Seattle SecureWorld

2015 Exhibitors
  • Environmentally responsible IT asset disposition, e-waste recycling and secure data destruction – including onsite shredding - for enterprise organizations, data centers, and government. R2:2013 and ISO 14001 certified recycler. We can manage all packing and logistics, as well as decommissioning projects, both large and small. Locally owned and operated since 2003.

    See what our mobile shredder can do to your hard drives!

    Booth: 316
  • A10 Networks is a leader in Application Networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, California, and serves customers globally with offices worldwide.

    Booth: 164
  • Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones. Our customers rely on us to provide them with a unique and trusted layer of security so they can manage mobility while remaining firmly in control. Our Persistence technology is embedded into the core of most devices at the factory. Once activated, it provides you with comprehensive visibility into all of your devices enabling you to confidently manage mobility, investigate potential threats, and take action if a security incident occurs. No other technology can do this.

    Booth: 224
  • AccelOps provides SIEM software to create analytics-driven IT Operations Management for cloud, virtualized and legacy infrastructures. We manage security, performance, availability and compliance, all on a single screen. The network monitoring software of AccelOps automatically discovers, analyzes and automates IT issues in machine and big data across organizations’ data centers and cloud resources, spanning servers, storage, networks, security, applications and users.

    Booth: 300
  • AirWatch by VMware is the leader in enterprise mobility management, with more than 15,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for bring your own device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at VMware is headquartered in Silicon Valley and can be found online at

    Booth: 148
  • Anitian is the most trusted name in information security. Founded in 1995, we advise clients on all matters of information security, risk, privacy, IT governance, and regulatory compliance. At Anitian, we believe good security can make the world a better place. Our mission is to craft security solutions that empower businesses and individuals to excel and innovate. To accomplish this, we hire world-class experts who share our practical, pragmatic approach to security and leverage the time-honored principles of the Scientific Method to deliver reliable, sustainable results.

    Booth: 322
  • Arbor Networks is the leading provider of network security and management solutions for enterprise and service provider networks. Arbor Networks protects enterprises from distributed denial of service attacks and advanced malware using Arbor’s global network intelligence. Arbor's proven solutions help grow and protect customer networks, businesses and brands.

    Booth: 152
  • Aruba Networks is a leading provider of next-generation network access solutions for mobile enterprises. Aruba’s MOVE architecture unifies wired and wireless infrastructures into one seamless access solution for corporate headquarters, remote workers and guests. This enables IT organizations to securely address the BYOD phenomenon, improving productivity and lowering overall costs.

    Booth: 132
  • Bit9 + Carbon Black is the market leader in next-generation endpoint security. The company expects that by the end of 2015 it will achieve $70M+ in annual revenue, 70 percent growth, 7 million+ software licenses sold, almost 2,000 customers worldwide, partnerships with 60+ leading managed security service providers and incident response companies, and integrations with 30+ leading security technology providers. Bit9 + Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2014 Awards, and a 2015 SANS survey found that Carbon Black is being used or evaluated by 68 percent of IR professionals. Companies of all sizes and industries—including more than 25 of the Fortune 100—use Bit9 + Carbon Black to increase security and compliance.

    Booth: 100
  • Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world’s leading virtualization and cloud technology providers. More information is available at


    Booth: 204
  • Blue Coat Systems secures and optimizes the flow of information to any user, on any network with leading web security and WAN Optimization solutions. Blue Coat enables the enterprise to tightly align network investments with business objectives, speed decision making and secure business applications for a long-term competitive advantage.

    Booth: 346
  • Bromium has pioneered new endpoint security technologies that protect enterprises from advanced threats. Rather than relying on detection to prevent attacks, Bromium leverages hardware-enforced isolation to protect endpoints from even “undetectable” threats, while providing actionable intelligence on malware behavior - enabling IT to understand attack intents and bolster existing defenses.


