2026 Security Conference Exhibitors

Meet the world’s leading technology and solution providers at Gartner Security & Risk Management Summit 2026, in National Harbor, MD.

Connect with cybersecurity and IT solution providers

Visit the dynamic show floor, where you can interact with solution providers and learn about new products and services.

Exhibitors at #GartnerSEC

Solution provider landscape

Learn about the current landscape as you continuously evaluate and analyze product capabilities.

Exhibitors at #GartnerSEC

Interactive sessions

Make well-informed investment decisions based on objective insights from Gartner case studies and thought leadership.

Exhibitors at #GartnerSEC

Solution evaluations

Compare solutions and formulate your shortlists of providers that can best help solve your mission-critical priorities.

Exhibitors at #GartnerSEC

Exhibitor connections

Gain mind share and build relationships with executives from solution provider companies.

Interested in becoming a conference exhibitor?

Innovative technology companies have the opportunity to share solutions with a wide range of well-qualified, senior-level prospects across our role-based annual conference ecosystem.

Premier

Hear peers share their experiences with solution providers

  • “Gartner has been essential in providing valuable insights that have helped to guide our information security program. The time that is saved in doing technology and product research helps us to move quickly and be more agile.”

    James Pardonek
    CISO, Loyola University Chicago

  • “This is one of the best conferences I’ve ever been to and ... we have repeatedly come back. The ability to get actionable information which can be implemented immediately [...] and access to one-on-one conversations with analysts is unparalleled.”

    Greg Swenson
    Security Analyst, Children’s Hospital of Philadelphia

  • “I look forward to this conference every year. It is a great place to get new ideas network with peers and meet new people from other companies. I enjoy seeing all of the new vendors and new cybersecurity strategies.”

    Melissa Livesey
    Director, TVA

1 3

Platinum

“This is my second time at this conference. I came back because I got so much from the one last year. I love this conference because of the CISO Circle Program, which always challenges me with strategy and forward thinking, as well as the deep content knowledge that’s here from all the Gartner experts. Of course, the networking between peers — meeting old friends and making new ones — is so refreshing. Vendor selections here are just icing on the cake.”

Terry Grogan
CISO, Tower Health

Gold

Silver

Conference Exhibitor Directory

Armis Inc.

Armis, the cyber exposure management & security company, protects the entire attack surface and manages an organization’s cyber risk exposure in real-time. In a rapidly evolving, perimeter-less world, Armis ensures that organizations continuously see, protect, and manage all critical assets - from the ground to the cloud. Armis secures Fortune 100, 200, and 500 companies as well as national governments, state, and local entities to help keep critical infrastructure, economies, and society safe and secure 24/7. Armis is a privately held company headquartered in California. ...Read More

Axonius

Axonius transforms asset intelligence into intelligent action. Preemptively tackle hard-to-spot threat exposures, misconfigurations, and operational inefficiencies across your entire technology footprint – all in one place. The actionability era of cybersecurity is here.

Cisco

Cisco + Splunk deliver an open, network-native platform that enables and secures the agentic enterprise at scale. We protect the apps and agents you run with Hybrid Mesh Firewall and provide secure, Zero Trust Access to connect agents, users, and devices to tools. And we use the Cisco Data Fabric to unlock the power of the ludicrous amounts of data generated by agents and AI to drive the Agentic SOC -- unified visibility to oversee agents and drive closed-loop response across your estate. ...Read More

Cloudflare

Cloudflare, Inc. is the leading connectivity cloud company. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business. Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. ...Read More

CrowdStrike

CrowdStrike (NASDAQ: CRWD) a global cybersecurity leader, has redefined modern security with the world’s most advanced AI-powered, cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. CrowdStrike's Falcon platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, and elite threat hunting. ...Read More

CYERA

Cyera is the AI Security Platform built for the age of agents. Enterprises like Paramount, Chipotle, and Valvoline use Cyera to control exactly what data their AI can reach—and govern what happens next. The platform secures data at rest, in motion, and in use, whether touched by humans or AI agents. Valued at $9 billion and backed by over $1.7 billion from top-tier investors including Accel, Blackstone, and Sequoia. Protect your data. Secure AI. ...Read More

Dispel

Dispel redefines how industrial organizations connect to OT. The Dispel Zero Trust Engine establishes a secure, scalable connectivity layer across all makes, models, and generations of equipment—enabling OT secure remote access, industrial data streaming, and integrated threat monitoring, even in the most complex environments. Dispel OTFusion accelerates digital transformation by standardizing data flows and unifying fragmented OT DMZs—maximizing operational efficiency. Defense is in our DNA. Learn more at dispel.com ...Read More

F5

F5 is the global leader that delivers and secures every app. Backed by three decades of expertise, F5 has built the industry’s premier platform—F5 Application Delivery and Security Platform (ADSP)—to deliver and secure every app, every API, anywhere: on-premises, in the cloud, at the edge, and across hybrid, multicloud environments. F5 is committed to innovating and partnering with the world’s largest and most advanced organizations to deliver fast, available, and secure digital experiences. Together, we help each other thrive and bring a better digital world to life. ...Read More

Google Cloud Security

About Google Cloud Security: Make Google part of your security team with Mandiant frontline experts, threat intelligence-driven security operations, and cloud security—supercharged by AI. Organizations can address their tough security challenges with many of the same capabilities Google uses to keep more people and organizations safe online than anyone else in the world: frontline intelligence and expertise, a modern, intel-driven security operations platform, and a secure-by-design cloud foundation. ...Read More

Kiteworks

Kiteworks empowers organizations to effectively manage risk in every send, share, receive, and use of private data. Kiteworks Private Data Network (PDN) unifies, tracks, controls, and secures sensitive data moving within, into, and out of organizations, significantly improving risk management and ensuring regulatory compliance on all private data exchanges. Headquartered in Silicon Valley, Kiteworks protects over 100 million end-users and thousands of global enterprises and government agencies. ...Read More

KnowBe4

KnowBe4 empowers workforces to make smarter security decisions every day. Trusted by over 70,000 organizations worldwide, KnowBe4 helps to strengthen security culture and manage human risk. KnowBe4 offers a comprehensive AI-driven “best-of-suite” platform for Human Risk Management, creating an adaptive defense layer that fortifies user behavior against the latest cybersecurity threats. ...Read More

LevelBlue

LevelBlue reduces risk and builds lasting resilience so organizations can innovate and advance their mission with confidence. As the world’s most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter: stronger defense, faster response, and sustained business continuity. LevelBlue combines AI-powered security operations, advanced threat intelligence, and elite human expertise to provide the most comprehensive portfolio of strategic advisory, managed security, offensive security, and incident response services. ...Read More

