Seattle SecureWorld

2014 Exhibitors
  • Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

    Booth: TBD
  • Agari collects and analyzes terabytes of email data to provide global brands with a SaaS security solution that eliminates email threats, protects consumer information, and proactively guards brand reputation. To date, Agari has analyzed over 1 trillion email messages, blocked over 1 billion malicious emails, and secures more than 80 percent of US consumer email inboxes.

    Booth: 503
  • Allgress provides affordable solutions that allow CIOs and CISOs to better plan, analyze, manage, and communicate IT security, and to help non-IT managers better understand the business risk inherent in every security decision.

    Booth: 402
  • Booth: TBD
  • Anitian is the most trusted name in information security. Founded in 1995, we advise clients on all matters of information security, risk, privacy, IT governance, and regulatory compliance. At Anitian, we believe good security can make the world a better place. Our mission is to craft security solutions that empower businesses and individuals to excel and innovate. To accomplish this, we hire world-class experts who share our practical, pragmatic approach to security and leverage the time-honored principles of the Scientific Method to deliver reliable, sustainable results.

    Booth: TBD
  • Aveksa provides the industry's leading Business-Driven Identity and Access Management platform. Aveksa provides a robust way for organizations to shift the accountability and responsibility for making access decisions away from Information Security, and out to the line of business, while enforcing policies and maintaining oversight. Aveksa achieves this by managing the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation.

    Booth: 327
  • With over 11,000 customers worldwide, Axway delivers industry-leading technology solutions that enable secure enterprise collaboration and integrate the governance, security and community management capabilities organizations need to mitigate risk. Offered on premise, virtual appliance, or in the Cloud, Axway?s offerings include award-winning products for secure email & collaborative file sharing, policy-based encryption, and identity validation.

    Booth: 504
  • Since its inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal, in many cases leading the way in the best Internet security detection techniques to prevent the spread of malicious threats.

    The Bitdefender proprietary technologies, based on innovative ideas and leading trends in the information security industry, continue to be internationally recognized as the best Internet security software. The independent organizations which reward our outstanding results through numerous prizes and certifications are: Av-Test.org, Virus Bulletin, ICSA Lab, Checkmark, PC World Top 100, just to name but a few.

     

    Booth: TBD
  • Centrify provides unified identity services across data center, cloud and mobile ? resulting in one single login for users and one unified identity infrastructure for IT. Centrify?s software and cloud services let organizations securely leverage their existing identity infrastructure to centrally manage authentication, access control, privilege management, policy enforcement and compliance across on-premise and cloud resources.

    Booth: 122
  • Cenzic provides the leading application security intelligence platform to continuously assess Cloud, Mobile and Web applications to reduce online security risk. Cenzic?s solutions scale from a single application to enterprise-level deployments that enable application assessment at optimal levels.

    Cenzic?s solutions are used across the entire software development lifecycle, and most importantly in production, to protect against new threats even after an application has been deployed. Cenzic?s application security intelligence platform identifies vulnerabilities and provides risk mitigation recommendations. Today, Cenzic secures more than half a million online applications and trillions of dollars of commerce for Fortune 1000 companies, all major security companies, government agencies, universities and SMBs.

    Booth: 206
  • The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

    Booth: 408
  • Code 42 Software has been protecting the world’s information since 2001. Its enterprise backup solution, CrashPlan PROe, provides people-friendly, enterprise-tough backup. Engineered with laptops in mind, it’s continuous backup that won’t slow you down, and its self-service restores free up IT.

    Booth: 508
  • Core Security’s predictive security intelligence solutions help enterprise and government clients preempt critical threats throughout their IT environments, and communicate the associated business risks. Intrinium Networks is a premier provider of IT and IT security consulting. Intrinium assists organizations with their Information Technology challenges through assessment, audit, monitoring and management.

    Booth: TBD
  • CrowdStrike is a security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Utilizing Big-Data technologies, CrowdStrike is developing a new and innovative approach to solving today’s most demanding cyber-security challenges.