    Booth: 348
  • Booth: 314
  • Centrify provides unified identity management across data center, cloud and mobile environments.  Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

    Booth: 312
  • Certes Networks protects data in motion. Certes’ award-winning CryptoFlow™ Solutions safeguard data traffic in physical, virtual and Cloud environments, enabling secure connectivity over any network without compromising network or application performance. Companies around the world rely on Certes’ encryption products to protect critical data simply and easily. Learn more:

    Booth: 210
  • Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point continues to innovate with the development of the Software Blade architecture, which delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.

    Booth: 160
  • The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

    Booth: TBD
  • CloudTalk Meetup’s is a community oriented group aimed at furthering the education in cloud computing. Our mission is to educate technology professionals in this fast paced technology as well as to promote cloud computing vendors and product developers in the local development community. Our meetup has over 700 registered cloudies with disciplined in dev/ops, IT Operations, Product Development and Business/Marketing. The forum provides a great place for professionals to collaborate, share ideas, foster creative brainstorming.

    We hold monthly local events and webinars with presentations delivered by a cloud computing vendor and industry experts that gives detailed technical overview of platforms, tools and industry best practices covering cloud, big data, IT, DR, telecom, security, mobile, social web…. The presentation can be followed with hands-on labs where attendees can experience the technology on their own. Some of the big cloud computing vendors who presented at our meetups are Microsoft Azure, Amazon AWS, VMWare’s CloudFoundry, Citrix’ CloudStack, RedHat’s OpenShift, CenturyLink CLC , IBM Cloud. We have big data companies such as Elasticsearch and DataMeer; DR and Data virtualization companies like DataGardens and Actifio.

    Booth: TBD
  • Core Security provides the industry’s first comprehensive attack intelligence platform. With Core Security, enterprises and security professionals can focus on the most likely threats to their critical business assets by modeling, simulating and testing what an actual attacker would do. Core Security helps more than 1,000 customers worldwide identify the most vulnerable areas of their IT environments to improve the effectiveness of remediation efforts and ultimately secure the business. Our patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from Core Labs research and Core Security Consulting Services. For more information, visit

    Booth: 418
  • CrowdStrike is a security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Utilizing Big-Data technologies, CrowdStrike is developing a new and innovative approach to solving today’s most demanding cyber-security challenges.

    Booth: 226
  • CTIN has been providing high tech crime fighting training since 1996 in the areas of high-tech security, investigation, and prosecution of high-tech crimes for both private and public sector security and investigative personnel and prosecutors. CTIN sponsors training from experts world-wide for the benefit of private organizations and law enforcement agencies.

    Booth: TBD
  • Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

    Booth: 426
  • Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats.

    Booth: 230
  • Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort’s software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization’s virtual, physical and cloud infrastructure against sophisticated attacks. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in Santa Clara, California.

    Booth: 352
  • Damballa discovers active threats that bypass all security prevention layers. Damballa has a unique understanding of malicious network behaviors that expose the difference between legitimate users and threat actors.

    Booth: 432
  • Digital Guardian is Security’s Change Agent—the only patented data protection platform trusted on millions of endpoints to secure against insider and outsider threats.

    Installed in the kernel of the OS, the Digital Guardian agent sees and classifies every piece of data as it is in motion. The agent then automatically adds a security tag to each individual piece of data that dictates customized permissions, taking into account the type, content, and author of the data. This means your data is protected and context-aware. The DG agent will automatically prompt or block an activity depending on the context, then log and audit the event for forensic follow-up. This data-centric approach streamlines incident response and containment, cutting security cycle times from days or hours to minutes.

    Booth: 116
  • The role of the U.S. Secret Service has gradually evolved since the agency's 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation's financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service's mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals - all of whom recognize new opportunities to expand and diversify their criminal portfolio.

    Booth: TBD
  • ESET, the Slovakia-based global IT Security pioneer in proactive protection was founded in 1992 and has its US headquarters in San Diego, CA. ESET has evolved into a leader in the field of heuristic detection, a technology that predicts emerging viruses and develops effective defenses before they can do any damage.

