Seattle SecureWorld

2016 Exhibitors
  • Arbor Networks is the leading provider of network security and management solutions for enterprise and service provider networks. Arbor Networks protects enterprises from distributed denial of service attacks and advanced malware using Arbor’s global network intelligence. Arbor's proven solutions help grow and protect customer networks, businesses and brands.

    Booth: 224
  • Aruba Networks is a leading provider of next-generation network access solutions for mobile enterprises. Aruba’s MOVE architecture unifies wired and wireless infrastructures into one seamless access solution for corporate headquarters, remote workers and guests. This enables IT organizations to securely address the BYOD phenomenon, improving productivity and lowering overall costs.

    Booth: TBD
  • Carbon Black is the market leader in next-generation endpoint security. The company expects that by the end of 2015 it will achieve $70M+ in annual revenue, 70 percent growth, 7 million+ software licenses sold, almost 2,000 customers worldwide, partnerships with 60+ leading managed security service providers and incident response companies, and integrations with 30+ leading security technology providers. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2014 Awards, and a 2015 SANS survey found that Carbon Black is being used or evaluated by 68 percent of IR professionals. Companies of all sizes and industries—including more than 25 of the Fortune 100—use Carbon Black to increase security and compliance.

    Booth: 101
  • Centrify provides unified identity management across data center, cloud and mobile environments.  Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

    Booth: TBD
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: TBD
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: TBD
  • Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages and identify its security vulnerabilities.
    Checkmarx has been Ranked 2nd Fastest Growing Security Company by Deloitte in the latest EMEA Fast 500. www.checkmarx.com

    Booth: 304
  • As a provider of integrated, interoperable safety and security products and services, Cisco is helping to solve some of today?s toughest societal and business challenges. Governments, partners, and private institutions worldwide are using Cisco solutions to increase citizen safety and coordinate rapid responses to emergencies, while maximizing their technology investments.

    Booth: 208
  • The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

    Booth: TBD
  • CloudTalk Meetup’s is a community oriented group aimed at furthering the education in cloud computing. Our mission is to educate technology professionals in this fast paced technology as well as to promote cloud computing vendors and product developers in the local development community. Our meetup has over 700 registered cloudies with disciplined in dev/ops, IT Operations, Product Development and Business/Marketing. The forum provides a great place for professionals to collaborate, share ideas, foster creative brainstorming.

    We hold monthly local events and webinars with presentations delivered by a cloud computing vendor and industry experts that gives detailed technical overview of platforms, tools and industry best practices covering cloud, big data, IT, DR, telecom, security, mobile, social web…. The presentation can be followed with hands-on labs where attendees can experience the technology on their own. Some of the big cloud computing vendors who presented at our meetups are Microsoft Azure, Amazon AWS, VMWare’s CloudFoundry, Citrix’ CloudStack, RedHat’s OpenShift, CenturyLink CLC , IBM Cloud. We have big data companies such as Elasticsearch and DataMeer; DR and Data virtualization companies like DataGardens and Actifio.

    Booth: TBD
  • Column Information Security is an information security consultancy and solutions provider for enterprise, public sector and government organizations. We ensure mitigation of risk through strategic planning, building and operating security systems and programs, and implementation of industry leading technologies including SailPoint, CyberArk and Veracode. For more information, visit www.columninfosec.com

    Booth: TBD
  • CrowdStrike is a security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Utilizing Big-Data technologies, CrowdStrike is developing a new and innovative approach to solving today’s most demanding cyber-security challenges.

    Booth: 124
  • CrowdStrike is a security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Utilizing Big-Data technologies, CrowdStrike is developing a new and innovative approach to solving today’s most demanding cyber-security challenges.

    Booth: 124
  • CTIN has been providing high tech crime fighting training since 1996 in the areas of high-tech security, investigation, and prosecution of high-tech crimes for both private and public sector security and investigative personnel and prosecutors. CTIN sponsors training from experts world-wide for the benefit of private organizations and law enforcement agencies.

    Booth: TBD
  • Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

    Booth: 112
  • Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

    Booth: 112
  • Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance's award-winning product, CylancePROTECT(tm) stops what others don't, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Visit www.cylance.com or call

    877-973-3336 for more information.

