Seattle SecureWorld

2015 Exhibitors
  • A10 Networks is a leader in Application Networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, California, and serves customers globally with offices worldwide.

    Booth: 164
  • Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones. Our customers rely on us to provide them with a unique and trusted layer of security so they can manage mobility while remaining firmly in control. Our Persistence technology is embedded into the core of most devices at the factory. Once activated, it provides you with comprehensive visibility into all of your devices enabling you to confidently manage mobility, investigate potential threats, and take action if a security incident occurs. No other technology can do this.

    Booth: 224
  • AirWatch by VMware is the leader in enterprise mobility management, with more than 15,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for bring your own device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at VMware is headquartered in Silicon Valley and can be found online at

    Booth: 148
  • Anitian is the most trusted name in information security. Founded in 1995, we advise clients on all matters of information security, risk, privacy, IT governance, and regulatory compliance. At Anitian, we believe good security can make the world a better place. Our mission is to craft security solutions that empower businesses and individuals to excel and innovate. To accomplish this, we hire world-class experts who share our practical, pragmatic approach to security and leverage the time-honored principles of the Scientific Method to deliver reliable, sustainable results.

    Booth: 322
  • Arbor Networks is the leading provider of network security and management solutions for enterprise and service provider networks. Arbor Networks protects enterprises from distributed denial of service attacks and advanced malware using Arbor’s global network intelligence. Arbor's proven solutions help grow and protect customer networks, businesses and brands.

    Booth: 152
  • Aruba Networks is a leading provider of next-generation network access solutions for mobile enterprises. Aruba’s MOVE architecture unifies wired and wireless infrastructures into one seamless access solution for corporate headquarters, remote workers and guests. This enables IT organizations to securely address the BYOD phenomenon, improving productivity and lowering overall costs.

    Booth: 132
  • Bit9 + Carbon Black is the market leader in next-generation endpoint security. The company expects that by the end of 2015 it will achieve $70M+ in annual revenue, 70 percent growth, 7 million+ software licenses sold, almost 2,000 customers worldwide, partnerships with 60+ leading managed security service providers and incident response companies, and integrations with 30+ leading security technology providers. Bit9 + Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2014 Awards, and a 2015 SANS survey found that Carbon Black is being used or evaluated by 68 percent of IR professionals. Companies of all sizes and industries—including more than 25 of the Fortune 100—use Bit9 + Carbon Black to increase security and compliance.

    Booth: 100
  • Blue Coat Systems secures and optimizes the flow of information to any user, on any network with leading web security and WAN Optimization solutions. Blue Coat enables the enterprise to tightly align network investments with business objectives, speed decision making and secure business applications for a long-term competitive advantage.

    Booth: 346
  • Bromium has pioneered new endpoint security technologies that protect enterprises from advanced threats. Rather than relying on detection to prevent attacks, Bromium leverages hardware-enforced isolation to protect endpoints from even “undetectable” threats, while providing actionable intelligence on malware behavior - enabling IT to understand attack intents and bolster existing defenses.


    Booth: 348
  • Certes Networks protects data in motion. Certes’ award-winning CryptoFlow™ Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any network without compromising network or application performance. Companies around the world rely on Certes’ encryption products to protect critical data simply and easily. Learn more:

    Booth: 210
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: 160
  • The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

    Booth: TBD
  • CloudTalk Meetup’s is a community oriented group aimed at furthering the education in cloud computing. Our mission is to educate technology professionals in this fast paced technology as well as to promote cloud computing vendors and product developers in the local development community. Our meetup has over 700 registered cloudies with disciplined in dev/ops, IT Operations, Product Development and Business/Marketing. The forum provides a great place for professionals to collaborate, share ideas, foster creative brainstorming.

    We hold monthly local events and webinars with presentations delivered by a cloud computing vendor and industry experts that gives detailed technical overview of platforms, tools and industry best practices covering cloud, big data, IT, DR, telecom, security, mobile, social web…. The presentation can be followed with hands-on labs where attendees can experience the technology on their own. Some of the big cloud computing vendors who presented at our meetups are Microsoft Azure, Amazon AWS, VMWare’s CloudFoundry, Citrix’ CloudStack, RedHat’s OpenShift, CenturyLink CLC , IBM Cloud. We have big data companies such as Elasticsearch and DataMeer; DR and Data virtualization companies like DataGardens and Actifio.