    By continually building upon this technology, ESET has led the security industry in proactive detection and prevention, with over 500% growth over the last five years and an unbroken record of virus detection awards. ESET security solutions have earned superior ratings from the most respected publications and independent testing agencies in the business. When it comes to achievements, ESET rates a 10.

    “This is our promise to you. We believe in technology – and we want to make sure that you can enjoy it in safety.”



    Booth: 308
  • FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,700 customers across 67 countries, including over 157 of the Fortune 500.

    Booth: 168
  • FireMon is the industry leader in providing enterprises, governments and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite Security Manager, Policy Planner and Risk Analyzer enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

    Booth: 162
  • ForeScout is the leading provider of clientless network access control (NAC) and policy compliance management for the global enterprise. We introduced our flagship CounterACT family of products in 2005, helping to pioneer and evolve the NAC industry. Our technology was developed in close partnership with our customers, and is differentiated by its ability to simplify the arduous tasks of access control and policy management. Today, CounterACT is trusted and proven in over 500 Fortune -1000 enterprises and government/military agencies worldwide, where it serves to enforce security-policy compliance and enable streamlined business processes.

    Booth: 124
  • At FusionTek we understand that Information Technology (IT) has become a significant consideration in today’s high-tech society.  Effective technology is essential for all businesses to increase the productivity of their people and business.  We are experts at configuring and maintaining all aspects of a computer network including hardware, phone systems, security, backup, recovery and providing support 24/7/365.  Not to mention peace of mind.

    Booth: 328
  • SafeNet and Gemalto have joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used by more than 30,000 businesses and two billion people in more than 190 countries around the world. We support 3,000 financial institutions and secure more than 80% of the world’s intra-bank fund transfers, and protect the world’s leading software applications.

    Booth: 422
  • Gigamon provides intelligent Traffic Visibility Networking solutions for enterprises, data centers and service providers around the globe. Through patented technologies, the Gigamon GigaVue portfolio of high availability and high density products intelligently delivers the appropriate traffic from physical and virtual networks to security, monitoring and management systems.

    Booth: 218
  • Great Bay Software’s Beacon product suite provides full visibility to all devices on the most complex of networks to give organizations comprehensive, real-time contextual data on each endpoint. With Beacon, these organizations confidently secure and manage their corporate networks by knowing what every device is, where it is located and how it is behaving at all times. This powerful technology simplifies endpoint profiling and authentication by detecting any and all device types, providing the rich context needed to identify suspicious activities and scaling to support the world’s largest enterprise networks. Beacon helps companies avoid costly security breaches. 

    Booth: 318
  • Hexis Cyber Solutions, a KEYW Company, provides cybersecurity solutions for commercial companies and government agencies. Hexis’ HawkEye products offer active, multi-disciplined approaches to achieve higher standards of cybersecurity that is based on our expertise supporting mission-grade cybersecurity.  Hexis is the first to bring automated malware removal to the commercial marketplace.

    Booth: 430
  • HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market-leading products from HP ArcSight, HP Fortify, HP Atalla, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today's hybrid IT infrastructure from sophisticated cyber threats.

    Booth: 222
  • HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure— especially in light of the concentration of risk that occurs within virtualization and cloud environments.

    Booth: 420
  • IBM Security offers one of the world's broadest, most advanced and integrated portfolios of enterprise security products and services. The portfolio provides security intelligence to help protect identities, infrastructure, data and applications against advanced threats in today's hyper-connected world. For more information please visit us at:

    Booth: 172
  • Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.

    Booth: TBD
  • Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success generating $164 million in 2014, with over 3,700 customers and 300 partners in more than 90 countries worldwide.

    Booth: 232
  • Infoblox is a global leader in automated IT network control solutions.  Our appliance platforms combine real-time IP address management (IPAM) with network configuration and change capabilities.  The solutions help Infoblox’s more than 5,000 end customers achieve more dynamic and reliable networks, and value from their virtualization and cloud computing initiatives.