    Booth: 152
  • Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance's award-winning product, CylancePROTECT(tm) stops what others don't, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Visit www.cylance.com or call

    877-973-3336 for more information.

    Booth: 152
  • Cyphort delivers the Adaptive Detection Fabric, an innovative, distributed software security layer which stops threats that go undetected by in-line security tools. Cyphort’s open fabric integrates with existing security tools, delivering continuous insight and analysis of web and email traffic, prioritizing threat alerts for security teams, and providing auto-mitigation capabilities.

    Booth: 206
  • Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in today’s mobile and distributed enterprise. Druva’s award-winning inSync and Phoenix solutions prevent data loss and address governance, compliance, and eDiscovery needs on laptops, smart-devices and remote servers. 

    Booth: TBD
  • The role of the U.S. Secret Service has gradually evolved since the agency's 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation's financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service's mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals - all of whom recognize new opportunities to expand and diversify their criminal portfolio.

    Booth: TBD
  • Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber

    Booth: 204
  • FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,700 customers across 67 countries, including over 157 of the Fortune 500.

    Booth: 108
  • FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,700 customers across 67 countries, including over 157 of the Fortune 500.

    Booth: 108
  • Forcepoint safeguards users, data and networks against the most determined adversaries, from insider threats to outside attackers, across the threat lifecycle – in the cloud, on the road, in the office. It simplifies compliance and enables better decision-making for more efficient remediation, empowering organizations to focus on what’s most important to them.

    Booth: TBD
  • SafeNet and Gemalto have joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used by more than 30,000 businesses and two billion people in more than 190 countries around the world. We support 3,000 financial institutions and secure more than 80% of the world’s intra-bank fund transfers, and protect the world’s leading software applications.

    Booth: 308
  • Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric™ and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently. As data volumes and network speeds grow and threats become more sophisticated, tools are increasingly overburdened. One hundred percent visibility is imperative. Gigamon is installed in more than three-quarters of the Fortune 100, more than half of the Fortune 500, and seven of the 10 largest service providers.

    Booth: TBD
  • GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com.

    Booth: TBD
  • IBM Security offers one of the world's broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio provides security intelligence to help protect identities, infrastructure, data and applications against advanced threats in today's hyper-connected world. For more information please visit us at: www.ibm.com/security

    Booth: 156
  • Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.

    Booth: TBD
  • Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success generating $164 million in 2014, with over 3,700 customers and 300 partners in more than 90 countries worldwide.

    Booth: 128
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: TBD
  • As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Booth: TBD
  • Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

    Booth: TBD
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: TBD
  • LogRhythm provides enterprise-class Log Management, Log Analysis and SIEM 2.0 solutions that empower organizations to comply with regulations, secure their networks and optimize IT operations. LogRhythm's rapidly growing customer base includes Fortune 500 corporations and midsize enterprises spanning a variety of industries including retail, financial services, utilities, healthcare and higher education as well as military and civilian government agencies and managed security service providers.

    Booth: 140
  • LogRhythm provides enterprise-class Log Management, Log Analysis and SIEM 2.0 solutions that empower organizations to comply with regulations, secure their networks and optimize IT operations. LogRhythm's rapidly growing customer base includes Fortune 500 corporations and midsize enterprises spanning a variety of industries including retail, financial services, utilities, healthcare and higher education as well as military and civilian government agencies and managed security service providers.

    Booth: 140
  • Malwarebytes provides anti-malware and anti-exploit software designed to protect users against zero-day threats that consistently escape detection by traditional endpoint security solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That’s why large Enterprise businesses worldwide, including Disney, Dole, and Samsung, trust Malwarebytes to protect their mission-critical data. For more information visit www.malwarebytes.com/business

    Booth: 334
  • NCC Group is a leading global information assurance firm, providing freedom from doubt that all critical material is available, protected, and operating as it should be at all times. Our Security Consulting services leverage our extensive knowledge of current security vulnerabilities, penetration testing techniques and software development best practices to enable organizations to secure their applications against ever-present threats. With one of the world’s largest security teams, we offer a unique set of skills, expertise and services across the world. www.nccgroup.trust

    Booth: 422
  • NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.

