2025 Conference Exhibitors

Meet the world’s leading technology and solution providers at Gartner Identity & Access Management Summit 2025 in Grapevine, TX.

Connect with IAM and IT solution providers

Solution provider landscape

Learn about the current landscape as you continuously evaluate and analyze product capabilities.

Interactive sessions

Make well-informed investment decisions based on objective insight from Gartner case studies and thought leadership.

Solution evaluations

Compare solutions and formulate your shortlists of providers that can best help solve your mission-critical priorities.

Exhibitor connections

Gain mind share and build relationships with executives from solution provider companies.

Premier

Hear peers share their experiences with solution providers:

“Great time connecting with old and new friends! Learned a lot and identified new product partners for our team. Exhibitors were amazing and [there were] so many new comers.”

Jim Schiffer
Director, Identity Management, Freeport McMoRon

Platinum

“I did enjoy the conference. It was packed with plenty of knowledge and inspirational speakers. I liked the fact that they had lots of exhibits and demonstration on tools.”

Carene Fongwe
IAM Analyst, MSUFCU

Silver

background wave background wave background wave
Conference Exhibitor Directory

Admin By Request

Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. We recognize the need for simplicity in the complexity of modern IT environments, so our core design philosophy centers on user-friendliness – ensuring our products are easy to set up and provide immediate usability without unnecessary complexity. Our Endpoint Privilege Management (EPM) and Secure Remote Access products embody this philosophy, offering out-of-the-box visibility, control, management, and secure access across devices. ...Read More

ARCON

ARCON is a leading information risk-management solutions provider specializing in Identities, Vaults, Cybersecurity and Digital Risk Assessment solutions. Built on the pillars: Predict,Protect,Prevent, it offers solutions that enable robust perimeter security around IT systems, endpoints & data while developing a comprehensive GRC framework. Product portfolio: ARCON |Converged Identity ARCON |Privileged Access Management ARCON |Endpoint Privilege Management ARCON |Security Compliance Management ARCON |Global Remote Access ARCON |My Vault ARCON |Cloud Governance ARCON |Drift Management ...Read More

Axiad

Axiad is an identity security company tackling the growing threat of compromised credentials, which drive over 70% of enterprise breaches. The sprawl of human and non-human identities across organizational silos creates security blind spots that existing tools fail to secure. Axiad tackles this problem head-on, detecting identity risks and poor credential hygiene across systems, providing actionable insights, and enhancing security without needing a complete overhaul. Axiad makes identity simple, effective, and real. ...Read More

BeyondTrust

BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™ with an identity-centric approach. We are leading the charge in transforming identity security and are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners. Learn more at www.beyondtrust.com. ...Read More

CyberArk Software

CyberArk is the global leader in identity security. Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud environments and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. ...Read More

CyberSolve

CyberSolve is a practitioner led, global IAM professional services provider, leveraging diverse technologies and innovative models to address IAM challenges for businesses, institutions, and governments alike. Services include IAM Plan and Design, Build and Deploy, Rapid Integration, Migrations and Modernization, and Managed Services. Operating across North America, APAC, and EMEA, CyberSolve has initiated and rejuvenated numerous identity-first security programs in Identity Governance, Access Controls, Privileged Access Management, Consumer IAM, and Zero Trust Access. ...Read More

DigiCert

DigiCert is a leading global provider of digital trust, enabling individuals and businesses to engage online with the confidence that their footprint in the digital world is secure.DigiCert® ONE, the platform for digital trust, provides organizations with centralized visibility and control over a broad range of trust needs, securing websites, enterprise access and communication, software, identity, content and devices.DigiCert pairs its award-winning software with industry leadership in standards, support, operations, and is the digital trust provider of choice for companies around the world. ...Read More

Keeper Security

Keeper Security is transforming cybersecurity for people and organizations around the world with next-generation privileged access management. Keeper’s easy-to-use cybersecurity solutions are built with zero-trust and zero-knowledge security to protect every user on every device. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. ...Read More

Lumos

Lumos is the first unified SaaS platform to empower organizations to govern and automate application and identity lifecycle across hybrid environments and mitigate cyber risk. Businesses of all sizes, including Pinterest, GitHub, and MongoDb, have adopted Lumos to discover and monitor application usage, automate employee on/off-boarding provisioning, and meet compliance requirements across SaaS, cloud and on-premise environments. ...Read More