Mattermost Inc

Mattermost is a secure collaboration platform built for mission-critical work in defense, government, and critical infrastructure. Trusted by the U.S. Department of Defense and Fortune 500s, it supports MissionOps, DevSecOps, and Cyber Defense with secure messaging, file sharing, screen sharing, workflow automation, and AI assistance. Available in self-hosted and single-tenant SaaS, Mattermost is open core, co-developed with 4,000+ contributors and top security experts. Learn more at mattermost.com. ...Read More

Microsoft

Microsoft’s agentic security platform turns more than 100T threat intelligence signals daily into a powerful, fast, scalable, AI-powered defense. With Microsoft, defenders are breaking down silos, protecting their AI investments end-to-end, responding to threats faster, and catching what others miss. Microsoft Security is built for the era of human-led, AI-operated security. ...Read More

Okta

Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to protect their AI agents, users, employees, and partners while driving security, efficiencies, and innovation. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com. ...Read More

ReliaQuest

ReliaQuest exists to Make Security Possible. Our Agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, contain, investigate and respond in less than 5 minutes, eliminating Tier 1 & Tier 2 security operations work. GreyMatter uses data-stitching, detection-at-source, AI and automation to seamlessly connect telemetry from across cloud, multi-cloud and on-premises technologies.  ReliaQuest is the only cybersecurity technology company that delivers outcomes specific to each organization’s unique architecture, technology & business needs ...Read More

Safe Security

SAFE is the leader in Autonomous Cyber Risk Management. SAFE uses agentic workflows to autonomously reason over, assess, and act on cyber risk across the enterprise and third parties. SAFE is recognized as the #1 Cyber Risk Quantification (CRQ) solution by Forrester, #1 TPRM for product capability by Liminal Research, and a Visionary in the 2025 Gartner Magic Quadrant for Exposure Assessment Platforms. Trusted by global enterprises including Apple, Netflix, Verizon, SAFE has raised $170 million to redefine how cyber risk is managed in the age of AI. ...Read More

Sophos

Sophos defends your organization from inevitable cyberattacks with innovative, adaptive defenses and deep security expertise. Our extensive portfolio of managed security services, comprehensive endpoint, network, email, and cloud security solutions, and industry-leading threat intelligence from Sophos X-Ops all work together and adapt to defend through the Sophos Central platform. Our AI-driven platform is embedded in the security operations of thousands of organizations globally to identify risk, automate threat defense, and stop cyberattacks. Sophos provides 24/7 cybersecurity services. ...Read More

Tenable, Inc.

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for over 40,000 customers around the globe. Learn more at tenable.com. ...Read More

Thales

Thales is a global leader in cybersecurity, helping the most trusted organizations protect critical applications, data, identities, and software anywhere, at scale. Through Thales’ integrated platforms, customers achieve better visibility of risks, defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day. ...Read More

ThreatLocker

Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and operational alert EDR and MDR solutions.

US AI

US AI | The Intelligent Computing Company builds adaptive, self-evolving systems that drive mission speed and business supremacy. Our Intelligent Computing Platform unifies cyber defense, compliance, cloud, and operational intelligence - empowering organizations to outthink threats, outpace change, and lead with intelligent momentum. ...Read More

Varonis

Varonis (Nasdaq: VRNS) secures AI and the data that powers it. The Varonis platform gives organizations automated visibility and control over their critical data wherever it lives and ensures safe and trustworthy AI from code to runtime. Backed by 24x7x365 managed detection and response, Varonis gives thousands of organizations worldwide the confidence to adopt AI, reduce data exposure, and stop AI-powered threats. ...Read More

Wiz

Wiz protects everything organizations build and run. The Wiz Security Platform connects code, cloud, and runtime into a single shared context, allowing security and engineering teams to prioritize real risk, fix issues at the source, and stop threats. Built for the cloud and AI era, Wiz enables secure-by-default development and continuous risk reduction across the application lifecycle. Trusted by 50% of the Fortune 100, Wiz helps leaders consolidate their security stack, automate hardening, and scale proactive defense across complex multi-cloud environments. ...Read More

7AI, Inc.

7AI is the leader in agentic security, delivering the industry's first dynamic platform that harnesses the speed, swarming capabilities, and power of AI to give defenders the advantage over evolving threats. The platform deploys specialized AI agents that autonomously handle essential "non-human work" such as alert triage, threat investigation, and incident response. The company's Dynamic Reasoning technology enables AI agents to adapt their decision-making process, eliminating false positives and providing actionable conclusions at machine speed. ...Read More

Abnormal AI

Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated attacks that target human vulnerability. Deploy in minutes with an API integration for Microsoft 365 or Google Workspace. Abnormal is trusted by more than 3,200 organizations, including over 20% of the Fortune 500. ...Read More

Airia

Founded in 2024, Airia delivers the industry's first unified enterprise AI security, orchestration, and governance platform, purpose-built to accelerate AI adoption. Airia guides the world's most innovative enterprises through their AI transformation journey by addressing the critical gap between rapid innovation and governance requirements—empowering teams to build and deploy AI agents fast while maintaining enterprise-grade control. Learn more at airia.com. ...Read More

BeyondTrust

BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™ with an identity-centric approach. We are leading the charge in transforming identity security and are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners. Learn more at www.beyondtrust.com. ...Read More

Bitsight

Bitsight is the global leader in cyber risk intelligence, leveraging advanced AI to empower organizations with precise insights derived from the industry’s most extensive external cybersecurity dataset. With more than 3,500 customers and over 68,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure, enabling teams to rapidly identify vulnerabilities, detect emerging threats, prioritize remediation, and mitigate risks across their extended attack surface. ...Read More

Booz Allen

Booz Allen is the advanced technology company delivering outcomes with speed for America's most critical defense, civil, and national security priorities. We build technology solutions using AI, cyber, and other cutting-edge technologies to advance and protect the nation and its citizens. By focusing on outcomes, we enable our people, customers, and their missions to succeed, accelerating the nation to realize our purpose: Empower People to Change the World®. ...Read More

Capital One Software

Capital One Software, the enterprise B2B software business of Capital One, enables organizations to scale their data management capabilities and better harness the power of AI. Backed by 25 years of data innovation, Capital One Software solutions are helping customers overcome key data management challenges in the cloud, including cost performance, infrastructure management, and data security. Capital One Software is based in McLean, Virginia, at Capital One's headquarters. To learn more, go to: https://www.capitalone.com/software/about/ ...Read More

Check Point

Check Point Software Technologies Ltd. is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers. ...Read More

Claroty

Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threat detection. Backed by award-winning threat research and a breadth of technology alliances, Claroty enables organizations to effectively reduce CPS risk, with the fastest time-to-value and lower total cost of ownership. ...Read More