    Booth: 420
  • Seattle's largest ongoing monthly event with more than 5,600 members.

    New Tech Seattle is the place where you'll always make great connections, enjoy great food and drinks, learn about new companies doing cool things, laugh, smile, and have a fun night out. And most importantly, you'll discover the people, partners, organizations, and resources to help you to build your dreams.

    It's your community, we just love it and give everyone a place to play together. New Tech Seattle happens on the 2nd or 3rd Tuesday of every month. You can also join us on the 1st or 2nd Tuesday of every month at New Tech Eastside if you spend more time in Kirkland, Bellevue, Redmond, and the surrounding cities.

    Booth: TBD
  • The Northwest Tech Alliance (NWTA) is an independent technology association dedicated to bringing together some of the brightest minds from the technology industry.
    NWTA events are focused on helping attendees:
    · Network with other technology industry professionals
    · Provide education and information relative to the latest technologies and industry trends
    · Generate opportunities for personal, professional and business growth
    · Promote the Puget Sound area as a desirable place to start and grow successful technology companies
    · Learn about local food/chefs, wineries, breweries, and distilleries
    · Support local businesses and give back to the community
    · Build lifelong relationships

    Booth: TBD
  • The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.

    Booth: TBD
  • Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

    Booth: 112
  • Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 20Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Most recently, Palo Alto Networks has enabled enterprises to extend this same network security to remote users with the release of GlobalProtect™ and to combat targeted malware with its WildFire™ service. For more information, visit www.paloaltonetworks.com.

    Booth: 418
  • For three decades, PKWARE has provided encryption and compression software to more than 30,000 enterprise customers, including 200 government entities. Inventor of the .ZIP file format, PKWARE's smart encryption security solutions armor the data itself and eliminate vulnerabilities wherever data is used, shared, and stored.

    Booth: 232
  • Presidio is a leading $2.9 billion-dollar North American IT solutions provider focused on Digital Infrastructure, Cloud and Cyber Security. Presidio Cyber Security Solutions uses risk-based security methodology to support our customers with strategy development, assessments, compliance, architecture, integration and monitoring for a comprehensive information security program. Our vendor agnostic approach provides unique expertise on the latest threats, vulnerabilities, technologies, regulatory compliance and industry best practices. Presidio provides industry expert security consultants and leverages best of breed solutions to protect your business in the face of an ever-changing digital threat landscape.

    Booth: 418
  • Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). 

    For more information, please visit www.qualys.com.

    Booth: 312
  • Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

    Booth: 200
  • RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's technology, business and industry solutions - coupled with professional services and dozens of strategic third-party partnerships - help organizations bring trust to millions of user identities, the activities that they perform and the data that is generated.

    Booth: 108
  • RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's technology, business and industry solutions - coupled with professional services and dozens of strategic third-party partnerships - help organizations bring trust to millions of user identities, the activities that they perform and the data that is generated.

    Booth: 116
  • SecureAuth IdP is the only solution that combines SSO with native two-factor authentication in a single product across all platforms. In the same solution, SecureAuth includes Versatile Authentication (VAS) that enables IT to deploy single, two, or three-factor authentication to meet current and future regulatory requirements for cloud and web applications whether accessed from desktop or mobile device. Bringing the same level of security and control to cloud applications that enterprises experience with on-premise applications, SecureAuth IdP makes multi-product deployments obsolete while minimizing risk, increasing productivity, and reducing management costs. SecureAuth IdP has been deployed to over 7 million users worldwide with customers in financial services, healthcare, retail, government, and other industries.

    Booth: 162
  • Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.

    Booth: TBD
  • Spirent Communications is the industry leader in security and applications testing solutions.  Today’s IT needs granular visibility of data, giving rise to a new generation of network security solutions like Next Generation Firewalls, SDN, IDS, and IPS. To better-prepare and protect your network, Spirent offers state-of-the-art testing technology to help you gauge the performance and effectiveness of your security environment by emulating the most realistic traffic volumes, stressing with high rate DDoS attacks, assessing security strength with real threat and attack scenarios,  and testing security robustness with advanced fuzzing capabilities.