    Booth: 330
  • InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

    Booth: TBD
  • As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Booth: TBD
  • Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

    Booth: TBD
  • Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

    Booth: TBD
  • In 1999, Kaspersky Lab was the first company to introduce integrated antivirus software for workstations, file servers and application servers running on Linux/FreeBSD operating systems. Today, the company offers a whole range of effective corporate security solutions for the most popular operating systems specifically designed for different types of businesses. The company?s product range covers all of the main information security requirements that businesses and large state organizations have to adhere to, including: excellent protection levels, adaptability to changing circumstances, scalability, compatibility with different platforms, high performance, high fault tolerance, ease of use and high value.

    One of the primary advantages of Kaspersky Lab?s corporate range is the easy, centralized management provided by Kaspersky Security Center that extends to the entire network regardless of the number and type of platforms used.

    Booth: 306
  • LightCyber is a leading provider of Active Breach Detection solutions that accurately detect active cyber attacks that have circumvented traditional threat prevention systems. The LightCyber Magna™ platform is the first security product to simultaneously profile both network traffic and endpoint state in order to accurately detect compromised user accounts and devices early in the attack lifecycle, and to enable security operators to remediate breaches and stop attacks before real damage is done. Founded in 2011 and led by world-class cyber security experts, the company’s products have been successfully deployed by top-tier customers around the world in the financial, legal, telecom, government, media and technology sectors. For more information, please visit

    Booth: 408
  • LockPath helps organizations bring order to the chaos of information governance, compliance, risk management (GRC) and IT security with its customizable, easy-to-use GRC software. LockPath’s Keylight platform is used to automate business processes, reduce enterprise risk, eliminate redundancy, and demonstrate regulatory compliance. Keylight provides the most efficient path to audit-readiness.

    Booth: TBD
  • LogRhythm provides enterprise-class Log Management, Log Analysis and SIEM 2.0 solutions that empower organizations to comply with regulations, secure their networks and optimize IT operations. LogRhythm's rapidly growing customer base includes Fortune 500 corporations and midsize enterprises spanning a variety of industries including retail, financial services, utilities, healthcare and higher education as well as military and civilian government agencies and managed security service providers.

    Booth: 212
  • Malwarebytes Anti-Malware hunts down most often zero-day or zero-hour malware, a term our community uses to explain malware that has been newly created and released on the web. Zero-hour malware can be any type of malware out there that traditional antivirus products have a hard time detecting, so it's an additional security measure to protect the user from the kind of malware they are most likely to encounter while surfing the web. Most zero-hour malware is distributed in drive-by exploits or even via hacked accounts such as Facebook, Twitter or Skype. Some of the most commonly detected malware by our products include the Zeus banker Trojan, as well as other Trojan malware with the same purpose, such as Reveton ransomware and other types of ransomware that attempt to extort users into paying ridiculous fee, and an array of fake antivirus software (we call them rogue antivirus) that usually allow additional malware to be installed.

    Booth: 136
  • McAfee is the world’s largest dedicated security technology company. Delivering proactive and proven solutions and services that help secure systems and networks around the world, McAfee protects consumers and businesses of all sizes from the latest malware and emerging online threats. Our solutions are designed to work together, integrating antimalware, antispyware, and antivirus software with security management features that deliver unsurpassed real-time visibility and analytics, reduce risk, ensure compliance, improve Internet security, and help businesses achieve operational efficiencies.

    Booth: 144
  • Netskope™ is the leader in safe cloud enablement. Only the Netskope Active Platform™ enables you to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. To learn more, visit or follow us on Twitter @Netskope.

    Booth: 134
  • Seattle's largest ongoing monthly event with more than 5,600 members.

    New Tech Seattle is the place where you'll always make great connections, enjoy great food and drinks, learn about new companies doing cool things, laugh, smile, and have a fun night out. And most importantly, you'll discover the people, partners, organizations, and resources to help you to build your dreams.

    It's your community, we just love it and give everyone a place to play together. New Tech Seattle happens on the 2nd or 3rd Tuesday of every month. You can also join us on the 1st or 2nd Tuesday of every month at New Tech Eastside if you spend more time in Kirkland, Bellevue, Redmond, and the surrounding cities.

