2026 Conference Exhibitors

Meet the world’s leading technology and solution providers at Gartner Identity & Access Management Summit 2026 in Las Vegas, NV.

Connect with IAM and IT solution providers

Solution provider landscape: Exhibitor showcasing to an attendee

Solution provider landscape

Learn about the current landscape as you continuously evaluate and analyze product capabilities.

Attendees interacting with Exhibitors

Interactive sessions

Make well-informed investment decisions based on objective insights from Gartner case studies and thought leadership.

Attendees viewing an Exhibitor showcase

Solution evaluations

Compare solutions and formulate your shortlists of providers that can best help solve your mission-critical priorities.

Exhibitors networking

Exhibitor connections

Gain mind share and build relationships with executives from solution provider companies.

Premier

Hear peers share their experiences with solution providers:

“[Had a] great time connecting with old and new friends! Learned a lot and identified new product partners for our team. Exhibitors were amazing and [there were] so many newcomers.”

Jim Schiffer
Director, Identity Management, Freeport McMoRon

Platinum

“I did enjoy the conference. It was packed with plenty of knowledge and inspirational speakers. I liked the fact that they had lots of exhibits and demonstration on tools.”

Carene Fongwe
IAM Analyst, MSUFCU

Silver

background wave background wave background wave
Conference Exhibitor Directory

ARCON

ARCON is a leading information risk-management solutions provider specializing in Identities, Vaults, Cybersecurity and Digital Risk Assessment solutions. Built on the pillars: Predict, Protect, Prevent, it offers solutions that enable robust perimeter security around IT systems, endpoints, and data while developing a comprehensive GRC framework. Product portfolio: ARCON|Converged Identity ARCON|Privileged Access Management ARCON|Endpoint Privilege Management ARCON|Security Compliance Management ARCON|Global Remote Access ARCON|My Vault ARCON|Cloud Governance ARCON|Drift Management ...Read More

BeyondTrust

BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™ with an identity-centric approach. We are leading the charge in transforming identity security and are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners. Learn more at www.beyondtrust.com. ...Read More

CyberArk Software

CyberArk is the global leader in identity security, trusted by organizations around the world to secure human and machine identities. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. Organizations can minimize operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource from anywhere. ...Read More

DigiCert

DigiCert is a leading global provider of digital trust, enabling individuals and businesses to engage online with the confidence that their footprint in the digital world is secure. DigiCert® ONE, the platform for digital trust, provides organizations with centralized visibility and control over a broad range of public and private trust needs, securing websites, enterprise access and communication, software, identity, content and devices. DigiCert pairs its award-winning software with its industry leadership in standards, support and operations. ...Read More

Keeper Security

Keeper Security is one of the fastest-growing cybersecurity software companies that protects thousands of organisations and millions of people in over 150 countries. Keeper is a pioneer of zero-knowledge and zero-trust security built for any IT environment. Its core offering, KeeperPAM®, is an AI-enabled, cloud-native platform that protects all users, devices and infrastructure from cyber attacks. Recognised for its innovation in the Gartner Magic Quadrant for Privileged Access Management (PAM), Keeper secures passwords and passkeys, infrastructure secrets, remote connections and endpoints. ...Read More

Microsoft

At Microsoft, we are dedicated to helping our customers accelerate AI Transformation by empowering human ambition with Copilots and agents, developing differentiated AI solutions and building scalable cybersecurity foundations.​ https://www.microsoft.com/en-us/microsoft-365/copilot/meet-copilot ...Read More

Okta

Okta, Inc. is The World’s Identity Company™. We secure identity, so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to use the power of identity to drive security, efficiencies, and success — all while protecting their users, employees, and partners. Learn why the world’s leading brands trust Okta for authentication, authorisation, and more at okta.com. ...Read More

Omada

Omada, a global market leader in Identity Governance and Administration (IGA), offers a full-featured, cloud-native IGA solution that enables organizations to achieve compliance, reduce risk, and maximize operational efficiency. Founded in 2000, Omada specializes in delivering innovative identity management solutions for complex hybrid environments, based on a proven best practice process framework and a streamlined deployment approach. For more information, go to omadaidentity.com ...Read More