Commvault

Commvault (NASDAQ: CVLT) is a leader in unified resilience at enterprise scale. In a constantly evolving threat landscape, Commvault keeps customers ready by unifying data security, identity resilience, and cyber recovery, on one cloud-native, AI-enabled platform. Customers trust Commvault to conduct the fastest, most complete recoveries – not just their data, but their entire business. Purpose-built for the agentic enterprise, Commvault also enables organizations to safely embrace AI while protecting against AI-driven threats. ...Read More

Darktrace

Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013 in Cambridge, UK, Darktrace provides the essential cybersecurity platform to protect organizations from unknown threats using AI that learns from each business in real-time. Darktrace’s platform and services are supported by 2,400+ employees who protect nearly 10,000 customers globally. To learn more, visit http://www.darktrace.com. ...Read More

DataBee, a Comcast Company

DataBee, a cyber risk data fabric, helps security and risk leaders transform fragmented security and business data into defensible, decision-ready outcomes. DataBee’s AI-powered modular design compliments your existing security stack, ingesting from 350+ and custom connectors and offering explainable AI guidance that gives every team a shared, defensible view of cyber risk. From continuous visibility into control status to accelerated remediation and executive-ready metrics, DataBee equips every team with shared clarity and a defensible view of cyber risk they need to manage with confidence. ...Read More

Delinea

With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams’ adoption by deploying in weeks, not months, and makes them more productive by requiring 90% fewer resources to manage than the nearest competitor. With a guaranteed 99.99% uptime, the Delinea Platform is the most reliable identity security solution available. ...Read More

depthfirst

depthfirst provides autonomous security from design to production. Its AI-native AppSec platform understands your code, infrastructure, and business logic to find complex issues that traditional tools miss, like authorization bugs and business logic flaws. With this context, it can eliminate false positives by verifying exploitability along complete attack paths, and it can give developers precise, actionable fixes in their workflow and autonomous remediations. depthfirst secures codebases, PRs, supply chain, infrastructure, and performs dynamic testing. ...Read More

DigiCert

DigiCert is a leading global provider of digital trust, enabling individuals and businesses to engage online with the confidence that their footprint in the digital world is secure.DigiCert® ONE, the platform for digital trust, provides organizations with centralized visibility and control over a broad range of trust needs, securing websites, enterprise access and communication, software, identity, content and devices.DigiCert pairs its award-winning software with industry leadership in standards, support, operations, and is the digital trust provider of choice for companies around the world. ...Read More

Expel

Expel is human-led, AI-accelerated security. Our MDR solutions use human expertise and AI to drive out threats, minimize risk, and build lasting security resilience. We work with the tools you already have, covering the attack surfaces that matter most: cloud, identity, email, SIEM, SaaS, and on-prem environments, providing full transparency into everything we see and do. No black boxes. No rip-and-replace. Just clear decisions and faster action. For more information, visit our website, check out our blog, or follow us on LinkedIn. ...Read More

Fasoo AI

Fasoo AI delivers enterprise-grade AI, Data, and Security products and services that help organizations pivot AI strategies with LLM, data, and governance infrastructure to ensure secure information management, compliance, and productivity. Fasoo AI supports AX transformation by providing forward-looking solutions and services that empower organizations to build, orchestrate, and sustain AI-ready data and security. Fasoo AI’s continuous focus on customer innovation and creativity provides market-leading solutions to the challenges faced by organizations of all sizes and industries. ...Read More

GitLab

GitLab is the intelligent orchestration platform for DevSecOps. GitLab enables organizations to increase developer productivity, improve operational efficiency, reduce security and compliance risk, and accelerate digital transformation. More than 50 million registered users and more than 50% of the Fortune 100* trust GitLab to ship better, more secure software faster. ...Read More

HCL Software

HCLSoftware fuels the Digital+ economy by developing, marketing, selling and supporting solutions in four key areas: digital transformation; data, analytics and insights; AI and intelligent automation and enterprise security. HCLSoftware drives customer success through relentless product innovation for more than 20,000 organizations, including a majority of the Fortune 100 and almost half of the Fortune 500. ...Read More

Horizon3.ai

Horizon3.ai’s NodeZero® platform is trusted by over one-third of the Fortune 20 companies, the world’s largest banks, top global pharmaceutical and semiconductor manufacturers, critical infrastructure operators around the globe, and the US Defense Industrial Base to proactively find, fix, and verify exploitable vulnerabilities to continuously fortify cyber defenses and improve cyber resilience. The fastest-growing cybersecurity company in America (Inc. 5000, Deloitte Fast 500), Horizon3.ai was founded by US Special Operations veterans and industry experts and is headquartered in San Francisco. ...Read More

IBM

IBM's mission is to act as a catalyst for positive global impact through business ethics, environmental commitment, and responsible technology. With over 300,000 employees in 170+ countries, IBM offers tailored products, 660+ solutions, and 19 research facilities across 12 laboratories on 6 continents. The company provides technology and services, including consulting and software solutions, to help businesses design, build, and future-proof their operations. ...Read More

Island

‍Island is the ideal environment for enterprise work. By unifying modern work requirements into a single Enterprise Platform, Island enables organizations to see, control, and protect work activity while making work itself smooth and simple. Leading enterprises from across major industries are using Island to safely embrace AI, onboard contractors in minutes, enable BYOD, reduce VDI spend, quickly recover from disasters, facilitate M&A, and eliminate unnecessary infrastructure and related expenses. ...Read More

Lenovo

Lenovo is a US$50 billion Fortune Global 500 company serving customers in 180 markets around the world. Focused on a bold vision to deliver smarter technology for all, we are developing world-changing technologies that power (through devices and infrastructure) and empower (through solutions, services, and software) millions of customers every day and together create a more inclusive, trustworthy and sustainable digital society for everyone, everywhere. To find out more visit https://www.lenovo.com and read about the latest news via our StoryHub at http://storyhub.lenovo.com/. ...Read More

LogicGate

LogicGate is the leading AI GRC platform for the Enterprise, offering the flexibility, scalability, and intuitive automation that empowers risk leaders to be more effective. The Risk Cloud platform combines AI-driven workflows, real-time insights, and seamless integrations to deliver actionable intelligence. With 40+ purpose-built, no-code applications, it adapts to any environment and scales across the enterprise, helping risk teams quantify their impact, align with business priorities, and move beyond compliance toward sustainable growth and a predictive approach to risk and resilience. ...Read More

ManageEngine

ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and MSPs. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT. ...Read More