    Booth: TBD
  • The Northwest Tech Alliance (NWTA) is an independent technology association dedicated to bringing together some of the brightest minds from the technology industry.
    NWTA events are focused on helping attendees:
    · Network with other technology industry professionals
    · Provide education and information relative to the latest technologies and industry trends
    · Generate opportunities for personal, professional and business growth
    · Promote the Puget Sound area as a desirable place to start and grow successful technology companies
    · Learn about local food/chefs, wineries, breweries, and distilleries
    · Support local businesses and give back to the community
    · Build lifelong relationships

    Booth: TBD
  • The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.

    Booth: TBD
  • OpenDNS is the world’s largest Internet-wide security network, protecting two percent of the Internet’s active users every day. The cloud-based OpenDNS service delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. OpenDNS is easy to deploy and manage, with no hardware or software to install, no need to reconfigure networks and no new latency.

    Booth: 220
  • Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

    Booth: 112
  • Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 20Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Most recently, Palo Alto Networks has enabled enterprises to extend this same network security to remote users with the release of GlobalProtect™ and to combat targeted malware with its WildFire™ service. For more information, visit

    Booth: 206
  • PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.

    Booth: 336
  • Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). 

    For more information, please visit

    Booth: 424
  • Quantivate is a leading provider of SaaS governance, risk, compliance (GRC), and IT risk management solutions. Quantivate’s award winning customizable platform and solutions enable organizations to implement risk management and compliance processes that are aligned with organizational strategy while still adapting to the specific needs of each business area.

    Booth: 332
  • As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments.

    Organizations in a wide range of sectors—including government, defense, banking, and manufacturing—rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands.

    Booth: 428
  • Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

    Booth: 200
  • RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's technology, business and industry solutions - coupled with professional services and dozens of strategic third-party partnerships - help organizations bring trust to millions of user identities, the activities that they perform and the data that is generated.

    Booth: 156
  • Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal protection of critical information assets.

    Booth: 344
  • SecureAuth IdP is the only solution that combines SSO with native two-factor authentication in a single product across all platforms. In the same solution, SecureAuth includes Versatile Authentication (VAS) that enables IT to deploy single, two, or three-factor authentication to meet current and future regulatory requirements for cloud and web applications whether accessed from desktop or mobile device. Bringing the same level of security and control to cloud applications that enterprises experience with on-premise applications, SecureAuth IdP makes multi-product deployments obsolete while minimizing risk, increasing productivity, and reducing management costs. SecureAuth IdP has been deployed to over 7 million users worldwide with customers in financial services, healthcare, retail, government, and other industries.

    Booth: 324
  • Shavlik’s Protect simplifies and automates the systems management challenges most relevant to today’s IT environments. Shavlik Protect bundles Shavlik’s best-in-class patch management with asset inventory, power management, and antivirus protection in an easyto-use, centralized console to simplify and automate the top IT management challenges faced by today’s IT environments.

    Booth: 310
  • Skyhigh Networks, the cloud access security company, enables companies to embrace cloud services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a “Cool Vendor” by Gartner, Inc. For more information, visit us at or follow us on Twitter @skyhighnetworks.

    Booth: 342
  • Solutions II is nationally recognized for world-class innovation in information and network security, virtualization, business continuance, and data lifecycle management. We deliver comprehensive security solutions and competitively priced security services to many industry verticals. We empower enterprises to achieve a business enabled defense-in-depth security posture, manage corporate risk, improve compliance, and attain proactive detection and prevention of security threats to their computing infrastructure, data, and applications. Solutions II’s commitment of bringing best-of-breed solutions to Clients includes a professional services practice dedicated to increasing customer service levels and decreasing the time and support required for implementations.

    Booth: 208
  • Structured is a leading information technology consultancy and systems integrator that has partnered with hundreds of clients throughout the U.S. to maximize the value of IT.