One Identity

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. ...Read More

Ping Identity

Ping makes it possible to trust every digital moment. Our enterprise-grade identity platform secures customers, employees, partners, and non-human identities at scale across cloud, hybrid, and on-prem. From passwordless to AI-ready, we help you fight fraud, simplify access, and accelerate growth. With us, trust is built in. Learn more at pingidentity.com. ...Read More

Radiant Logic

Radiant Logic pioneered the Identity Data Fabric and leads in Identity Security Posture Management (ISPM). We help enterprises turn fragmented identity data into a secure business asset, strengthening IAM resilience. RadiantOne unifies all identity data—including legacy, cloud, and non-human—into a single source of truth with AI-driven analytics for full visibility and risk remediation. Trusted by Fortune 100 firms and U.S. agencies, Radiant Logic reduces identity sprawl, boosts efficiency, and enhances compliance. ...Read More

RSA

The AI-powered RSA Unified Identity Platform protects the world’s most secure organizations from today’s and tomorrow’s highest-risk cyberattacks. RSA provides the identity intelligence, authentication, access, governance, and lifecycle capabilities needed to prevent threats, secure access, and enable compliance. More than 9,000 security-first organizations trust RSA to manage more than 60 million identities across on-premises, hybrid, and multi-cloud environments. ...Read More

SailPoint Technologies

SailPoint delivers unified, identity-first security through an intelligent platform that manages and secures access for all human and digital identities. We empower enterprises to scale securely, defend against evolving threats, boost productivity, and drive transformation. Trusted by the world’s most complex organisations, SailPoint protects the modern enterprise. ...Read More

Saviynt

Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognised as an industry leader in identity security whose cutting-edge solutions protect the world’s leading brands, Fortune 500 companies and government organisations. For more information, please visit www.saviynt.com. ...Read More

Semperis, Inc.

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing Active Directory, Semperis’ patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organisations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. ...Read More

Silverfort

Silverfort secures every dimension of identity. We are the first to deliver an end-to-end identity security platform that is easy to deploy and won't disrupt business operations, resulting in better security outcomes with less work. Discover every identity across every environment, analyze exposures to reduce your attack surfaces, and enforce security controls inline to stop lateral movement, ransomware, and other identity threats. ...Read More

Transmit Security

Transmit Security has reimagined fraud prevention and CIAM by replacing siloed solutions with a fusion of customer identity management, identity verification and fraud prevention. Mosaic by Transmit Security, the company’s flagship platform, offers best-of-breed modular services to address fraud and identity use cases while minimizing complexity and costs. With AI-driven cybersecurity at its core, Mosaic is built for resilience and scale, earning the trust of 7 ‘top 10’ US banks and Fortune 500s. Discover transmitsecurity.com. ...Read More

Twine Security

Twine builds AI Digital Employees for cybersecurity teams. Our first AI digital employee, Alex, learns, understands and takes away the burden of identity and access management (IAM) tasks - proactively completing your organization’s cyber objectives. Our customers use Alex for varied use cases - from autonomously remediating issues like finding missing account owners, to IAM ticket automations, and much more. Goodbye simple, legacy automations. Hello effortless, self healing, start to finish execution by proactive AI Digital Employees. Come check us out! ...Read More

Veza

Veza is the identity security company, helping organizations secure access across the enterprise, including cloud infrastructure, data systems, SaaS apps, and on-prem apps. Powered by the Authorization Graph, Veza’s platform delivers visibility and control of permissions so that organizations finally achieve least privilege. Global enterprises like Wynn Resorts, Expedia and CrowdStrike trust Veza for privileged access monitoring, cloud access management, data lake governance, SaaS access security, automated access reviews and access, and identity provisioning. ...Read More

1Kosmos

1Kosmos enables identity verification and passwordless multi-factor authentication for workers, customers, and residents. By unifying identity proofing, credential verification, and strong authentication, the 1Kosmos platform prevents identity impersonation, account takeover, and transaction fraud while delivering a frictionless user experience via a privacy-preserving digital identity wallet. Trusted by leading banks, telcos, healthcare providers, retailers, universities, and government agencies, 1Kosmos performs millions of authentications daily. Learn more at www.1kosmos.com. ...Read More