Microsoft

Microsoft Security empowers organizations to confidently navigate the growing threat landscape. Microsoft Entra is our portfolio of unified identity and network access products that enable organizations to secure access for any identity (employees, partners, guests, customers, workloads), from anywhere (remote, at home, in the office, frontline), to any resource (apps, data, devices). By safeguarding identities, apps, and data across multi-cloud, multiplatform, and multi-AI environments, we provide unmatched threat intelligence and best-in-class security tools. ...Read More

Okta

Okta is The World’s Identity Company™. We secure Identity, so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to use the power of Identity to drive security, efficiencies, and success — all while protecting their users, employees, and partners. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com. ...Read More

Omada

Omada, a global market leader in Intelligent Identity Governance and Administration (IGA), offers a full-featured, cloud native IGA solution that enables organizations to achieve compliance, reduce risk, and maximize efficiency. To ensure successful deployment in 12 weeks, Omada’s Accelerator package provides a reliable starting point for IGA projects with a standardized implementation approach, best-practice framework for process design, and training for efficient user adoption. Founded in 2000, Omada delivers innovative identity management to complex hybrid enterprise environments globally. ...Read More

One Identity

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. ...Read More

Ping Identity

Ping delivers unforgettable user experiences and uncompromising security for any type of user. From anti-lock-in integrations, out-of the-box best practices, and innovative services from decentralized identity to AI-driven governance and fraud prevention, Ping is the one-stop shop for game-changing digital identity. ...Read More

Radiant Logic

Radiant Logic is the only solution delivering enterprise-wide identity hygiene at scale, reducing risk and accelerating time to value. As a central intelligence hub, RadiantOne unifies 100% of an organization’s identity data, delivers 360º observability into fully harmonized data, and leverages advanced AI to transform analytics into actionable business intelligence with unmatched precision. We make identity work so your business doesn’t just keep up—it outperforms in every way. Learn more at - http://radiantlogic.com ...Read More

RSA

RSA provides trusted identity and access management for 12,000 organizations around the world, managing 25 million enterprise identities and providing secure, convenient access to millions of users. RSA empowers organizations to thrive in a digital world, with complete capabilities for modern authentication, lifecycle management, and identity governance. Whether in the cloud or on-premises, RSA connects people with the digital resources they depend on everywhere they live, work, and play. ...Read More

SailPoint Technologies

SailPoint delivers unified, identity-first security through an intelligent platform that manages and secures access for all human and digital identities. We empower enterprises to scale securely, defend against evolving threats, boost productivity, and drive transformation. Trusted by the world’s most complex organizations, SailPoint protects the modern enterprise. ...Read More

Saviynt

Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognized as an industry leader in identity security whose cutting-edge solutions protect the world’s leading brands, Fortune 500 companies and government organizations. For more information, please visit www.saviynt.com.  ...Read More

Semperis, Inc.

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing Active Directory, Semperis’ patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. ...Read More

Silverfort

Silverfort unifies identity security into a single platform, and is the only company proven to protect all identities, in the cloud, on prem, human, or machine and everything in between. We give businesses visibility into their entire network of identities, and extend protection to resources that previously could not be protected— like service accounts, legacy systems or command line tools. And this is all done via our unique platform architecture that won’t disrupt business operations, is lightweight on the devices it protects and effortless to use and deploy. ...Read More

Transmit Security

Transmit Security has reimagined fraud prevention and CIAM by replacing siloed solutions with a fusion of customer identity management, identity verification and fraud prevention. Mosaic by Transmit Security, the company’s flagship platform, offers best-of-breed modular services to address fraud and identity use cases while minimizing complexity and costs. With AI-driven cybersecurity at its core, Mosaic is built for resilience and scale, earning the trust of 7 ‘top 10’ US banks and Fortune 500s. Discover transmitsecurity.com. ...Read More

Twine Security

Twine builds AI Digital Employees for cybersecurity teams. Our first AI digital employee, Alex, learns, understands and takes away the burden of identity and access management (IAM) tasks - proactively completing your organization’s cyber objectives. Our customers use Alex for varied use cases - from autonomously remediating issues like finding missing account owners, to helping onboard applications to IGA platforms, and much more. Goodbye simple, legacy automations. Hello effortless, self healing, start to finish execution by proactive AI Digital Employees. Come check us out! ...Read More

Veza

Veza is the Identity Security company, helping organizations secure access across the enterprise. Veza’s Access Platform goes beyond identity governance and administration (IGA) tools to visualize, monitor, and control entitlements so that organizations can stay compliant, achieve least privilege, and de-risk the breach. Global enterprises like Wynn Resorts, Expedia, and Blackstone trust Veza to manage identity security posture, with use cases in privileged access management (PAM), non-human identities (NHI), cloud entitlements (CIEM), data system entitlements, SaaS entitlements, and IGA. ...Read More

