanced threats and data loss with innovative Web Security, Mobile Security and FireSphere™ APT defense. iboss’ patented, technology and advanced data protection tools provide visibility and control over all inbound/outbound data movement, allowing you to detect and mitigate the evasive infections other solutions miss.

    Booth: 511
  • Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. The company’s award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. Sensitive Data Manager discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.

    Booth: 204
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: 506
  • As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Booth: 301
  • Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

    Booth: 504
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: 515
  • ManagedMethods’ develops Cloud Access Security Broker solutions. Our mission is to provide customers with an easy to use, efficient and effective cloud security solution. We believe in the basics. You can’t secure what you don’t know exists. Shadow IT is a real problem, but it doesn’t need to be. With our products, companies can easily discover, monitor and control the use of cloud applications (SaaS) and reduce their cloud risk.

    Booth: 315
  • McAfee is the world’s largest dedicated security technology company. Delivering proactive and proven solutions and services that help secure systems and networks around the world, McAfee protects consumers and businesses of all sizes from the latest malware and emerging online threats. Our solutions are designed to work together, integrating antimalware, antispyware, and antivirus software with security management features that deliver unsurpassed real-time visibility and analytics, reduce risk, ensure compliance, improve Internet security, and help businesses achieve operational efficiencies.

    Booth: 426
  • Available as a highly-scalable on-premise or cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices. MobileIron is the only solution with DLP for native email, end-to-end apps security, and single-system scale of 100,000 devices. MobileIron is positioned in Gartner's Leaders Quadrant for Mobile Device Management.


    Booth: 403
  • NEDRIX (Northeast Disaster Recovery Information X-Change) is a non-profit organization, formed in 1991, that provides continuity and crisis management professionals access to real time governmental agencies information during a crisis or event. This is accomplished through our Public / Private Sector (PPS) Directive and our automated notification tool, NEDRIX Notify*.

    Booth: TBD
  • Netanium is an information technology security reseller and integrator focused on security solutions. We provide best-in-breed data and network security products and expert services to reduce exposure to information theft and destruction. Our sales and engineering professionals work with our clients to design and implement strategies, regulatory compliance, ongoing maintenance, support and training. Netanium specializes in IBM Qradar and Check Point and have certified engineers offering professional services and we are a Authorized Training center for Check Point Technologies.

    Booth: 100
  • ObserveIT, a pioneer in User Activity Monitoring, provides a new user-centric approach to IT security to address user-based attacks. ObserveIT provides video recordings of user activity, analytics and alerting to respond rapidly to security incidents and operationalize forensics. Over 1,200 companies use ObserveIT. Visit for more information.

    Booth: 503
  • Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

    Booth: 414
  • Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). 

    For more information, please visit

    Booth: 206
  • As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments.

    Organizations in a wide range of sectors—including government, defense, banking, and manufacturing—rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands.

    Booth: 300
  • Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

    Booth: 209
  • Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 3,500 organizations, including 30% of the Fortune 1000. From the endpoint to cloud, we provide comprehensive real-time data collection, advanced correlation, and unique insight into attacker techniques to fix critical vulnerabilities, stop attacks, and advance security programs.

    Booth: 112
  • Raytheon Cyber Products, a leading provider of commercial-off-the-shelf cyber security solutions for government and industry, is a wholly owned subsidiary of Raytheon Company.  Founded on deep knowledge of cyber security, the company’s portfolio of products address cyber challenges including insider threat, secure information sharing, data loss prevention, and data analysis. 

    Booth: 215
  • Resilient Systems (formerly Co3 Systems) empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s Incident Response Platform (IRP) arms teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter. Resilient’s customers are some of the world’s most trusted organizations.


    Booth: 512
  • Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal protection of critical information assets.

    Booth: 513
  • SecureAuth IdP is the only solution that combines SSO with native two-factor authentication in a single product across all platforms. In the same solution, SecureAuth includes Versatile Authentication (VAS) that enables IT to deploy single, two, or three-factor authentication to meet current and future regulatory requirements for cloud and web applications whether accessed from desktop or mobile device. Bringing the same level of security and control to cloud applications that enterprises experience with on-premise applications, SecureAuth IdP makes multi-product deployments obsolete while minimizing risk, increasing productivity, and reducing management costs. SecureAuth IdP has been deployed to over 7 million users worldwide with customers in financial services, healthcare, retail, government, and other industries.

    Booth: 412
  • SIM is an association of senior IT executives, prominent academicians, selected consultants, and other IT thought leaders built on the foundation of local chapters, who come together to share and enhance their rich intellectual capital for the benefit of its members and their organizations.

    Booth: TBD
  • Sophos makes IT security simple with complete solutions that protect networks, servers and devices, wherever they are located. Today, more than 100 million users in 150 countries and a global network of channel partners rely on Sophos for trusted solutions to complex security challenges. Focused on innovation and backed by a global network of SophosLabs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain and manage, enabling organizations to focus on performance and growth. Sophos – Security made Simple.  Learn more at

    Booth: 116
  • Founded by the leading privacy law expert Professor Daniel Solove, TeachPrivacy provides computer-based privacy and data security training specializing in many data security topics. Our training incorporates videos, quizzes and interactive elements which makes it highly engaging. Our philosophy is training that inspires employees to think and care.

    Booth: 309
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • Varonis is the foremost innovator and solution provider of comprehensive, actionable data governance solutions for unstructured and semi-structured data with over 4000 installations spanning leading firms in financial services, government, healthcare, energy, media, education, manufacturing and technology worldwide. Based on patented technology, Varonis' solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times.

    Booth: 106
  • Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice.

    As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility.

    Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

    Booth: 501
  • Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. Visit, follow on Twitter: @Veracode or read the Veracode Blog.

    Booth: 201
  • Websense, Inc., a global leader in unified web security, email security, and data loss prevention (DLP) solutions, delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as software, appliance and Security-as-a-Service (SaaS), Websense content security solutions help organizations leverage web 2.0 and cloud communication, collaboration, and social media while protecting from advanced persistent threats, preventing the loss of confidential information and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit

    Booth: 404