1Password

Trusted by over 175,000 businesses and millions of consumers, 1Password offers identity security and access management solutions built for the way people work and live today. 1Password is on a mission to eliminate the conflict between security and productivity while securing every sign-in for every app on every device. As the provider of the most-used enterprise password manager, 1Password continues to innovate on its strong foundation to offer security solutions relied upon by companies of all sizes, including Associated Press, Salesforce, GitLab, Under Armour, and Intercom. ...Read More

Axonius

Axonius transforms asset intelligence into intelligent action. With a single platform covering cyber assets, software assets, SaaS applications, identities, infrastructure, and more, Axonius equips Security, IT, and GRC teams with total visibility and sharp actionability to continuously optimize mission-critical risk, performance, and cost measures – measures that every Board cares about. ...Read More

Console

Console is the AI platform for IT, built to help teams automate support and shift from doing the work to managing the system that does the work for them. From password resets to access requests, Console handles 50–70% of support requests directly in Slack or Teams before they ever reach a human. ...Read More

CrowdStrike

CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects the critical areas of risk – endpoints and cloud workloads, identity, and data. Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, and elite threat hunting – all through a single, lightweight agent. ...Read More

CyberSolve

CyberSolve is a practitioner led, global IAM professional services provider, leveraging diverse technologies and innovative models to address IAM challenges for businesses, institutions, and governments alike. Services include IAM Plan and Design, Build and Deploy, Rapid Integration, Migrations and Modernization, and Managed Services. Operating across North America, APAC, and EMEA, CyberSolve has initiated and rejuvenated numerous identity-first security programs in Identity Governance, Access Controls, Privileged Access Management, Consumer IAM, and Zero Trust Access. ...Read More

Delinea

Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading cloud-native Identity Security Platform applies context to eliminate threats throughout the entire identity lifecycle – across cloud and traditional infrastructure, data, SaaS applications, and AI. ...Read More

IDMWORKS

IDMWORKS is an industry-leading identity and access management (IAM) solutions provider. Since 2004, we have been dedicated to securing businesses and enabling interactions with their customers, partners, and employees driving transformative growth. Complex identity challenges are simplified through our team’s vision, expertise and resilience ensuring strategic outcomes are successful. Our deeply knowledgeable and customer-centric experts have been leading the ever-shifting IAM industry for nearly two decades, positioning us to deliver cutting-edge cyber security solutions. ...Read More

Netwrix Corporation

Netwrix is reinventing data security based on the premise that data security and identity security cannot work in isolation. Netwrix offers a comprehensive set of solutions that protect identities and data for over 13,500 organisations globally. Netwrix AI and flexible deployment options make it easier, faster, and more economical than ever for security teams to investigate and remediate threats. Netwrix: Data security that starts with identity. For more information, visit www.netwrix.com. ...Read More

Opti

Say hello to Opti — the AI-native IAM platform built to transform how identity teams work. Opti unifies and analyzes identity data across any app, IdP, and homegrown system to deliver real-time visibility, automated remediation, and intelligent governance. Purpose-trained LLMs power deep context and explainable actions, helping teams mitigate risk, streamline JML, and automate UARs. Think of Opti as the Operation System for modern identity teams. With Opti, identity work becomes faster, smarter, and audit-ready by design, so get ready for the future of Identity workforce! ...Read More

Pathlock

Unlike traditional risk, audit, and security systems, Pathlock continuously monitors transactions across all enterprise applications where sensitive activities and data are concentrated. It surfaces actual violations, not theoretical possibilities. With Pathlock as the hub, all lines of defense work together to make informed decisions. Founded as Greenlight Technologies, we became the only solution endorsed by SAP that extends SAP Access Control to cloud and non-SAP systems. Today, we are the leader in application security and controls automation, serving customers worldwide. ...Read More

Persona

Persona helps leading organizations strengthen workforce security with a single identity that spans the employee lifecycle, from candidate verification and hiring through onboarding, access changes, and account recovery. Our workforce identity verification solution detects AI-driven impersonation and social engineering using signals like liveness detection, and behavioral analysis. With seamless integrations into IAM, HRIS, and ATS platforms, Persona delivers high-assurance identity verification trusted by industry leaders without requiring teams to reinvent their access control systems. ...Read More

Rubrik

Rubrik, the Security and AI Operations Company, leads at the intersection of data protection, cyber resilience, and enterprise AI acceleration. Rubrik Security Cloud delivers complete cyber resilience by securing, monitoring, and recovering data, identities, and workloads across clouds. Rubrik Agent Cloud accelerates trusted AI agent deployments at scale by monitoring and auditing agentic actions, enforcing real-time guardrails, fine-tuning for accuracy and undoing agentic mistakes. ...Read More