Menlo

With Menlo Security, you don’t have to settle, and you don’t have to replace the browser that your users, partners, and contractors are working with now. With Menlo, there’s no new software to deploy, no browser versions to manage, and no need to miss out on the latest integrations from leading vendors. All the performance, innovative security, and application access capabilities you need. That’s the Menlo Secure Enterprise Browser solution. ...Read More

Mimecast

Mimecast is a global cybersecurity and data governance leader redefining how organizations secure human risk. Its AI-powered human risk platform is purpose-built to protect organizations from the spectrum of cyber threats. By enabling decisive action and empowering businesses to protect their collaborative environments, their technology safeguards critical data and actively engages employees in reducing risk and enhancing productivity. From insider risk to external threats, 42,000 businesses worldwide get more with Mimecast. More visibility. More agility. More control. More security. ...Read More

MIND

MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management programs on autopilot to autonomously discover, detect and prevent sensitive leaks across GenAI and SaaS apps, Agentic AI, endpoints, on-prem file shares and emails. MIND reimagines data security to deliver both posture and prevention – protecting data at rest, in motion and in use. With the MIND AI multi-layer classification engine, real-time detection and automated prevention and remediation, MIND enables enterprises to build effective data security programs with minimal headcount. ...Read More

Netskope

Netskope is a leader in modern security, networking, and analytics. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity. ...Read More

Netwrix

Netwrix empowers security professionals to face digital threats with confidence by enabling them to identify and protect sensitive data as well as to detect, respond to, and recover from attacks. More than 13,500 organizations across 100+ countries rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity, and infrastructure. By reducing the cybersecurity burden with Netwrix, organizations concentrate on advancing their cause while reducing cyber risk. For more information, visit www.netwrix.com ...Read More

OneTrust

OneTrust, the AI-Ready Governance Platform™, enables innovation through the responsible use of data and AI. Trusted by over half of the Fortune 500, we help businesses govern well and move fast, turning responsible data use into a catalyst for growth. To learn more, follow OneTrust on LinkedIn or visit www.onetrust.com.  ...Read More

OpenText

OpenText Cybersecurity empowers global organizations to protect what matters most—data, identities, applications, and infrastructure. Built on a foundation of AI-enhanced detection and response, our solutions align to Zero Trust principles, enabling organizations to reduce risk, accelerate compliance, and maintain resilience in a rapidly evolving threat landscape. From identity governance and privileged access management to cloud-native application security and forensics, we unify security operations across hybrid environments. ...Read More

Oracle, Inc.

Oracle is a global leader in cloud infrastructure, data management, and AI-driven analytics. Our solutions help organizations harness the full power of artificial intelligence, secure and manage data in the cloud, and ensure data security at scale. Discover how Oracle empowers smarter decisions and drives business transformation at www.oracle.com. ...Read More

Palo Alto Networks

As the global cybersecurity leader, Palo Alto Networks (NASDAQ: PANW) is dedicated to protecting our digital way of life via continuous innovation. Trusted by organizations worldwide, we provide comprehensive AI-powered security solutions across network, cloud, security operations and AI, enhanced by the expertise and threat intelligence of Unit 42. Our focus on platformization allows enterprises to streamline security at scale, ensuring protection fuels innovation. Discover more at www.paloaltonetworks.com. ...Read More

Pentera

Pentera is the market leader in AI-powered Security Validation, equipping enterprises with the platform to proactively test all their cybersecurity controls against the latest cyber attacks. Pentera identifies true risk across the entire attack surface, and automatically orchestrates remediation workflows to effectively reduce exposure. The company’s security validation capabilities are essential for Continuous Threat Exposure Management (CTEM) operations. Thousands of security professionals around the world trust Pentera to close security gaps before threat actors can exploit them. ...Read More

Picus Security

Picus Security, the leading security validation company, reveals true cyber risk by validating and prioritizing exposures across siloed findings. Offering Adversarial Exposure Validation with Breach and Attack Simulation and Automated Penetration Testing, Picus enables teams to pinpoint critical gaps, deliver high-impact fixes, and stop more threats with less effort. ...Read More

Proofpoint

Proofpoint, Inc. is a global leader in human- and agent-centric cybersecurity, securing how people, data and AI agents connect across email, cloud and collaboration tools. Proofpoint is a trusted partner to over 80 of the Fortune 100, over 10,000 large enterprises, and millions of smaller organizations in stopping threats, preventing data loss, and building resilience across people and AI workflows. Proofpoint’s collaboration and data security platform helps organizations of all sizes protect and empower their people while embracing AI securely and confidently. ...Read More

Rapid7

Rapid7 is a global leader in AI-powered managed cybersecurity operations, trusted to advance organizations’ cyber resilience. Open and extensible, the Rapid7 Command Platform integrates security data, enriching it with AI, threat intelligence, and 25 years of expertise and innovation to reduce risk and disrupt attackers. As a recognized leader in preemptive managed detection and response (MDR), Rapid7 unifies exposure and detection to transform the cybersecurity operations of more than 11,500 customers worldwide. ...Read More

Recorded Future

Recorded Future is the world’s largest threat intelligence company. Its Intelligence Operations Platform combines AI analytics and threat data to deliver real-time visibility into adversaries, infrastructure, and targets. With insights from the Intelligence Graph®, cyber teams can act with confidence and stay ahead of threats. ...Read More

SecurityScorecard

SecurityScorecard delivers the world's most powerful, AI-driven platform that identifies cyber risk across all attack surfaces. Powered by the largest proprietary risk & threat intelligence dataset on the planet, SecurityScorecard takes customers from risk identification to resolution. With the world's most trusted security ratings and AI-powered analytics, SecurityScorecard is trusted by 70,000 global enterprises and 70% of the Fortune 1000. Visit securityscorecard.com for details. ...Read More

SentinelOne

SentinelOne is the world’s most advanced, autonomous AI-powered cybersecurity platform. Built on the first unified Data Lake, SentinelOne empowers the world to run securely by creating intelligent, data-driven systems that think for themselves, stay ahead of complexity and risk, and evolve on their own. Leading enterprises around the world trust SentinelOne. ...Read More

Sentra

Sentra is the global leader in cloud-native data security for the AI era. Sentra delivers unmatched AI‑data governance and continuous compliance at speed and scale previously unimagined. Sentra ensures data is secured no matter where it travels by automatically detecting privacy and security risks, misconfigurations, over-permissions, unauthorized access, data duplication and other security issues. ...Read More

Snyk

Snyk’s AI-native and agentic platform helps organizations secure and govern development to unleash productivity, reduce business risk, and accelerate software delivery for the age of AI. A pioneer of security for agile development and DevSecOps, Snyk continues to secure the future of development. The industry's only end-to-end platform that delivers the AI Security Fabric through three unified vectors: AI-accelerated DevSecOps, Securing AI-driven development, Securing AI-native software. For more information, visit https://snyk.io. ...Read More

Tanium Inc.