1Kosmos

The 1Kosmos BlockID platform performs millions of passwordless, MFA authentications daily for some of the world's largest banks, telecommunications, and healthcare organizations. By binding a user account to their verified identity, these organizations eliminate passwords and enable workers, customers, and citizens to log in with a simple blink and smile, mitigating credential-based threats including ransomware, phishing, and data breach. BlockID distributed identity cloud service that easily integrates with existing OS, applications, and IT security infrastructure via API/SDK. ...Read More

1Password

Trusted by over 150,000 businesses and millions of consumers, 1Password offers identity security and access management solutions built for the way people work and live today. 1Password is on a mission to eliminate the conflict between security and productivity while securing every sign-in for every app on every device. As the provider of the most-used enterprise password manager, 1Password continues to innovate on its strong foundation to offer security solutions relied upon by companies of all sizes, including Associated Press, Salesforce, GitLab, Under Armour, and Intercom. ...Read More

Axonius

Axonius Identities delivers modern Identity Governance and Administration by correlating and normalizing identity data across all environments. With a complete, accurate identity graph, organizations can see every identity, remediate toxic access, automate enforcement, and prove compliance continuously. ...Read More

CrowdStrike

CrowdStrike has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk - endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise. Built in the cloud with a single lightweight-agent architecture, Falcon platform delivers rapid & scalable deployment, protection, performance, reduced complexity. ...Read More

Delinea

With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams’ adoption by deploying in weeks, not months, and makes them more productive by requiring 90% fewer resources to manage than the nearest competitor. With a guaranteed 99.99% uptime, the Delinea Platform is the most reliable identity security solution available. ...Read More

Entrust

Entrust fights fraud and cyber threats with comprehensive identity-centric security that protects people, devices, and data. Our solutions help enterprises and governments safeguard critical systems from every angle, enabling secure onboarding and issuance, providing everyday identity protection, and empowering them with 360-degree visibility and orchestration across keys, secrets, and certificates so they can transact and grow with confidence. Building on our decades as a pioneer and innovator in establishing trust, Entrust supports customers in over 150 countries. ...Read More

IBM

IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity, and service. ...Read More

IDMWORKS

IDMWORKS is the industry standard in IAM assessment, strategy, implementation, and management for organizations looking to improve their identity programs. Our Gartner-recognized approach has delivered over 4000 successful identity transformations across 850 client sites supporting everything from internal IAM programs to highly complex integrated workforce and CIAM transformations. IDMWORKS’ Managed Identity provides an effective solution to host and support day-to-day IAM service delivery without the overhead and complexity involved in internal IAM personnel. ...Read More

ManageEngine

ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and MSPs. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT. ...Read More

Opti

Say hello to Opti — the AI-native IAM platform built to transform how identity teams work. Opti unifies and analyzes identity data across any app, IdP, and homegrown system to deliver real-time visibility, automated remediation, and intelligent governance. Purpose-trained LLMs power deep context and explainable actions, helping teams mitigate risk, streamline JML, and automate UARs. Think of Opti as the Operation System for modern identity teams. With Opti, identity work becomes faster, smarter, and audit-ready by design, so get ready for the future of Identity workforce! ...Read More

Rubrik

Rubrik (NYSE: RBRK) is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organisations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organisations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked. ...Read More

SSH

SSH helps organizations safeguard their mission-critical digital assets at rest, in transit, and in use. We have 5,000+ customers worldwide, including 40 percent of Fortune 500 companies and major organizations in the Finance, Government, Retail, and Industrial segments. We secure communications between humans, systems, and networks. We help our customers secure their business in the age of the hybrid cloud and distributed IT and OT. Our Zero Trust solutions offer safe communications, passwordless and keyless encrypted access, and privileged credential management with quantum-safe solutions. ...Read More

StrongDM

StrongDM's Zero Trust PAM platform delivers accuracy, precision, and agility in managing privileged actions across any infrastructure. It enables seamless, secure access to resources necessary for users’ tasks, reducing attack surfaces by limiting unsanctioned actions and excess privileges through on-demand access. Continuous assessment and instant mitigation ensure continuous compliance. For more information, visit the StrongDM website. ...Read More