    Booth: TBD
  • CrowdStrike is a security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Utilizing Big-Data technologies, CrowdStrike is developing a new and innovative approach to solving today’s most demanding cyber-security challenges.

    Booth: 226
  • CTIN has been providing high tech crime fighting training since 1996 in the areas of high-tech security, investigation, and prosecution of high-tech crimes for both private and public sector security and investigative personnel and prosecutors. CTIN sponsors training from experts world-wide for the benefit of private organizations and law enforcement agencies.

    Booth: TBD
  • Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

    Booth: 426
  • Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats.

    Booth: 230
  • Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort’s software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization’s virtual, physical and cloud infrastructure against sophisticated attacks. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in Santa Clara, California.

    Booth: 352
  • Damballa discovers active threats that bypass all security prevention layers. Damballa has a unique understanding of malicious network behaviors that expose the difference between legitimate users and threat actors.

    Booth: 432
  • Digital Guardian is Security’s Change Agent—the only patented data protection platform trusted on millions of endpoints to secure against insider and outsider threats.

    Installed in the kernel of the OS, the Digital Guardian agent sees and classifies every piece of data as it is in motion. The agent then automatically adds a security tag to each individual piece of data that dictates customized permissions, taking into account the type, content, and author of the data. This means your data is protected and context-aware. The DG agent will automatically prompt or block an activity depending on the context, then log and audit the event for forensic follow-up. This data-centric approach streamlines incident response and containment, cutting security cycle times from days or hours to minutes.

    Booth: 116
  • FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,700 customers across 67 countries, including over 157 of the Fortune 500.

    Booth: 168
  • FireMon is the industry leader in providing enterprises, governments and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite Security Manager, Policy Planner and Risk Analyzer enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

    Booth: 162
  • ForeScout is the leading provider of clientless network access control (NAC) and policy compliance management for the global enterprise. We introduced our flagship CounterACT family of products in 2005, helping to pioneer and evolve the NAC industry. Our technology was developed in close partnership with our customers, and is differentiated by its ability to simplify the arduous tasks of access control and policy management. Today, CounterACT is trusted and proven in over 500 Fortune -1000 enterprises and government/military agencies worldwide, where it serves to enforce security-policy compliance and enable streamlined business processes.

    Booth: 124
  • Guidance Software is the purveyor of the market leading products EnCase eDiscovery, EnCase Cybersecurity, and EnCase Analytics. They empower organizations to respond to litigation discovery requests, perform sensitive data discovery for compliance purposes, conduct speedy and thorough security incident response, and reveal previously hidden advanced persistent threats or malicious insider activity. Learn more at

    Booth: 350
  • Hexis Cyber Solutions, a KEYW Company, provides cybersecurity solutions for commercial companies and government agencies. Hexis’ HawkEye products offer active, multi-disciplined approaches to achieve higher standards of cybersecurity that is based on our expertise supporting mission-grade cybersecurity.  Hexis is the first to bring automated malware removal to the commercial marketplace.

    Booth: 430
  • HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure— especially in light of the concentration of risk that occurs within virtualization and cloud environments.

    Booth: TBD
  • IBM Security offers one of the world?s broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio provides security intelligence to help protect identities, infrastructure, data and applications against advanced threats in today?s hyper-connected world. For more information please visit us at:

    Booth: 172
  • Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.

    Booth: TBD
  • Imperva is the global leader in data security. Thousands of the world?s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent data breaches, meet compliance mandates, and manage data risk. Underscoring Imperva?s commitment to data security excellence, the Imperva Application Defense Center (ADC) is a world-class security research organization that maintains SecureSphere?s cutting edge protection against evolving threats.

    Booth: 128
  • Infoblox is a global leader in automated IT network control solutions.  Our appliance platforms combine real-time IP address management (IPAM) with network configuration and change capabilities.  The solutions help Infoblox’s more than 5,000 end customers achieve more dynamic and reliable networks, and value from their virtualization and cloud computing initiatives.