Tanium is the Autonomous IT company. Driven by AI and real-time endpoint intelligence, Tanium Autonomous IT empowers IT and security teams to make their organizations unstoppable. The company is recognized as a Leader in the inaugural 2026 Gartner® Magic Quadrant™ for Endpoint Management Tools. Many of the world’s leading organizations trust Tanium’s single, unified platform for endpoint management and security to innovate faster, stay resilient and move business forward with confidence, at scale. To learn how Tanium delivers Autonomous IT for unstoppable business – visit www.tanium.com. ...Read More

Twine Security

Twine builds AI Digital Employees for cybersecurity teams. Our first AI digital employee, Alex, learns, understands and takes away the burden of identity and access management (IAM) tasks - proactively completing your organization’s cyber objectives. Our customers use Alex for varied use cases - from autonomously remediating issues like finding missing account owners, to helping onboard applications to IGA platforms, and much more. Goodbye simple, legacy automations. Hello effortless, self healing, start to finish execution by proactive AI Digital Employees. Come check us out! ...Read More

Veza

Veza from ServiceNow is the enterprise agent identity control plane, enabling organizations to achieve least privilege by answering cybersecurity's most pressing question: "who can take what action on what data?" Veza goes beyond traditional IAM and IGA to visualize, monitor, and control entitlements across SaaS, data, and cloud. This industry-first approach addresses privileged access monitoring, non-human identity (NHI) security, ISPM, next-gen IGA, and Agentic AI identity security. Global enterprises like Blackstone, Capital One, and Snowflake trust Veza to enforce least privilege at scale. ...Read More

Zscaler

Zscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange™ platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 160 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform. ...Read More

Act Security

When AI can find and exploit every exposure faster than any team can remediate it, the only real answer is to stop chasing findings and start eliminating the lifeline of an exploit - access itself. Act Security takes a foundational approach to cloud security, eliminating unnecessary access at the infrastructure layer to make the cloud structurally secure before attacks unfold. Built by operators from Medigate (acquired by Claroty)Act's founders are repeat security builders with years inside critical infrastructure and healthcare, fields where access decisions carry real-world stakes. ...Read More

Airlock Digital

Airlock Digital Application Control is an enterprise-scalable “Deny by Default” solution designed to provide organizations with precision execution control, reducing the risk of malware, ransomware, and unauthorized applications across IT and OT environments. Built by cybersecurity professionals, Airlock Digital is engineered for efficiency, scalability, and ease of management, ensuring organizations can enforce strict security policies without operational friction. ...Read More

AppOmni

AppOmni prevents SaaS data breaches by delivering end-to-end SaaS security. Our platform gives security teams clear visibility into posture, access, third-party connections, AI-related activity, and with built-in discovery to identify unsanctioned SaaS and Shadow AI tools. Backed by continuous monitoring and real-time threat detection, AppOmni helps enterprises identify and resolve risks early, keeping their SaaS applications secure. ...Read More

Aravo

Aravo delivers advanced third-party risk management, purpose-built for Global 2000 enterprises. Powered by intelligent automation and integrated AI, our Intelligence First® Platform streamlines assessments, calculations, and workflows to help organizations thrive in a dynamic world with rising security, regulatory, and reputational risks. Trusted by over 5 million third-party users and 5,000 corporate users in 170+ countries, Aravo empowers enterprises to mitigate risk, strengthen resilience, and protect brand integrity across their extended enterprise. ...Read More

Archer

For over two decades, Archer has been at the forefront of risk and compliance innovation, offering organizations the tools and insights needed to build resilient, high-performing businesses. Archer’s advanced solutions leverage artificial intelligence, risk quantification, and integrated approaches, enabling enterprises to confidently address emerging risks while driving strategic value. To learn more about Archer, visit www.archerirm.com/archer-evolv. ...Read More

AvePoint

AvePoint is the global leader in data security, governance, & resilience, ensuring a robust data foundation & enabling organizations everywhere to collaborate with confidence. Over 25,000 customers worldwide rely on the AvePoint Confidence Platform to prepare, secure, and optimize their critical data across Microsoft, Google, Salesforce, and other collaboration environments. AvePoint's global channel partner program includes approximately 5,000 managed service providers, value-added resellers, and systems integrators, with our solutions available in more than 100 cloud marketplaces. ...Read More

Bitwarden

Bitwarden empowers enterprises, developers, and individuals to securely manage identities and share sensitive information online with trusted security solutions for passwords, secrets, and passkey management.

BlackCloak, Inc.

BlackCloak protects the personal devices, home networks and digital footprints of executives and key personnel to prevent security vulnerabilities exposing the organization to risk. Used by Fortune 500 companies, the BlackCloak Concierge Cybersecurity & Privacy™ Platform is a holistic solution including mobile and desktop apps and concierge support. Every solution is meticulously tailored and implemented with discretion, delivering high levels of personalized service and protection, without burdening internal resources. ...Read More

Brinqa, Inc.

The Brinqa platform unifies and contextualizes data with business-tailored risk scoring, leveraging AI and automation, so exposure management teams can prioritize and deliver faster remediation at scale. Brinqa has the industry’s largest portfolio of IT, business, and security data integrations and can scale to accommodate millions of inputs and findings. ...Read More

Checkmarx

Checkmarx is the leader in agentic application security, delivering enterprise-grade protection while helping organizations lower engineering costs and accelerate development velocity. The Checkmarx One platform scans trillions of lines of code each year, enabling companies to cut vulnerability density by more than half. Autonomous security agents continuously detect and counter AI-driven threats across the software development lifecycle, delivering prevention-first protection for legacy, modern, and AI-generated code at enterprise scale. ...Read More

Cohesity

Cohesity protects, secures, and provides insights into the world’s data. As the leader in AI-powered data security, Cohesity helps organizations strengthen resilience, accelerate recovery, and reduce IT costs. With Zero Trust security and advanced AI/ML, Cohesity Data Cloud is trusted by customers in more than 140 countries, including 70% of the Global 500. Cohesity is also backed by industry leaders such as NVIDIA, Amazon, Google, IBM, Cisco, and HPE. Cohesity is certified as a Great Place to Work in multiple countries. Follow Cohesity on LinkedIn and visit www.cohesity.com to learn more. ...Read More

Concentric AI

Concentric AI is intelligent data security made easy. Our platform discovers, classifies, and protects data across cloud and on-premises environments. With AI-driven insights and co-managed services, we help businesses reduce risk, streamline compliance, and eliminate duplicate data records—transforming data from a liability into a well-managed asset. ...Read More

CoreStack, Inc.