SSH

SSH Communications Security (SSH) is a defensive cybersecurity company that secures communications and access for and between humans, systems, and networks. Our customers include Fortune 500 companies as well as SMBs across sectors like Finance, Retail, Critical Infrastructure, Healthcare, or Government. Our teams and partners in North America, Europe, and Asia help secure their business in the hybrid cloud and distributed IT/OT infrastructures. Our passwordless, keyless PrivX Zero Trust solutions reduce costs and complexity while quantum-safe encryption keeps critical connections future-proof ...Read More

StrongDM

StrongDM delivers modern privileged access and authorisation, combining productivity and security in ways traditional PAM cannot. Built for modern cloud and hybrid infrastructure, it provides runtime security with continuous, fine-grained authorisation and just-in-time access for human, machine, and agentic identities. The result is frictionless access that eliminates standing privileges, stops lateral movement, and boosts productivity while strengthening enterprise security, all powered by StrongDM's Identity Firewall. ...Read More

Thales

Thales is a global leader in cybersecurity, helping the most trusted organizations protect critical applications, data, identities, and software anywhere, at scale. Through Thales’ integrated platforms, customers achieve better visibility of risks, defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day. ...Read More

Aquera

Aquera, a 2022 Gartner Cool Vendor in Identity-First Security, offers highly scalable solutions for Partner IAM, identity application discovery and onboarding, IGA entitlement file collection operations automation for disconnected applications, identity sourcing from 50+ HR apps, 1000+ LCM/IGA connectors, self-service GenAI connector builders, and HR app to HR app syncing. Aquera automates over 1 billion transactions annually for over 1000 organizations. ...Read More

Astrix Security

Astrix secures every AI agent and the service accounts, API keys, OAuth apps, and secrets they use to operate. The platform uncovers all non-human access across multi-cloud, SaaS, and on-prem environments, enabling teams to assess, prioritize, and fix risks using deep context around ownership, usage patterns, and privilege levels. Astrix enforces enterprise-grade policies, detects anomalies and deviations, and integrates with SIEM, SOAR, and ITSM to automate and scale identity risk remediation. ...Read More

Axiad

Identity teams are drowning in complexity with fragmented tools, siloed data, blind spots, and manual processes. This chaos exposes organizations to breaches, ransomware, data theft, compliance failures, and budget overruns. Axiad tames the human and NHI chaos by automating visibility, intelligence, risk remediation, and lifecycle management. The result is a drastic acceleration of operational efficiency. —Eliminate thousands of work hours from manual processes, —Prioritize resources to make the most impact, —Reduce the risk of breach and the financial implications that come with it ...Read More

Backupta

Backupta is a comprehensive platform that streamlines Okta administration and de-risks tenants by automating backup of critical Okta data (users, clients, configs) for fast restoration of entire tenants or individual objects. It enables efficient release management via tenant cloning for development, and offers proactive notifications, monitoring, tenant comparison, and auditing to enhance security & compliance. Ultimately, Backupta protects against data loss, ensures rapid recovery from security threats, user error, and bolsters operational security and compliance within an Okta environment. ...Read More

Britive

Britive is the first cloud-privileged access management (CPAM) platform built for modern, dynamic, multi-cloud environments. Designed with an agent-less, proxy-less, and API-first architecture, Britive integrates seamlessly with any cloud infrastructure provider, SaaS application, or DevOps tool in hybrid on-prem environments. Britive unifies identity management for unparalleled visibility into across all identities, both human and non-human. Britive mitigates the risk of static access by enforcing Zero Standing Privileges (ZSP) with dynamically granted and ephemeral access provisioning. ...Read More

Cayosoft

Cerby

Cerby offers IT and Security teams the only identity and access management platform tailored for disconnected applications. Seamlessly integrating with your existing identity provider, Cerby extends SSO, MFA, and lifecycle management to any application, even those without APIs or support for standard protocols. With Cerby's patent-pending identity automation, IT teams can streamline manual processes like deprovisioning and MFA enrollment, gaining unmatched efficiency and full visibility and control over applications that fall outside traditional identity systems. ...Read More