    Booth: 414
  • CTIN has been providing high tech crime fighting training since 1996 in the areas of high-tech security, investigation, and prosecution of high-tech crimes for both private and public sector security and investigative personnel and prosecutors. CTIN sponsors training from experts world-wide for the benefit of private organizations and law enforcement agencies.

    Booth: 411
  • Damballa discovers active threats that bypass all security prevention layers. Damballa has a unique understanding of malicious network behaviors that expose the difference between legitimate users and threat actors.

    Booth: 304
  • Deja vu Security, a Seattle-based security firm, focuses on helping its clients build secure solutions. It is an industry leader in secure development, security fuzz testing, embedded device security, and penetration testing. Deja vu Security’s widely adopted security fuzzing platform, Peach Enterprise Fuzzer, can help you find unknown vulnerabilities.

    Booth: 502
  • DomainTools offers the most comprehensive searchable database of domain name registration and hosting data. The Company's comprehensive snapshots of past and present domain name registration, ownership and usage data, in addition to powerful research and monitoring resources, help customers by unlocking everything there is to know about a domain name. 

    Booth: 317
  • Emerging Threats is a world-leading provider of commercial and open source threat intelligence. The company's ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, SNORT®, and other network intrusion protection and detection systems. The ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.

    Booth: 509
  • A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.

    Booth: 505
  • ePlus, Inc. is a leading integrator of Technology & Security solutions.  We enable organizations to optimize their IT infrastructures by delivering world-class solutions from top manufactures, managed/professional services, flexible financing and ePlus Advantage methodology.  With our core focus areas in security, data center/cloud computing, collaboration, IT infrastructure, services and security.

    Booth: 403
  • FishNet Security, the No. 1 provider of information security solutions that combine technology, services, support and training, enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to more than 5,000 clients nationwide. For more information about FishNet Security, visit www.fishnetsecurity.com.

    Booth: TBD
  • Guidance Software is the purveyor of the market leading products EnCase eDiscovery, EnCase Cybersecurity, and EnCase Analytics. They empower organizations to respond to litigation discovery requests, perform sensitive data discovery for compliance purposes, conduct speedy and thorough security incident response, and reveal previously hidden advanced persistent threats or malicious insider activity. Learn more at www.encase.com.

    Booth: 500
  • HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market-leading products from HP ArcSight, HP Fortify, HP Atalla, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today?s hybrid IT infrastructure from sophisticated cyber threats.

    Booth: TBD
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: 322
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: 310
  • Ixia provides the industry's most comprehensive converged IP network validation and network visibility solutions. Ixia solutions test, assess and optimize networks and data centers to accelerate and secure application delivery.

    Only Ixia delivers complete visibility into your network, data center, and the applications and services that fuel your business. From the lab to the network to the cloud, Ixia solutions optimize networks and data centers to accelerate, secure, and scale the delivery of applications and services.

    Ixia solutions are the industry's most scalable, easy-to-use, and adaptable, automatically providing companies with the most comprehensive coverage of the latest applications and security attacks in order to optimize performance and protect against threats.

    Booth: 211
  • Juniper Networks is revolutionizing the economics of global information exchange. Our purpose-built, high-performance IP platforms enable customers to support many different services and applications at scale. Service providers, enterprises, governments, and research and education institutions worldwide rely on the company to deliver products for building networks that are tailored to the individual needs of their users, services, and applications.

    Booth: 111
  • Maclear is a firm specializing in enterprise Governance, Risk and Compliance (eGRC) that help mid-sized organizations in various industries to manage their regulatory requirements while mitigating risk to acceptable levels. The Maclear eGRC Suite™ is a true enterprise-class GRC solution and is designed to increase collaboration between Risk Managers, Compliance Managers, Auditors, and other stakeholders. Combined with a complete suite of web-based, fully integrated drag and drop applications, the solution enables businesses to address their risk management, policy, compliance, internal audit, IT GRC and vendor governance needs on a single platform. The Maclear eGRC Suite™ is a flexible and scalable solution that requires very little ramp up time making us a leader in the market.