Thales

Thales is a global leader in advanced technologies and cybersecurity. Thales’s digital identity solutions empower billions of people and things with digital identities worldwide. The Thales OneWelcome IAM portfolio enables organizations to build frictionless, trusted and secure digital journeys for customers, business partners and employees. The OneWelcome Identity Platform provides a variety of capabilities from identity verification, SSO, passwordless and MFA to fraud management, adaptive access, dynamic authorization and consent & preference management for the highest levels of assurance. ...Read More

Akeyless

Akeyless is redefining identity security for the modern enterprise, delivering a unified Secrets & Non-Human Identity platform designed to prevent breaches due to compromised machine identities and secrets. The Akeyless cloud-native SaaS platform provides Vaultless Secrets Management integrated with Certificate Lifecycle Management, Next Gen Privileged Access (Secure Remote Access) & Encryption Key Management to manage the lifecycle of all machine identities and secrets across all environments. ...Read More

Andromeda Security

Andromeda Security unifies the complex identity landscape across human and NHI to reduce your blast risk and protect against breaches. We leverage the power of AI to make risk and context-based intelligent decisions to automate, rightsize, and remediate identity permissions and lifecycle, enforce least privilege, and provide Smart JIT access. ...Read More

AppViewX

AppViewX AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) and PKI platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. With the challenges of shorter TLS validity, certificate compromises, and post-quantum cryptography, enterprises need to be crypto-agile to ensure security and compliance. ...Read More

Aquera

Aquera, a 2022 Gartner Cool Vendor in Identity-First Security, automates over 1 billion transactions annually for 900+ organizations. Aquera complements IAMs/IGAs with connectivity and analytics solutions including identity sourcing from 50+ ATSs/HCMs, 900+ LCM/IGA connectors, self-service GenAI connector builders, IGA entitlement file collection operations automation for file-based applications, B2B delegated admin across heterogeneous IDPs, JML transaction analytics, and identity BI analytics. Additionally, Aquera offers HR processes integrations surrounding HCMs. ...Read More

Astrix Security

Axiomatics, Inc.

Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continue depend on the Axiomatics platform as a critical part of their access control strategy. ...Read More

BIO-key

No Phone. No Token. No Problem. BIO-key is a trusted provider of IAM solutions with biometrics at its core. Our mission is to strengthen security while enabling user flexibility that drives productivity and reduces total cost of ownership through phishing-resistant, passwordless, and tokenless authentication. More than 1,000 global customers rely on BIO-key’s PortalGuard IAM platform to authenticate employees, customers, and suppliers securely with ease—centrally managing access across devices and applications with flexible options for MFA, SSO, and SSPR. ...Read More

Britive

Britive is the first true cloud privileged access management (CPAM) solution tailored for security, cloud operations, and development teams in cloud-forward organizations. The platform centralizes, standardizes, and simplifies privileged access management across the environment. Featuring an API-first design, Britive seamlessly integrates with existing systems to ensure flexibility and agility in cloud environments. Our patented dynamic and ephemeral just-in-time (JIT) access technology enables precise security controls without impeding operational speed. ...Read More

Cerby

Cerby offers IT and Security teams the only identity and access management platform tailored for disconnected applications. Seamlessly integrating with your existing identity provider, Cerby extends SSO, MFA, and lifecycle management to any application, even those without APIs or support for standard protocols. With Cerby's patent-pending identity automation, IT teams can streamline manual processes like deprovisioning and MFA enrollment, gaining unmatched efficiency and full visibility and control over applications that fall outside traditional identity systems. ...Read More

Clarity Security

ConductorOne

Curity

Curity is a leading supplier of API-focused identity management, providing unified security for digital services. Curity Identity Server is used for logging in and securing millions of users’ access to web and mobile applications as well as APIs and microservices. Built on open standards and designed for development and operations teams, Curity is trusted by large organizations in financial services, teleco, retail, energy, and government services that need enterprise-grade API access security. ...Read More

Cyata Security

AI agents are emerging as a new identity class - shipping code, engaging with customers, and even executing financial transactions. Traditional IAM was not designed to see or govern them. Cyata is the control plane for agentic identity: discovering agents across endpoints and SaaS, performing real-time posture evaluation, and enforcing guardrails before actions execute. Identity leaders can bring agents into governance and compliance with the same visibility and accountability as human and machine identities. ...Read More

Descope

Descope is a drag-and-drop customer authentication and identity management platform. Our no / low code CIAM solution helps hundreds of organizations easily create and customize their entire user journey using visual workflows – from authentication and authorization to MFA and federated SSO. Customers like Navan, You.com, and Branch use Descope to improve user onboarding, enhance account protection, and get a unified view of their customer journey. ...Read More