    Booth: 330
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: TBD
  • As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Booth: TBD
  • Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

    Booth: TBD
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: TBD
  • In 1999, Kaspersky Lab was the first company to introduce integrated antivirus software for workstations, file servers and application servers running on Linux/FreeBSD operating systems. Today, the company offers a whole range of effective corporate security solutions for the most popular operating systems specifically designed for different types of businesses. The company?s product range covers all of the main information security requirements that businesses and large state organizations have to adhere to, including: excellent protection levels, adaptability to changing circumstances, scalability, compatibility with different platforms, high performance, high fault tolerance, ease of use and high value.

    One of the primary advantages of Kaspersky Lab?s corporate range is the easy, centralized management provided by Kaspersky Security Center that extends to the entire network regardless of the number and type of platforms used.

    Booth: 306
  • Booth: 408
  • LockPath helps organizations bring order to the chaos of information governance, compliance, risk management (GRC) and IT security with its customizable, easy-to-use GRC software. LockPath’s Keylight platform is used to automate business processes, reduce enterprise risk, eliminate redundancy, and demonstrate regulatory compliance. Keylight provides the most efficient path to audit-readiness.

    Booth: 108
  • LogRhythm provides enterprise-class Log Management, Log Analysis and SIEM 2.0 solutions that empower organizations to comply with regulations, secure their networks and optimize IT operations. LogRhythm's rapidly growing customer base includes Fortune 500 corporations and midsize enterprises spanning a variety of industries including retail, financial services, utilities, healthcare and higher education as well as military and civilian government agencies and managed security service providers.

    Booth: 212
  • Malwarebytes Anti-Malware hunts down most often zero-day or zero-hour malware, a term our community uses to explain malware that has been newly created and released on the web. Zero-hour malware can be any type of malware out there that traditional antivirus products have a hard time detecting, so it's an additional security measure to protect the user from the kind of malware they are most likely to encounter while surfing the web. Most zero-hour malware is distributed in drive-by exploits or even via hacked accounts such as Facebook, Twitter or Skype. Some of the most commonly detected malware by our products include the Zeus banker Trojan, as well as other Trojan malware with the same purpose, such as Reveton ransomware and other types of ransomware that attempt to extort users into paying ridiculous fee, and an array of fake antivirus software (we call them rogue antivirus) that usually allow additional malware to be installed.

    Booth: 136
  • McAfee is the world’s largest dedicated security technology company. Delivering proactive and proven solutions and services that help secure systems and networks around the world, McAfee protects consumers and businesses of all sizes from the latest malware and emerging online threats. Our solutions are designed to work together, integrating antimalware, antispyware, and antivirus software with security management features that deliver unsurpassed real-time visibility and analytics, reduce risk, ensure compliance, improve Internet security, and help businesses achieve operational efficiencies.

    Booth: 144
  • Netskope™ is the leader in safe cloud enablement. Only the Netskope Active Platform™ enables you to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. To learn more, visit or follow us on Twitter @Netskope.

    Booth: 134
  • Seattle's largest ongoing monthly event with more than 5,600 members.

    New Tech Seattle is the place where you'll always make great connections, enjoy great food and drinks, learn about new companies doing cool things, laugh, smile, and have a fun night out. And most importantly, you'll discover the people, partners, organizations, and resources to help you to build your dreams.

    It's your community, we just love it and give everyone a place to play together. New Tech Seattle happens on the 2nd or 3rd Tuesday of every month. You can also join us on the 1st or 2nd Tuesday of every month at New Tech Eastside if you spend more time in Kirkland, Bellevue, Redmond, and the surrounding cities.

    Booth: TBD
  • The Northwest Tech Alliance (NWTA) is an independent technology association dedicated to bringing together some of the brightest minds from the technology industry.
    NWTA events are focused on helping attendees:
    · Network with other technology industry professionals
    · Provide education and information relative to the latest technologies and industry trends
    · Generate opportunities for personal, professional and business growth
    · Promote the Puget Sound area as a desirable place to start and grow successful technology companies
    · Learn about local food/chefs, wineries, breweries, and distilleries
    · Support local businesses and give back to the community
    · Build lifelong relationships

    Booth: TBD
  • The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.