CoreStack is an AI-powered NextGen Cloud Governance platform that enables enterprises to embrace cloud with confidence, rapidly achieving continuous and autonomous cloud governance at scale. CoreStack helps 750+ global enterprises govern more than $2B in annual cloud consumption. The company is a Microsoft Azure (Legacy) Gold Partner, Amazon AWS Technology Partner with Cloud Operations Competency, Oracle Cloud Build Partner, and Google Cloud Build Partner. ...Read More

Cranium

As the foremost enterprise AI security and trust software firm, Cranium empowers organizations to ensure the security and compliance of their AI and GenAI systems. The Cranium Enterprise software platform offers comprehensive solutions for driving visibility, security, and governance across all AI and GenAI environments. Secure your enterprise’s AI today with Cranium.AI. ...Read More

Crogl

Crogl is trusted AI for the enterprise SOC—secure, schema-free, and ready for sensitive environments, from regulated finance to air-gapped deployments. Its autonomous Knowledge Engine learns your workflows and investigates alerts at scale, directly where data resides—no normalization or movement required. Crogl augments analysts by automating repetitive triage while delivering auditable decisions aligned to your processes. Every action is explainable, helping analysts act faster and focus on what matters most. The result: measurable reductions in MTTI and MTTR at enterprise scale. ...Read More

Cymulate

Cymulate is a leader in Autonomous Threat Validation and Cyber Defense Engineering, transforming how organizations measure and improve security effectiveness. Powered by agentic AI and an extensive threat library, the platform simulates real-world, environment-specific attacks across the full attack lifecycle. By turning continuous validation into prioritized action, organizations achieve over 90% threat prevention and improve detection by more than 50%. Over 1,000 organizations worldwide trust Cymulate to strengthen defenses and reduce cyber risk. Learn more at www.cymulate.com ...Read More

Daylight Security

Daylight Security unifies an AI-native platform with top security experts from IR and threat hunting backgrounds, to offer Managed Agentic Security Services (MASS) like 24/7 MDR, threat hunting, managed email security phishing and more. Our platform runs the full cycle from detection to response with full identity and business context across systems. Our experts validate decisions and feed insights back into the platform, so it continuously learns your environment. We help SecOps teams move from firefighting mode to strategic work. Trusted by Sixt, Qualtrics, Lovable, and many more. ...Read More

Doppel

Doppel is the leading AI-native Social Engineering Defense platform, purpose-built with agentic AI to protect executives, employees, customers, and brands. We go beyond traditional risk protection by proactively detecting, correlating, and dismantling multi-channel impersonation infrastructure across the open web, dark web, messaging and social surfaces. Doppel then leverages this threat intelligence to meaningfully reduce human risk by recommending, creating, and carrying out security training & phishing simulations based on actual threats and attacker TTPs. ...Read More

Dragos

Dragos provides the most effective OT cybersecurity technology for industrial and critical infrastructure to deliver on our global mission: to safeguard civilisation. With real-world experience handling landmark OT attacks, Dragos understands the complexity of industrial operations. The Dragos Platform provides advanced OT network visibility and monitoring of OT environments for asset identification, vulnerability management, and threat detection with continuous insights generated by the industry’s most experienced OT threat intelligence and services team. ...Read More

Dropzone AI

Dropzone AI delivers autonomous AI SOC analysts that mimic elite human reasoning to investigate and resolve security alerts in minutes. Our platform integrates with your existing security stack to eliminate alert backlogs, reduce noise, and accelerate threat response without adding headcount. With Dropzone AI handling routine triage and investigations, security teams focus on complex threats and proactive defense, gaining scalable, always-on protection from day one. ...Read More

DTEX Systems

As the trusted leader of insider risk management, DTEX transforms enterprise security by displacing reactive tools with a proactive solution that stops insider risks from becoming data breaches. DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforce. Backed by behavioral science, powered by AI, and used by governments and organizations around the world, DTEX is the trusted authority for protecting data and people at scale with privacy by design. ...Read More

Elastic

More than 50% of the Fortune 500 uses Elastic to solve smarter and innovate faster with the power of Search AI. Elastic, the Search AI Company, integrates its expertise in search technology with artificial intelligence to help everyone transform the exponential growth of underutilized, unstructured data into answers, actions, and outcomes. Elastic's Search AI Platform is the foundation for Elastic’s two out-of-the-box solutions, Elastic Observability and Elastic Security, and is the platform of choice for developers seeking to build next-generation AI applications and services. ...Read More

Elisity

Elisity redefines network segmentation to accelerate Zero Trust maturity, reduce risk, and simplify enterprise networks. Deployed in days with no downtime, it discovers all devices and builds the Elisity IdentityGraph™ to automate classification and apply identity-based microsegmentation policies. Managed in the cloud and enforced via existing infrastructure, policies are applied in real time—even to ephemeral IT/IoT/OT devices. Founded in 2019, Elisity serves a global base, including Fortune 500 companies. ...Read More

Exaforce

At Exaforce, we are on a mission to 10x the productivity and efficacy of security and operations (SOC) teams using our transformative multi-model AI engine. Our Agentic SOC Platform combines AI agents (“Exabots”) with advanced data exploration to deliver real-time insights, proactive detection and response, in-depth investigations, and automated workflows. Backed by Khosla Ventures, Mayfield, and others, Exaforce helps SOC teams respond to threats and breaches faster, with higher precision, greater consistency, and at lower total costs—redefining how SOC teams function. ...Read More

GTB Technologies

GTB Technologies®, pioneers of DLP that Works™, unifies Data Security, DLP, DSPM, and Insider Threat protection. As AI adoption accelerates, GTB goes beyond prompt inspection to address both what goes into AI and what comes out. By understanding the actual content and meaning of data, GTB delivers precise detection, real-time prevention, and true compliance. Others inspect prompts—GTB controls risk, securing what matters across cloud, endpoints, network, and AI environments. ...Read More

Guardare

Guardare is an AI-powered Unified Exposure Management platform that helps organizations proactively identify, prioritize, and remediate cyber risk across their entire technology stack. By integrating with 200+ security and IT tools, Guardare surfaces misconfigurations, control gaps, and underutilized capabilities, delivering actionable insights through intelligent automation and agentic workflows. The result: reduced risk, improved security ROI, and continuous, real-time visibility. ...Read More

HackerOne

HackerOne is a global leader in Continuous Threat Exposure Management (CTEM). Our platform unites agentic AI solutions with the ingenuity of the largest community of security researchers to continuously discover, validate, prioritize, and remediate exposures across code, cloud, and AI systems. ...Read More