Entro

A pioneer in the non-human identity space, Entro Security provides an NHI and Secrets Security platform designed for security teams. Entro secures and manages the lifecycle of NHIs and secrets, enabling organizations to securely utilize NHIs from inception to rotation. The platform integrates seamlessly within an organization's existing vaults, secret creation and exposure locations and offers unique Non-Human Identity Detection and Response (NHIDR™) capabilities. Entro has received numerous industry recognitions including Gartner Cool Vendor. ...Read More

Fischer Identity

Fischer Identity, a visionary leader in Identity and Access Management (IAM), is dedicated to empowering organizations with cutting-edge solutions that fortify security, streamline operations, and simplify administration. Our mission is clear: immediate value through IAM excellence. Our vision propels us to be the global IAM leader, pioneering cybersecurity's future. We're committed to a world where organizations navigate the digital realm with confidence, fortified by our innovative, Zero Trust-based solutions. ...Read More

Frontegg

Frontegg is a leading CIAM solution that helps reduce the engineering burden of identity management while securing customer-facing apps and AI agents. With Frontegg, non-developers can directly manage authentication, authorization, user management, and security policies with greater granularity. Founded in 2019, Frontegg serves as the trusted identity infrastructure for fast-scaling companies worldwide. ...Read More

GCA Technology Services

At GCA, we deliver successful business outcomes through specialized expertise in Identity & Access Management, Identity Governance & Administration, Privileged Access Management, and Web Access Management. We focus on one thing: Managing YOUR Digital Identities—with Strategy, Implementation, and Managed Services for the Enterprise. Visit our booth and learn how we can deliver world-class Identity results for your organization. ...Read More

Grip Security

Grip Security is a pioneer in security and offers the industry’s most complete platform for managing SaaS security. Today’s IT environment is rapidly transforming due to AI and automation at every stage, and Grip enables companies to embrace innovation without sacrificing security, compliance, or efficiency. Grip empowers companies to stay ahead of evolving threats and take control of their SaaS ecosystem to turn security into a business advantage. ...Read More

Hush Security

HYPR

HYPR, the leader in passwordless identity assurance, delivers comprehensive identity security by unifying phishing-resistant passwordless authentication, adaptive risk mitigation, and automated identity verification. Trusted by top organizations including two of the four largest US banks, HYPR ensures secure and seamless user experiences and protects complex environments globally. Additional information is available at hypr.com. ...Read More

iC Consult

iC Consult is the trusted global partner of choice for Identity-driven Cybersecurity. Our team of over 850 experts is committed to delivering next-level solutions tailored to the unique needs of our clients worldwide. Identity is our specialty: Our end-to-end service portfolio covers all aspects of professional and managed services in identity security including advisory, architecture, implementation, integration, support, and operations. ...Read More

IDMExpress

IDMEXPRESS is a USA-based Identity & Access Management (IAM) and Privileged Access Management (PAM) implementation and managed services partner, providing security solutions to organizations across various industries based on their needs and demands.

Incode

Incode is a global leader in identity verification and authentication, utilizing cutting-edge AI to deliver seamless, secure experiences and prevent fraud across industries. Incode Workforce is an advanced solution designed to secure critical interactions throughout the employee lifecycle, enhancing Okta’s capabilities with “real-world” identity verification. From MFA enrollment to help desk interactions and password resets, Incode Workforce provides a highly secure, device-agnostic solution, ideal for step-up verification, combating social engineering attacks, and mitigating deepfake threats. ...Read More

Inspira Enterprise

Inspira Enterprise is a leading Digital Transformation company, with its Centers of Excellence in Cyber Security, Blockchain, Cloud, Intelligent Automation, Big Data & Analytics, Internet of things, Intelligent Traffic Management System, Networking and Healthcare Solutions. It is ISO and CMMI Level 3 certified organization. It caters to customers in the Government Institutes (Central Ministries & State Departments), Defense, Agriculture, Public Sector Undertakings, Banking Financial Services Insurance, IT / ITeS, Healthcare & Enterprise verticals. ...Read More

iProov

iProov is the world leader in online facial biometric authentication, working with governments, banks and other enterprises to securely verify customer identity. Used for effortless onboarding and authentication, customers include the U.S. Department of Homeland Security, the UK Home Office, the UK National Health Service (NHS), the Australian Taxation Office, GovTech Singapore, UBS, Rabobank, ING, and others. ...Read More