    Booth: TBD
  • OpenDNS is the world’s largest Internet-wide security network, protecting two percent of the Internet’s active users every day. The cloud-based OpenDNS service delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. OpenDNS is easy to deploy and manage, with no hardware or software to install, no need to reconfigure networks and no new latency.

    Booth: 220
  • Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

    Booth: 414
  • Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). 

    For more information, please visit

    Booth: 424
  • As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments.

    Organizations in a wide range of sectors—including government, defense, banking, and manufacturing—rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands.

    Booth: 428
  • Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

    Booth: 200
  • RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's technology, business and industry solutions - coupled with professional services and dozens of strategic third-party partnerships - help organizations bring trust to millions of user identities, the activities that they perform and the data that is generated.

    Booth: 156
  • SafeNet and Gemalto have joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used by more than 30,000 businesses and two billion people in more than 190 countries around the world. We support 3,000 financial institutions and secure more than 80% of the world’s intra-bank fund transfers, and protect the world’s leading software applications.

    Booth: 422
  • Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal protection of critical information assets.

    Booth: 344
  • Skyhigh Networks, the cloud access security company, enables companies to embrace cloud services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a “Cool Vendor” by Gartner, Inc. For more information, visit us at or follow us on Twitter @skyhighnetworks.

    Booth: 342
  • Solutions II is nationally recognized for world-class innovation in information and network security, virtualization, business continuance, and data lifecycle management. We deliver comprehensive security solutions and competitively priced security services to many industry verticals. We empower enterprises to achieve a business enabled defense-in-depth security posture, manage corporate risk, improve compliance, and attain proactive detection and prevention of security threats to their computing infrastructure, data, and applications. Solutions II’s commitment of bringing best-of-breed solutions to Clients includes a professional services practice dedicated to increasing customer service levels and decreasing the time and support required for implementations.

    Booth: 208
  • Structured is a leading information technology consultancy and systems integrator that has partnered with hundreds of clients throughout the U.S. to maximize the value of IT.

    For two decades, Structured consultants have collaborated with CIOs and IT departments to develop and implement technology strategies that drive measureable improvements throughout the organization.

    Booth: 206
  • Symantec is a global leader in providing security, storage and systems management solutions to help our customers secure and manage their information and identities independent of device. Symantec does this by bringing together leading software and cloud solutions that work seamlessly across multiple platforms, giving customers the freedom to access, store and transmit information anytime, anywhere.

    Booth: 228
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • Thales e-Security is a leading global provider of data protection solutions with more than 40 years of experience securing the world’s most sensitive information. Thales customers —businesses, governments and technology vendors with a broad range of challenges—use our products and services to improve the security of applications that rely on encryption and digital signatures. By protecting the confidentiality, integrity, and availability of sensitive information that flows through today’s traditional, virtualized and cloud-based infrastructures, Thales helps organizations reduce risk, demonstrate compliance, enhance agility and pursue strategic goals with greater confidence. Thales solutions not only deliver high levels of assurance, backed by independent certifications, but also offer significant advantages in ease of deployment and ongoing management.

    Booth: 326
  • As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

    Booth: 216
  • Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at or follow us @TripwireInc on Twitter.

    Booth: 140
  • Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice.

    As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility.

    Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

    Booth: 128
  • Verisign powers the invisible navigation that takes people to where they want to go on the Internet. The company operates the infrastructure for a portfolio of top-level domains, including .com and .net, and offers a suite of infrastructure assurance services—including Managed DNS, DDoS Protection and iDefense Security Intelligence Services.

    Booth: 340
  • As one of the oldest and largest statewide technology trade associations in North America, we're passionate about promoting Washington as a desirable place to start and grow successful technology companies amid a strong and connected community. WTIA is the place to connect to Washington's technology industry.

    Booth: TBD
  • WatchGuard builds affordable, all-in-one network and content security solutions to provide defense in depth for corporate content, networks and the businesses they power. WatchGuard's award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions.

    Booth: 406
  • Websense, Inc., a global leader in unified web security, email security, and data loss prevention (DLP) solutions, delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as software, appliance and Security-as-a-Service (SaaS), Websense content security solutions help organizations leverage web 2.0 and cloud communication, collaboration, and social media while protecting from advanced persistent threats, preventing the loss of confidential information and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit

    Booth: 434
  • Zscaler's Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

    Booth: 320