ConductorOne

ConductorOne is the first AI-native identity security platform that protects every identity: human, non-human, and AI. With powerful automation, platform-level AI, and out-of-the-box connectors, it centralizes access visibility, enforces fine-grained controls, enables just-in-time access, and automates user access reviews across all apps. It’s easy to use, quick to deploy, and trusted by enterprises like DigitalOcean, Instacart, Ramp, and Zscaler. ...Read More

Curity

Curity is a leading supplier of identity management, providing unified security for apps, APIs and AI. The Curity Identity Server delivers strong, standards-based authentication and authorization for humans and machines. Built on open standards and designed for development and operations teams, Curity is trusted by large organizations in financial services, telecom, retail, energy and government services that need enterprise-grade API access security. ...Read More

Daon

Daon delivers fraud-resistant identity solutions for seamless onboarding and authentication. By deploying industry-leading biometric identity verification and multi-factor authentication, Daon helps clients provide their customers with secure digital identities that balance fraud prevention with convenience. Global leaders across multiple industries trust Daon to process millions of transactions daily. ...Read More

Descope

Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps hundreds of organizations easily create and customize their entire user journey using visual workflows – from authentication and authorization to MFA and federated SSO. Customers like GoFundMe, Databricks, Navan, and You.com use Descope to reduce user friction, prevent account takeover, and get a unified view of their customer journey. ...Read More

Entro

Entro is the leading enterprise security platform for AI Agents & Non-Human Identities. It discovers every API key, token, AI agent, and service account across the software development lifecycle. Entro then builds a contextual inventory that ties each machine identity or exposed secret to purpose, permissions, and human owners. Powered by the pioneering NHIDR™ engine, the platform detects behavioral anomalies for automated, risk-based remediation. Trusted by global Fortune 500 enterprises, Entro has received numerous acknowledgment and recognitions including Gartner® Cool Vendor™. ...Read More

Eos

Eos helps enterprises drive AI adoption by providing visibility, demonstrating governance and eliminating the access risk of AI Agents. The oncoming explosion of agents brings with it a sprawl of identities and entitlements. These agents can be indeterministic and ephemeral. Not being able to control and protect them from performing harmful actions can slow down AI adoption, and cause reputational and financial damage to the organization. Eos enables enterprises to discover and govern shadow AI identities, and protect them against agentic privilege misuse and unauthorized access. ...Read More

Fischer Identity

Founded in 2005, Fischer Identity provides cutting-edge Identity and Access Management (IAM) solutions that enhance security, streamline operations, and simplify administration. With a fully configurable, no-code IAM platform, Fischer enables organizations to securely manage identities across hybrid enterprise environments while ensuring compliance and efficiency. Committed to Zero Trust principles and pioneering security innovation, Fischer Identity continues to shape the future of cybersecurity with automated, scalable IAM solutions. ...Read More

HYPR

HYPR, the leader in passwordless identity assurance, delivers comprehensive identity security by unifying phishing-resistant passwordless authentication, adaptive risk mitigation, and automated identity verification. Trusted by top organizations including two of the four largest US banks, HYPR ensures secure and seamless user experiences and protects complex environments globally. Additional information is available at hypr.com. ...Read More

Incode

Incode is a global leader in identity verification and authentication, utilizing cutting-edge AI to deliver seamless, secure experiences and prevent fraud across industries. Incode Workforce is an advanced solution designed to secure critical interactions throughout the employee lifecycle, enhancing Okta’s capabilities with “real-world” identity verification. From MFA enrollment to help desk interactions and password resets, Incode Workforce provides a highly secure, device-agnostic solution, ideal for step-up verification, combating social engineering attacks, and mitigating deepfake threats. ...Read More

Inspira Enterprise

Inspira Enterprise is a leading Digital Transformation company, with its Centers of Excellence in Cyber Security, Blockchain, Cloud, Intelligent Automation, Big Data & Analytics, Internet of things, Intelligent Traffic Management System, Networking and Healthcare Solutions. It is ISO and CMMI Level 3 certified organization. It caters to customers in the Government Institutes (Central Ministries & State Departments), Defense, Agriculture, Public Sector Undertakings, Banking Financial Services Insurance, IT / ITeS, Healthcare & Enterprise verticals. ...Read More

iProov

iProov provides biometric identity solutions that combine science, AI, and security. Our Biometric Solution Suite secures remote onboarding and authentication for both digital and physical access. We safeguard organizations that need innovative identity verification without sacrificing usability. With proven success in global deployments, iProov is a trusted partner for governments and enterprises, including the Australian Taxation Office, GovTech Singapore, ING, Rabobank, UBS, U.K. Home Office, UK National Health Service (NHS), and the U.S. Department of Homeland Security. ...Read More