KeyData Associates

KeyData is a recognized North American leader in Identity and Access Management (IAM), Privileged Access Management (PAM), Customer IAM (CIAM), and Workforce IAM (WIAM) services. We offer strategic advisory, hands-on systems integration, and holistic managed services with partners like SailPoint, Okta, CyberArk and many others. Serving government, financial, healthcare, energy, and higher education sectors, we’ve managed 50M+ identities and delivered 1,000+ successful deployments. Our focus is delivering secure, compliant, and future-proof IAM solutions for our clients. ...Read More

Keyfactor

Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale – and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. ...Read More

LastPass

LastPass is a leading identity and password manager, making it easier to log in to life and work. Trusted by 100,000 businesses and millions of users, LastPass combines advanced security with effortless access for individuals, families, small business owners, and enterprise professionals. ...Read More

MightyID

MightyID is an Identity Access Management (IAM) Resilience platform built to empower organizations to protect access to their most critical applications. MightyID offers backup and recovery, seamless migration, and failover solutions, integrating with major cloud Identity Providers including Okta, Microsoft Entra, and PingOne. As a pioneer in IAM Resilience, MightyID supports uptime and availability of your IAM data and associations so your business can keep moving forward, even in a crisis. ...Read More

Monokee

Monokee stands at the forefront of cutting-edge IAM solutions with its innovative features. At the core of Monokee's offering is its Visual Identity Orchestrator, a powerful tool that redefines and simplifies the way authentication and authorization processes are built. The platform provides top-notch ease of integration with 3rd-party applications, adopting an "effortless and reusable" approach: build once in a no-code fashion and reuse when needed with just a few clicks. ...Read More

Netwrix Corporation

Netwrix is reinventing data security based on the premise that data security and identity security cannot work in isolation. Netwrix offers a comprehensive set of solutions that protect identities and data for over 13,500 organisations globally. Netwrix AI and flexible deployment options make it easier, faster, and more economical than ever for security teams to investigate and remediate threats. Netwrix: Data security that starts with identity. For more information, visit www.netwrix.com. ...Read More

NuSummit Cybersecurity

NuSummit Cybersecurity is a full-service IAM specialist firm providing IAM Managed Services, System Integration, and Strategic IAM Advisory. We have 600+ success stories across North America, EMEA, and APAC. We specialize in Consumer IAM, IDM Automation, Privileged IAM, Zero Trust, and RBAC. We have global alliances with industry-leading IGA, Access Management, and PAM product partners. Our 400+ IAM professionals provide expertise across all industry-leading and legacy IAM products to expedite your IAM programs. ...Read More

Oasis Security

Oasis is a leading provider of non-human identity management. The shift to cloud, devops, and AI is fueling exponential growth of non-human identities opening up a new massive attack surface. Oasis pioneered the first enterprise-grade platform specifically designed to tackle the unique security and operational challenges of non-human identities, enabling security and engineering teams to bolster security posture, implement robust governance, and simplify compliance. ...Read More

Oleria

Oleria is identity security reimagined - helping organizations accelerate business velocity, trusting that their data is protected. Its flagship product, Oleria Adaptive Security, enables organizations to have fine-grained, comprehensive visibility into their security posture and the identification and mitigation of access risks before they can be exploited. Founded by cybersecurity veterans with decades of experience building & operating some of the world's largest security programs, Oleria is backed by Evolution Equity Partners, Salesforce Ventures, Tapestry & Zscaler. ...Read More

Opal Security

Opal Security’s identity security platform helps security teams achieve and manage least privileged access across complex enterprises. Managing access becomes straightforward with Opal, integrating a continuous security workflow into identity management to detect, prioritize, and mitigate risky access and privileges. As a result, organizations can significantly reduce their attack surface and minimize the impact of potential breaches. ...Read More

P0 Security

P0 Security is the next-generation privileged access platform, redefining how teams manage production access across cloud and hybrid environments. Unlike legacy patchworks of PAM, IGA, CIEM and IAM, P0 unifies orchestration, risk posture and governance in one control plane—built for scale, speed and Zero Standing Privilege. At its core, P0’s Identity Graph and Access DNA deliver real-time insight and policy-driven, short-lived access across all identities and resources. Learn more at p0.dev. ...Read More

Pathlock

Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. We provide a single platform to unify access governance, automate audit and compliance processes, and fortify application security, allowing organizations the ability to confidently handle the security and compliance requirements in their core ERP and beyond. Pathlock provides the fastest path towards strengthening your ERP security & compliance posture. ...Read More