    For two decades, Structured consultants have collaborated with CIOs and IT departments to develop and implement technology strategies that drive measureable improvements throughout the organization.

    Booth: 206
  • Symantec is a global leader in providing security, storage and systems management solutions to help our customers secure and manage their information and identities independent of device. Symantec does this by bringing together leading software and cloud solutions that work seamlessly across multiple platforms, giving customers the freedom to access, store and transmit information anytime, anywhere.

    Booth: 228
  • Tanium provides the unique power to secure, control and manage endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint, retrieve data on their current state, and execute change all within seconds. 

    Booth: 350
  • TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

    Booth: TBD
  • Tempered Networks meets the cyber security and connectivity needs for organizations who require uncompromised protection for business critical infrastructure. Our solution ‘cloaks’ critical systems, communications and endpoints, effectively rendering them invisible to all but trusted devices. Unlike traditional security solutions, our platform includes centralized orchestration of policies to reduce manual errors. 

    Booth: 202
  • Thales e-Security is a leading global provider of data protection solutions with more than 40 years of experience securing the world’s most sensitive information. Thales customers —businesses, governments and technology vendors with a broad range of challenges—use our products and services to improve the security of applications that rely on encryption and digital signatures. By protecting the confidentiality, integrity, and availability of sensitive information that flows through today’s traditional, virtualized and cloud-based infrastructures, Thales helps organizations reduce risk, demonstrate compliance, enhance agility and pursue strategic goals with greater confidence. Thales solutions not only deliver high levels of assurance, backed by independent certifications, but also offer significant advantages in ease of deployment and ongoing management.

    Booth: 326
  • Townsend Security creates data privacy solutions that help organizations meet evolving compliance requirements and mitigate the risk of data breaches. Over 3,000 companies trust Townsend Security’s NIST and FIPS 140-2 certified solutions to meet the encryption and key management requirements in PCI DSS, HIPAA/HITECH, FISMA, GLBA/FFIEC, and other compliance requirements.

    Booth: 302
  • As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

    Booth: 216
  • Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at or follow us @TripwireInc on Twitter.

    Booth: 140
  • Varonis is the foremost innovator and solution provider of comprehensive, actionable data governance solutions for unstructured and semi-structured data with over 4000 installations spanning leading firms in financial services, government, healthcare, energy, media, education, manufacturing and technology worldwide. Based on patented technology, Varonis' solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times.

    Booth: 206
  • Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice.

    As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility.

    Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

    Booth: 128
  • Verisign powers the invisible navigation that takes people to where they want to go on the Internet. The company operates the infrastructure for a portfolio of top-level domains, including .com and .net, and offers a suite of infrastructure assurance services—including Managed DNS, DDoS Protection and iDefense Security Intelligence Services.

    Booth: 340
  • Trusted by businesses and governments for over a decade, Vormetric’s data-centric security architecture is currently busy securing the data of over 1,300 global customers—including 17 of the Fortune 25. Vormetric addresses industry compliance mandates and government regulations globally by securing data in traditional on-premise, virtual, Cloud and Big Data infrastructures, through:

    • Data Encryption and Centralized Key Management

    • Access Policies and Privileged User Control

    • Security Intelligence

    Booth: 303
  • As one of the oldest and largest statewide technology trade associations in North America, we're passionate about promoting Washington as a desirable place to start and grow successful technology companies amid a strong and connected community. WTIA is the place to connect to Washington's technology industry.

    Booth: TBD
  • WatchGuard builds affordable, all-in-one network and content security solutions to provide defense in depth for corporate content, networks and the businesses they power. WatchGuard's award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions.

    Booth: 406
  • Websense, Inc., a global leader in unified web security, email security, and data loss prevention (DLP) solutions, delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as software, appliance and Security-as-a-Service (SaaS), Websense content security solutions help organizations leverage web 2.0 and cloud communication, collaboration, and social media while protecting from advanced persistent threats, preventing the loss of confidential information and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit

    Booth: 434
  • Zscaler's Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

    Booth: 320