    Booth: TBD
  • Splunk® Inc. provides the engine for machine data. Splunk software collects, indexes and harnesses the machine data generated by the websites, applications, servers and mobile devices that power business. Over 4,000 customers use Splunk Enterprise and gain operational intelligence to improve service and uptime, reduce cost and mitigate cyber-security risk.

    Booth: 160
  • Structured is a leading information technology consultancy and systems integrator that has partnered with hundreds of clients throughout the U.S. to maximize the value of IT.

    For two decades, Structured consultants have collaborated with CIOs and IT departments to develop and implement technology strategies that drive measureable improvements throughout the organization.

    Booth: TBD
  • Symantec is a global leader in providing security, storage and systems management solutions to help our customers secure and manage their information and identities independent of device. Symantec does this by bringing together leading software and cloud solutions that work seamlessly across multiple platforms, giving customers the freedom to access, store and transmit information anytime, anywhere.

    Booth: 168
  • Tavve’s ZoneRanger is an application-layer proxy firewall for management protocols. This edge solution eliminates the need for open firewall ports and their corresponding firewall rules. The ZoneRanger is vendor independent supporting SNMP, ICMP, Syslog, Netflow, TACACS+, and numerous other management protocols. Current ZoneRanger environments support an extensive list of management applications, including Splunk, ArcSight, Solarwinds, HPNA, CA Unicenter. The ZoneRanger is installed at two of the top 10 banks in the US, as well as numerous financial institutions and credit card companies around the world.

    Booth: TBD
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • Tempered Networks meets the cyber security and connectivity needs for organizations who require uncompromised protection for business critical infrastructure. Our solution ‘cloaks’ critical systems, communications and endpoints, effectively rendering them invisible to all but trusted devices. Unlike traditional security solutions, our platform includes centralized orchestration of policies to reduce manual errors. 

    Booth: TBD
  • Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. We identify all of types of risk on the network—including missing patches, malware and intruders, missing configurations and missing monitoring. Our products reach across cloud, virtual, mobile and traditional IT systems. More than 24,000 organizations rely on Tenable, including the entire U.S. Department of Defense and many of the world’s largest companies and governments.

    Booth: 148
  • Thales e-Security is a leading global provider of data protection solutions with more than 40 years of experience securing the world’s most sensitive information. Thales customers —businesses, governments and technology vendors with a broad range of challenges—use our products and services to improve the security of applications that rely on encryption and digital signatures. By protecting the confidentiality, integrity, and availability of sensitive information that flows through today’s traditional, virtualized and cloud-based infrastructures, Thales helps organizations reduce risk, demonstrate compliance, enhance agility and pursue strategic goals with greater confidence. Thales solutions not only deliver high levels of assurance, backed by independent certifications, but also offer significant advantages in ease of deployment and ongoing management.

    Booth: TBD
  • ThreatTrack specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by businesses, enterprises and government agencies around the world. ThreatTrack develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats.

    Booth: TBD
  • As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

    Booth: 210
  • TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors. Founded in 2013, the Paris-based company produces the TrustInSoft Analyzer, an advanced static source code analyzer that enables software developers and integrators to exhaustively detect the most frequent and dangerous families of threats before deployment

    Booth: 228
  • Varonis is the foremost innovator and solution provider of comprehensive, actionable data governance solutions for unstructured and semi-structured data with over 4000 installations spanning leading firms in financial services, government, healthcare, energy, media, education, manufacturing and technology worldwide. Based on patented technology, Varonis' solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times.

    Booth: 418
  • Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice.

    As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility.

    Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

    Booth: TBD
  • Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. Visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog.

    Booth: 164
  • Veriato provides User Behavior Analytics and User Activity Monitoring solutions. 

    Over 36,000 organizations worldwide trust Veriato to gain insight into human activity on their network.

    Veriato's award-winning solutions include Veriato Recon (behavioral analytics based insider threat detection), 

    Veriato 360 (enterprise-grade User Activity Monitoring), and Veriato Investigator (employee investigation tool).

    Booth: 320
  • As one of the oldest and largest statewide technology trade associations in North America, we're passionate about promoting Washington as a desirable place to start and grow successful technology companies amid a strong and connected community. WTIA is the place to connect to Washington's technology industry.

    Booth: TBD
  • Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

    Booth: TBD
  • Zscaler's Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

    Booth: 220