    Booth: 407
  • Mandiant is the information security industry?s leading provider of advanced threat detection and incident response solutions and services. Mandiant provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and leading U.S. law firms.

    Booth: 311
  • McGladrey LLP is the fifth largest U.S. provider of assurance, tax and consulting services, with over 6500 professionals in more than 70 offices nationwide, and is a member of the global RSM firms, with more than 32,000 professionals in 102 countries.  Our Security and Privacy consulting practice provides broad and deep Security and Privacy domain experience to serve all of our clients’ Information Security needs.

    Booth: 200
  • MediaPro is the leading provider of web-based information security and privacy awareness courseware, both off-the-shelf and custom.  Our clients leverage a content library that allows them to “mix and match” topics to meet their needs.  We also offer a full complement of awareness reinforcement materials, LMS hosting, and localizations services.

    Booth: 501
  • Network Computing Architects Inc. (NCA) is a solution provider that can help your business identify, develop and integrate the right technologies—for the right reasons, at the right time—there's no better technology partner than NCA.

    Booth: 507
  • Network Critical’s focus is helping our customers improve their ability to meet the exploding IT Security and Compliance requirements while maximizing their investments in expensive monitoring and security appliances. We’ve dramatically simplified the process of getting the right information to the right tools at the right time improving efficiency & reducing costs.

    Booth: 325
  • The Northwest Tech Alliance (NWTA) is an independent technology association dedicated to bringing together some of the brightest minds from the technology industry.
    NWTA events are focused on helping attendees:
    · Network with other technology industry professionals
    · Provide education and information relative to the latest technologies and industry trends
    · Generate opportunities for personal, professional and business growth
    · Promote the Puget Sound area as a desirable place to start and grow successful technology companies
    · Learn about local food/chefs, wineries, breweries, and distilleries
    · Support local businesses and give back to the community
    · Build lifelong relationships

    Booth: 415
  • The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.

    Booth: 405
  • Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). 

    For more information, please visit www.qualys.com.

    Booth: TBD
  • Radware, the global leader in integrated application delivery solutions, assures full availability, maximum performance, and complete security of business-critical applications. With APSolute™, Radware’s award-winning suite of intelligent front end, access, and security products, companies drive business productivity, improve profitability,and reduce IT operating-infrastructure costs by making their networks “business-smart”.

    Booth: TBD
  • In order to support the ever increasing IT workload, new platforms are emerging as a means to help mitigate complexity and reduce the overall risk. Every day, RedSeal gathers the configurations of all the network devices: firewalls, routers, mobile device controllers and load balancers, building a virtual model of your network by analyzing how the rules on all of these devices work together to defend business assets. In turn, it can validate these access configurations against governmental and industry-driven regulations as well as internally defined security policies.

    Booth: 404
  • SafeNet is a leading global provider of data protection. For over 25 years, Fortune 500 global corporations and government agencies have turned to SafeNet to secure and protect their most valuable data assets and intellectual property. SafeNet?s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

    Booth: TBD
  • SAINT Corporation offers integrated vulnerability assessment, penetration testing, and security checklist compliance. Examine your network with the SAINT® vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with the SAINTexploit® penetration testing tool and exploit the vulnerability to prove its existence.

    Booth: 410
  • Seattle's largest monthly event hosts 5 innovative companies demoing new technology in front of over 350 members of the Seattle tech community. Tap into technology driven companies of all sizes and groups who are doing great things in the Greater Seattle Area community.

    Booth: TBD
  • Skybox Security provides powerful risk analytics that give security teams the intelligence needed to eliminate attack vectors, respond to threats and improve security processes. Our solutions are used for enterprise-scale vulnerability and threat management, firewall management and compliance monitoring.

    Booth: 313
  • Sophos is a leader in IT security and data protection. They offer organizations complete protection and control defending against known and unknown malware, spyware, intrusions, unwanted applications, spam, policy abuse and data leakage, and providing comprehensive network access control (NAC). Their reliably engineered, easy-to-operate products protect over 100 million users in more than 150 countries. Their vision, commitment to research and development, and rigorous attention to quality have enabled them to maintain strong year-on-year growth and the highest levels of customer satisfaction in the industry.