Hoxhunt

Hoxhunt is the Human Risk Management Platform that lets security teams and employees join forces to behave securely and fight social engineering attacks. Combining AI with behavioral science, Hoxhunt’s adaptive phishing training meets people where they’re at with personalized training for unparalleled reach. Hoxhunt transforms security culture with measurable behavior change beyond social engineering, too. Hoxhunt gives security teams real-time visibility into threats, with AI that does the heavy lifting on threat analysis to augment incident response and reduce risk. ...Read More

Huntress

Huntress is a global cybersecurity company on a mission to make enterprise-grade products accessible to ALL businesses. Fully owned and purpose-built from the ground up, Huntress technology is specifically designed to continuously address the unique needs of security and IT teams of all sizes, protecting endpoints, identities, data, and employees, for trusted outcomes and peace of mind. ...Read More

Illumio

Illumio is the leader in ransomware and breach containment, redefining how organizations contain cyberattacks and enable operational resilience. Powered by an AI security graph, our breach containment platform identifies and contains threats across hybrid multi-cloud environments — stopping the spread of attacks before they become disasters. Recognized as a Leader in the Forrester Wave™ for Microsegmentation, Illumio enables Zero Trust, strengthening cyber resilience for the infrastructure, systems, and organizations that keep the world running. ...Read More

imper.ai

imper.ai stops workforce impersonation and AI-driven social engineering attempts that bypass authentication controls. Workforce Identity Verification secures high-risk identity lifecycle moments, from hiring to account recovery and privileged access, by verifying both the environment and the operator before trust is granted. Built specifically for workforce identity risk and founded by cyber intelligence experts, imper.ai embeds real-time impersonation detection directly into identity, service desk, and hiring workflows. Learn more at www.imper.ai ...Read More

Infoblox

Infoblox unites networking, security and cloud to form a platform for operations that’s as resilient as it is agile. Trusted by 13,000+ customers, we seamlessly integrate, secure and automate critical network services so businesses can move fast without compromise. Our DDI (DNS, DHCP and IPAM) solutions deliver unmatched performance and control across hybrid, multi-cloud environments, while our security solutions stop threats at the DNS layer, providing protection everywhere. The result? A smarter, more secure platform—built for the way organizations work today and ready for what’s next. ...Read More

Intezer

JFrog

JFrog Ltd. (Nasdaq: FROG) provides a unified DevOps, DevSecOps, AI/ML and DevGovOps platform to deliver software without friction from developer to production. Trusted by millions of users and 6500+ customers worldwide, JFrog’s Software Supply Chain Platform is a single system of record enabling fast, secure, traceable, tamper-proof build, management and distribution with integrated security for threat detection and remediation. Learn more at www.jfrog.com or follow us on X @JFrog. ...Read More

Keyfactor

Keyfactor brings digital trust to the hyper-connected world by empowering organizations to build and maintain secure, trusted connections across every device, workload, and machine. By simplifying PKI, automating certificate lifecycle management, and enabling crypto-agility, Keyfactor helps organizations move fast to establish digital trust at scale. With Keyfactor, businesses can tackle today’s challenges, like growing certificate volumes, manual processes, and new standards and regulations, while laying the groundwork for a successful transition to post-quantum cryptography. ...Read More

Keysight Technologies

Keysight delivers advanced solutions to test network performance and security, while providing dynamic network intelligence and visibility into traffic, applications, and users. We help accelerate innovation to connect and secure the world, bringing tomorrow's technology products to market faster across the development lifecycle. Keysight's broad portfolio of network test products and solutions provide performance optimization, traffic generation, workload emulation, monitoring, security, and visibility for manufacturers, enterprises, service / cloud providers, and AI data centers. ...Read More

Kroll

As the leader in cyber and data resilience, we merge our elite security and data risk expertise with frontline intelligence from thousands of IR cases handled per year, regulatory compliance, financial crime and due diligence engagements to make our clients more resilient. We combine this with over 650+ experts with background experience in law enforcement, industry and regulatory agencies to help you establish efficient, sustainable solutions to complex and persistent cyber and data resilience issues. ...Read More

LayerX Security

LayerX agentless AI & Browser Security Platform protects organizations against AI, SaaS, web & data leakage risks across any browser, application, device, and identity, with no impact on user experience. Enterprises use LayerX to prevent AI and browsing risks as: shadows AI and SaaS discovery, data leakage prevention across GenAI, web and SaaS channels, protection against malicious browser extensions, protection against zero-hour web attacks, identity governance over work and personal identities, and more. ...Read More

NinjaOne

NinjaOne unifies IT to simplify work for nearly 40,000 customers in 140+ countries. ​The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience at work. ​NinjaOne is obsessed with customer success and has retained a 98% customer satisfaction score for more than 5 years. Try NinjaOne for free at https://www.ninjaone.com/freetrialform/. ...Read More

Noma Security

Noma is the leading AI security platform for the enterprise, purpose-built to secure every type of AI and agent across the organization, from homegrown agents and apps to SaaS platforms like Microsoft Copilot Studio and Salesforce AgentForce. Noma delivers full discovery and governance, AI red teaming, and runtime protection against prompt injection, data exfiltration, and policy violations. AWS chose Noma for their Security Hub, with Microsoft and Databricks as strategic partners. Trusted by Fortune 500 companies and backed by $130M+ in funding, Noma is the established leader in AI security. ...Read More

Obsidian Security

Obsidian Security is the leading SaaS security platform, trusted by enterprises like Snowflake, T-Mobile, and Pure Storage. We protect 250+ global organizations with data centers across North America, EMEA, and APAC. Backed by Greylock, Norwest, and IVP, we secure business-critical apps like Microsoft 365 and Salesforce—reducing risk, detecting threats, and preventing breaches. Obsidian protects SaaS in the era of AI by detecting human and non-human identity compromise and managing integration risk. ...Read More

One Identity

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. ...Read More

Pathlock

Unlike traditional risk, audit, and security systems, Pathlock continuously monitors transactions across all enterprise applications where sensitive activities and data are concentrated. It surfaces actual violations, not theoretical possibilities. With Pathlock as the hub, all lines of defense work together to make informed decisions. Founded as Greenlight Technologies, we became the only solution endorsed by SAP that extends SAP Access Control to cloud and non-SAP systems. Today, we are the leader in application security and controls automation, serving customers worldwide. ...Read More

Persona

Persona helps leading organizations strengthen workforce security by verifying employee identities across the entire life cycle — from onboarding and password resets to account recovery. Our workforce identity verification (IDV) solution detects AI-driven impersonation, deepfakes, and social engineering attempts using signals such as selfie-to-ID matching, liveness detection, and behavioral analysis. With seamless integrations into IAM platforms like Okta and Cisco Duo, Persona delivers high-assurance identity verification without forcing organizations to reinvent access control systems. ...Read More