Keyfactor

Keyfactor brings digital trust to the hyper-connected world by empowering organizations to build and maintain secure, trusted connections across every device, workload, and machine. By simplifying PKI, automating certificate lifecycle management, and enabling crypto-agility, Keyfactor helps organizations move fast to establish digital trust at scale. With Keyfactor, businesses can tackle today’s challenges, like growing certificate volumes, manual processes, and new standards and regulations, while laying the groundwork for a successful transition to post-quantum cryptography. ...Read More

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle. A radical departure from legacy identity security solutions, Linx untangles the complex, ever-evolving web of identity security. Integrating with your IAM stack, Linx pulls together all your organization’s identity data—revealing the hidden links between your employees, their digital identities, and the apps, software, platforms, and programs they have access to, enabling you to continuously reduce identity attack surface and swiftly close gaps in compliance. ...Read More

Oasis Security

Oasis is a leading provider of non-human identity management. The shift to cloud, devops, and AI is fueling exponential growth of non-human identities opening up a new massive attack surface. Oasis pioneered the first enterprise-grade platform specifically designed to tackle the unique security and operational challenges of non-human identities, enabling security and engineering teams to bolster security posture, implement robust governance, and simplify compliance. ...Read More

Oleria

Oleria is an Identity Security company helping organizations protect critical systems and data from unauthorized access while improving efficiency and reducing legacy costs. Our data-first, AI-ready Trustfusion Platform unifies identities, resources, permissions, and activities—human, non-human, and AI—across SaaS, cloud, and on-prem apps. Within one intelligent platform, gain fine-grained visibility and control, automate governance to enforce least privilege, and respond to threats rapidly with immediate remediations. Founded by security operators for security operators. ...Read More

P0 Security

P0 Security is the next-generation privileged access platform, redefining how teams manage production access across cloud and hybrid environments. Unlike legacy patchworks of PAM, IGA, CIEM and IAM, P0 unifies orchestration, risk posture and governance in one control plane—built for scale, speed and Zero Standing Privilege. At its core, P0’s Identity Graph and Access DNA deliver real-time insight and policy-driven, short-lived access across all identities and resources. Learn more at p0.dev. ...Read More

PlainID

PlainID is the market-leading authorization platform, solving the complex access challenges of the modern, AI-driven enterprise. Trusted by leading Fortune 2000 companies and powered by Policy-Based Access Control (PBAC), The PlainID Platform enables organizations to discover, manage, and authorize access control policies across their entire technology environment—from critical applications and data to the full workflow of agentic AI systems. This unified approach minimizes the risk of data leakage, ensures continuous compliance, and securely accelerates innovation at scale. ...Read More

ProNoesis

ProNoesis is a specialized cybersecurity provider delivering comprehensive Identity and Access Management (IAM) solutions. Our services encompass advisory, implementation, and managed IAM services, ensuring secure digital identities and seamless user experiences. Central to our approach is the Identity Express Toolkit, featuring accelerators that guide organizations through the Define, Deliver, and Defend phases. This framework not only optimizes security but also significantly reduces time to value, empowering organizations to effectively manage access, mitigate risks, and achieve compliance. ...Read More

Quest Software

At Quest Software, we create technology and solutions that build the foundation for enterprise AI. By focusing on data management and governance, cybersecurity, and platform modernization, we help organizations solve their most pressing challenges and turn the promise of AI into reality. ...Read More

SDG

With more than 30 years of experience partnering with global brands on complex business and IT challenges, SDG is a proven leader in advisory, transformation, and managed services that enable leaders to confidently execute AI, identity, threat, and risk management solutions that protect assets and provide business value. ...Read More