    Booth: 400
  • We are the second largest private solution provider of information security & infrastructure solutions. By combining our unmatched expertise, our delivery of the industry’s best practices, our trusted partners’ cutting-edge solutions, and the resources of Forsythe behind us, we are able to deliver the design to secure your network. www.securesos.com

    Booth: 500
  • Stroz Friedberg is a global leader in investigations, intelligence, and risk services. We are a collection of the brightest minds in the fields of Digital Forensics, Incident Response, Security Science, Intelligence, Investigations, Data Discovery, Forensic Accounting, and Compliance Navigation. Our single firm does it all. We are driven by a guiding purpose: Seek Truth.

    Booth: 315
  • Structured is a leading information technology consultancy and systems integrator that has partnered with hundreds of clients throughout the U.S. to maximize the value of IT.

    For two decades, Structured consultants have collaborated with CIOs and IT departments to develop and implement technology strategies that drive measureable improvements throughout the organization.

    Booth: 412
  • Founded in 1997, Sword & Shield Enterprise Security, Inc. is an information security consulting company and "Your Partner for a Secure Future". We excel in security solutions to meet the most demanding security requirements of IT environments with enterprise-wide protection to reduce the security risks posed against organizations. Providing world-class network security is our only business. Our consulting services are available to assist you in all aspects of the security life-cycle: planning, specification, design, installation, deployment, integration, operations, support, testing, policy development and compliance reporting.

    Booth: 331
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • Townsend Security creates data privacy solutions that help organizations meet evolving compliance requirements and mitigate the risk of data breaches. Over 3,000 companies trust Townsend Security’s NIST and FIPS 140-2 certified solutions to meet the encryption and key management requirements in PCI DSS, HIPAA/HITECH, FISMA, GLBA/FFIEC, and other compliance requirements.

    Booth: 316
  • As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we?re recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

    Booth: 201
  • Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.

    Booth: 208
  • UnifyCloud is a global software development and consulting firm specializing in Big Data and Cloud Computing. Wowrack is a Global Cloud Service provider. We offer various Hosting services, including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Bandwidth Deliver and Managed Services.

    Booth: 413
  • Unisys Stealth™ Solution Suite is a visionary approach to security. It is designed to secure your infrastructure by cloaking data communication end points, making them appear invisible to outside hackers and to reduce your infrastructure management costs by segmenting the network virtually, not physically. Without having to reconfigure your network, Stealth enables you to achieve a combination of defense-grade security, flexibility and business value. For more information visit: www.unisys.com/stealth

    Booth: 406
  • Varonis is the foremost innovator and solution provider of comprehensive, actionable data governance solutions for unstructured and semi-structured data with over 4000 installations spanning leading firms in financial services, government, healthcare, energy, media, education, manufacturing and technology worldwide. Based on patented technology, Varonis' solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times.

    Booth: 319
  • As one of the oldest and largest statewide technology trade associations in North America, we're passionate about promoting Washington as a desirable place to start and grow successful technology companies amid a strong and connected community. WTIA is the place to connect to Washington's technology industry.

    Booth: 302
  • WatchGuard builds affordable, all-in-one network and content security solutions to provide defense in depth for corporate content, networks and the businesses they power. WatchGuard's award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions.

    Booth: 507
  • Websense, Inc., a global leader in unified web security, email security, and data loss prevention (DLP) solutions, delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as software, appliance and Security-as-a-Service (SaaS), Websense content security solutions help organizations leverage web 2.0 and cloud communication, collaboration, and social media while protecting from advanced persistent threats, preventing the loss of confidential information and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com.

    Booth: 119
  • Zones simplifies information technology by providing end-to-end capabilities and acting as a singular point of contact for hardware solutions and software licensing. Our expertise carries over to Zones lifecycle management services such as technology assessments, data center engineering, virtualization and cloud computing planning, and software asset management.

    Booth: 323