Persona

Persona offers a best-in-class unified identity platform that gives businesses the building blocks they need to design and manage fully customizable KYC, AML, KYB, and identity verification programs across 200+ countries and territories, helping them meet compliance standards, fight fraud, and build trust throughout the customer lifecycle. Persona is backed by Founders Fund, Index Ventures, and Coatue and serves a wide range of industries with customers including LinkedIn, Travelex, Square, Twilio, and OpenAI. ...Read More

PlainID

PlainID is the world's leading provider of enterprise Authorization, helping enterprises address the complex challenges of Identity Security. The PlainID Platform allows you to discover, manage, and authorize access control policies for enterprise applications and data. Our solution is architected to protect against identity-centric security threats powered by Policy-Based Access Control (PBAC). ...Read More

ProNoesis

ProNoesis is a specialized cybersecurity provider delivering comprehensive Identity and Access Management (IAM) solutions. Our services encompass advisory, implementation, and managed IAM services, ensuring secure digital identities and seamless user experiences. Central to our approach is the Identity Express Toolkit, featuring accelerators that guide organizations through the Define, Deliver, and Defend phases. This framework not only optimizes security but also significantly reduces time to value, empowering organizations to effectively manage access, mitigate risks, and achieve compliance. ...Read More

Quest Software

Quest is the recognized leader in Active Directory and Entra ID modernization, ITDR and disaster recovery. For 40 years, 145,000 customers and partners have worked with Quest to reduce risk, strengthen resilience and grow their mission with confidence. With the most complete set of hybrid AD security controls you can identify and prevent potential attacks, detect and block suspicious behavior, and recover 90% faster. Gartner recognizes Quest every year for ITDR and lists Quest twice as much as any other example vendor in its most recent IAM Best Practices for Active Directory research. ...Read More

Readibots

Readibots: Agile Identity Readibots transforms how you manage identity. We break down the barriers by supercharging your IGA, automating complex processes with full governance and control. No more manual errors, no more wasted time—just seamless automation that accelerates projects and drives efficiency. Readibots allows you to connect systems, automate tasks, and delegate operations. Readibots puts you in full control for accelerated identity projects. ...Read More

SDG

With more than 30 years of experience partnering with global brands on complex business and IT challenges, SDG is a proven leader in advisory, transformation, and managed services that enable leaders to confidently execute AI, identity, threat, and risk management solutions that protect assets and provide business value. ...Read More

Secret Double Octopus

At Secret Double Octopus, we believe authentication should be stronger, simpler, and completely password-free. Our patented ZeroPassword™ technology eliminates passwords even from legacy and on-prem systems, delivering unmatched security and user experience at scale. Our platform integrates seamlessly into any infrastructure, supporting any system, use case, or authentication method. Trusted by SMBs and Fortune 50 enterprises alike, we secure billions of authentications annually, enabling organizations to achieve modern, phishing-resistant security at scale. Let’s redefine authentication. ...Read More

Sectigo

Sectigo is the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), with automated solutions and digital certificates that secure every human and machine identity for the world’s largest brands. Its automated, cloud-native, universal CLM platform issues and manages digital certificates provided by all trusted certificate authorities (CAs) to simplify and improve security protocols across the enterprise. Sectigo is one of the longest-standing and largest CAs with more than 700,000 customers and two decades of delivering unparalleled digital trust. ...Read More

Seraphic Security

Seraphic is a leader in the rapidly growing Enterprise Browser Security market, driven by its patented technology that turns any browser into a secure browser with robust protection and detection capabilities. Seamlessly and easily deployed, Seraphic also enables secure access to SaaS and private web applications for employees and third parties from managed and personal devices without the complexity and cost of VDI & VPN. Invisible to the end-user, Seraphic supports all browsers and SaaS desktop applications like Teams, Slack, Discord and WhatsApp. ...Read More

SGNL.AI

SGNL delivers continuous, context-aware protection for sensitive data, infrastructure, cloud workloads, and applications, and now extends that protection to AI through the SGNL MCP Security Gateway—enforcing real-time policies on AI agent actions. By centralizing context, real-time enforcement, and enterprise-wide orchestration through open standards like CAEP and the Shared Signals Framework, SGNL enables Zero Standing Privilege across the entire identity footprint and makes Zero Trust an operational reality. ...Read More

Simeio

Simeio is how enterprises finally give the right people the right digital access quickly and securely. With their identity orchestration platform backed by expert services, you have everything you need to get access right now.