Secret Double Octopus

At Secret Double Octopus, we believe authentication should be stronger, simpler, and completely password-free. Our patented ZeroPassword™ technology eliminates passwords even from legacy and on-prem systems, delivering unmatched security and user experience at scale. Our platform integrates seamlessly into any infrastructure, supporting any system, use case, or authentication method. Trusted by SMBs and Fortune 50 enterprises alike, we secure billions of authentications annually, enabling organizations to achieve modern, phishing-resistant security at scale. Let’s redefine authentication. ...Read More

SecurEnds

SecurEnds streamlines Identity Governance for organizations with automated access reviews, access requests, and provisioning. The platform reduces operational risk, enforces compliance with industry standards, and accelerates audits while optimizing resource efficiency. With policy-driven access provisioning, enterprises can enforce least privilege, automate role-based assignments, and deprovision accounts instantly, reducing attack surfaces. Real-time visibility and audit-ready reporting ensure continuous monitoring, stronger access controls, and alignment with zero trust security frameworks. ...Read More

Serval, Inc.

Serval deploys AI agents for IT. Companies like Verkada, Perplexity, and Together AI use Serval to automate help desk tickets, just-in-time access requests, and onboarding/offboarding flows. With Serval, IT teams can turn natural language prompts into complex automations in seconds, automating >50% of tickets on day one. ...Read More

SGNL

SGNL delivers continuous, context-aware protection for sensitive data, infrastructure, cloud workloads, and applications, and now extends that protection to AI through the SGNL MCP Security Gateway—enforcing real-time policies on AI agent actions. By centralizing context, real-time enforcement, and enterprise-wide orchestration through open standards like CAEP and the Shared Signals Framework, SGNL enables Zero Standing Privilege across the entire identity footprint and makes Zero Trust an operational reality. ...Read More

Simeio

Simeio cuts through the complexity of identity and access management. Our specialized platform and expert services deliver secure digital access without the endless complications. When you need reliable IAM solutions that actually work, you get access right now.

Specter Ops

SpecterOps is a leader in Identity risk reduction. Possessing deep knowledge of adversary tradecraft, the company enables organizations to detect and remove critical attack paths before attackers can act – a practice called Attack Path Management. SpecterOps maintains widely used open-source security toolsets including BloodHound, the company’s foundational tool that enables Identity Attack Path Management in Active Directory & Entra ID. BloodHound Enterprise is the company's managed SaaS, allowing for attack path prioritization, remediation guidance & reporting to show improvement over time. ...Read More

Teleport

Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and resiliency of critical infrastructure against human factors and/or compromise.

Token Security

Token Security is the leader in securing agentic AI and non-human identities at scale. Our machine-first platform delivers real-time discovery, control, and governance over every AI agent and machine identity in your environment. By providing the deepest contextual insights, we empower teams to remediate risks quickly and confidently, without disrupting business operations. With Token Security, organizations accelerate innovation while ensuring security, compliance, and trust across their entire ecosystem. ...Read More

Tuebora

Tuebora Identity and Access Management (IAM) Platform is a dynamic self-driven solution powered by predictive analytics and intelligence. Our solution empowers organizations to rapidly adopt best practices for managing access risk, automating existing identity and access management processes for scale and workload reduction, and measuring efficiency gains through effectiveness metrics and reporting. With Tuebora IAM, organizations modernize legacy identity management solutions with the cloud-based services they need and pay only for the value they receive via a flexible utility model. ...Read More

Yubico

Yubico (Nasdaq Stockholm: YUBICO) is a modern cybersecurity company on a mission to make the internet safer for everyone. As the inventor of the YubiKey, we set the gold standard for secure, simple login, stopping account takeovers with phishing-resistant, hardware-backed authentication. Our technology secures people in over 160 countries, delivering fast, passwordless access. Dual-headquartered in Stockholm and Santa Clara, we believe strong security should be within everyone's reach. Learn more at www.yubico.com. ...Read More

Zumigo

Zumigo powers digital identity verification in the world’s largest enterprises to protect transactions, accounts and trust, using real-time intelligence across mobile, email, device, financial, account, and other information sources. Its modernized, multi-layer approach fortifies the identity perimeter against today’s complex fraud and promises a streamlined consumer journey from onboarding to transactions. Zumigo supports over 800 mobile operators, verifying over 4.5 billion mobile numbers globally with services reaching 180 countries. Learn more at www.zumigo.com. ...Read More

Ready to join us in Las Vegas, NV?

Experience the Gartner difference — talk with experts, meet your peers and turn insights into action.