Specter Ops

SpecterOps is a leader in Identity risk reduction. Possessing deep knowledge of adversary tradecraft, the company enables organisations to detect and remove critical attack paths before attackers can act – a practice called Attack Path Management. SpecterOps maintains widely used open-source security toolsets including BloodHound, the company’s foundational tool that enables Attack Path Management in Active Directory & Entra ID. BloodHound Enterprise is the company's managed SaaS, allowing for attack path prioritization, remediation guidance and reporting to show improvement over time. ...Read More

Sphere Technology Solutions

SPHERE is the global leader in Identity Hygiene. We are dedicated to reshaping modern identity programs by embedding this foundational fabric, enabling organizations to quickly reduce risks. We work through an identity lens that protects an organization’s accounts, data, and infrastructure. Our solutions deliver immediate time-to-value by leveraging automation to discover, remediate and secure identities, now and forever. We continually innovate, helping our clients to sleep better knowing their attack surface is drastically reduced, thwarting the plans of bad actors every single day. ...Read More

Strivacity

Strivacity helps brands deliver simple, secure sign-up and sign-in without big dev teams or costly consultants. Our single CIAM product unifies registration, authentication, fraud prevention, identity verification, consent, and insights. Built on single-instance architecture, every customer gets a dedicated environment for stronger privacy and security. Code, configure, or mix both to move fast while protecting data, staying compliant with GDPR/CCPA, and creating seamless digital experiences. ...Read More

TechDemocracy

With over two decades of cybersecurity expertise and 1600+ global engagements, TechDemocracy specializes in workforce IAM and customer identity & access management (CIAM), governance, risk and compliance (GRC), holistic cybersecurity, and managed security services. Combining cutting-edge technology, certified experts, and proven processes, the company helps organizations secure their digital infrastructure and manage risk. With a global presence in the US, India, Canada, and the Philippines, TechDemocracy fully manages identity security solutions throughout the entire identity journey. ...Read More

Teleport

Teleport is the easiest, most secure way to access infrastructure. The open-source Teleport Access Plane consolidates connectivity, authentication, authorization, and audit into a single platform. By consolidating all aspects of access for engineers and the software they write, Teleport reduces attack surface area, cuts operational overhead, easily enforces compliance, and improves productivity. ...Read More

Theom

Theom is an AI-driven Data Access Governance and security platform that protects sensitive data across data clouds and lakehouses. It enables organizations to classify data, enforce granular access controls, detect attacks using the MITRE ATT&CK framework, and respond to incidents with built-in automation. Theom operates seamlessly without agents or proxies, delivering unique insights into data assets and risks. By unifying governance across Snowflake, Databricks, Azure, and AWS, Theom reduces complexity, minimizes data breach risks, and ensures compliance with security regulations. ...Read More

Token Security

Token Security offers a centralized non-human identity security solution for modern cloud environments, mitigating risks and challenges originating from the inherent interaction between non-human and human identities. Our solution offers comprehensive visibility into all non-human identities, providing granular inventory management. Using our AI-based engine, we offer a broader security context, conduct risk analysis, and establish identity ownership, enabling security teams to identify and automatically remediate critical risks. ...Read More

Tuebora

Tuebora Identity and Access Management (IAM) Platform is a dynamic self-driven solution powered by predictive analytics and intelligence. Our solution empowers organizations to rapidly adopt best practices for managing access risk, automating existing identity and access management processes for scale and workload reduction, and measuring efficiency gains through effectiveness metrics and reporting. With Tuebora IAM, organizations modernize legacy identity management solutions with the cloud-based services they need and pay only for the value they receive via a flexible utility model. ...Read More

Xalient

Xalient is an award-winning global consulting firm focused on IAM and Secure Networking. Our deep expertise in these two areas drives our services, which include Advisory, Vendor Evaluation, Implementation, Integrations, Cloud Migration, Support, and Managed Services. We're an 8x SailPoint Admiral Delivery Partner, the only Elite-level BeyondTrust Partner, a 2x CyberArk Services Partner of the Year, winner of Okta’s Business Innovation Of The Year award, Zscaler's Technical Partner of the Year, and Aruba's North American EdgeConnect Partner of the Year award winner. ...Read More

Yubico

Yubico (Nasdaq First North Growth Market Stockholm: YUBICO) is the inventor of the YubiKey, the gold standard in phishing-resistant multi-factor authentication (MFA), and a creator and contributor to FIDO open authentication standards. The company is a pioneer in delivering hardware-based passwordless authentication using the highest assurance passkeys to customers in 160+ countries. For more information, visit: www.yubico.com. ...Read More

Ready to join us in Grapevine, TX?

Experience the Gartner difference — talk with experts, meet your peers and turn insight into action.