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom. We let enterprises combine our best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between. This is all made possible using our simple drag-and-drop canvas. That’s why more than half of the Fortune 100 choose Ping Identity to protect digital interactions from their users while making experiences frictionless. ...Read More

PKWARE

PKWARE discovers and protects sensitive data across endpoints, servers (including OneDrive and SharePoint), the cloud, and mainframes. With nearly 40 years of data protection expertise, PKWARE is trusted by over 1,200 customers, including 21 of the top 25 banks and financial institutions, to automate compliance, minimize risk, and safeguard data before breaches occur. ...Read More

Prophet Security

Prophet Security offers an Agentic AI SOC platform that fundamentally reimagines security operations. Prophet AI pushes SecOps productivity to a whole new level, allowing teams to reduce risks by autonomously investigating and responding to every alert or security event. Prophet AI eliminates the manual, repetitive tasks that hinder security operations, freeing up security analysts to focus on addressing actual threats and driving better security outcomes. ...Read More

RegScale

RegScale’s Continuous Controls Monitoring (CCM) platform streamlines GRC by bridging security, risk, and compliance with AI-driven automation. The platform reduces costs, accelerates certifications, and integrates compliance into DevSecOps. Organizations using RegScale achieve up to 90% faster certifications and 60% less audit prep effort, enhancing risk management and improving ROI. Recognized as the Best Compliance Solution by SC Awards, RegScale leads in transforming GRC efficiency. For more information, visit www.regscale.com. ...Read More

Relyance AI

Relyance AI is the trusted leader in data privacy, security, and AI governance solutions. Empowering organizations worldwide, our cutting-edge platform ensures compliance with global regulations while providing unparalleled visibility into data flows and processes. With real-time monitoring, automated workflows, and advanced analytics, Relyance AI enables businesses to seamlessly manage risk and build customer trust. From startups to enterprises, we help organizations turn privacy challenges into opportunities for innovation and growth. ...Read More

Rubrik

Rubrik (RBRK), the Security and AI Operations Company, leads at the intersection of data protection, cyber resilience, and enterprise AI acceleration. Rubrik Security Cloud delivers complete cyber resilience by securing, monitoring, and recovering data, identities, and workloads across clouds. Rubrik Agent Cloud accelerates trusted AI agent deployments at scale by monitoring and auditing agentic actions, enforcing real-time guardrails, fine-tuning for accuracy and undoing agentic mistakes. For more information, please visit www.rubrik.com. ...Read More

SafeBreach

SafeBreach is the leader in enterprise-grade exposure validation, providing the world’s largest brands with safe and scalable capabilities to understand, measure and remediate threat exposure and associated cyber risk. The award-winning SafeBreach exposure validation platform combines pioneering breach and attack simulation and innovative attack path validation capabilities to help enterprise security teams measure and address security gaps at the perimeter and beyond. To learn more about how SafeBreach helps enterprises with end-to-end exposure visibility, visit www.safebreach.com. ...Read More

SailPoint Technologies

SailPoint equips the modern enterprise to seamlessly manage and secure access to applications and data through the lens of identity – at speed and scale. SailPoint delivers a unified, intelligent, extensible platform built to defend against today’s dynamic, identity-centric cyber threats while enhancing productivity and efficiency.  ...Read More

SALT SECURITY

Salt Security protects the APIs powering today’s digital businesses. It delivers the industry’s fastest API discovery, uncovering shadow, zombie, and unknown APIs before attackers do. Its posture governance engine and centralized Policy Hub automate security checks and enforce secure API development at scale. With built-in and customizable policies, Salt simplifies compliance and reduces API risk. Using AI-driven threat detection, Salt helps leading organizations quickly close gaps and stay ahead of sophisticated API attacks. ...Read More

Sectigo

Sectigo is the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), with automated solutions and digital certificates that secure every human and machine identity for the world’s largest brands. Its automated, cloud-native, universal CLM platform issues and manages digital certificates provided by all trusted certificate authorities (CAs) to simplify and improve security protocols across the enterprise. Sectigo is one of the longest-standing and largest CAs with more than 700,000 customers and two decades of delivering unparalleled digital trust. ...Read More

Security Risk Advisors

Security Risk Advisors (SRA) provides specialized security services including Penetration Testing, Purple Teams, Cloud Security, Resilience, Cyber Physical Systems Security, Engineering, & 24x7x365 Cybersecurity Operations. SRA’s mission is to “Level Up” every day to protect our clients & their customers. We deliver security services to Fortune & Global 1000 companies, innovate technology startups, & mission-oriented non-profits. Our approach emphasizes knowledge transfer, collaboration & strengthening security processes. SRA is a global company operating out of the USA, Ireland, & Australia. ...Read More

Semgrep

Semgrep is the leader in code security for builders. Teams catch, flag, and fix real issues before they ship, powered by security that learns as you build. Semgrep delivers prevention at the source, is built for builders and trusted by security, gets smarter as you build, and makes zero false positives a reality. Semgrep is backed by Menlo Ventures, Felicis Ventures, Lightspeed Venture Partners, Redpoint Ventures, and Sequoia Capital. It is recognized by Gartner in Application Security Testing and trusted by leading organizations, including Snowflake, Dropbox, and Figma. ...Read More

Semperis, Inc.

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing Active Directory, Semperis’ patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. ...Read More

Simeio

Simeio cuts through the complexity of identity and access management. Our specialized platform and expert services deliver secure digital access without the endless complications. When you need reliable IAM solutions that actually work, you get access right now.

Specter Ops

SpecterOps is a leader in Identity risk reduction. Possessing deep knowledge of adversary tradecraft, the company enables organisations to detect and remove critical attack paths before attackers can act – a practice called Attack Path Management. SpecterOps maintains widely used open-source security toolsets including BloodHound, the company’s foundational tool that enables Attack Path Management in Active Directory & Entra ID. BloodHound Enterprise is the company's managed SaaS, allowing for attack path prioritization, remediation guidance and reporting to show improvement over time. ...Read More

Sublime Security

Sublime Security is the adaptive, AI-powered cloud email security platform that combines best-in-class effectiveness with unprecedented visibility and control. The open platform allows security teams to have transparency and flexibility in their email environment to spend less time on email-originated incidents. Advanced teams can customize detections, threat hunt, extend Sublime into their SIEM or SOAR, and collaborate with other teams. Deploy Sublime Core for free or Sublime Enterprise at https://sublime.security/start ...Read More

Synack

Synack is the leader in human-led and AI-powered Penetration Testing as a Service (PTaaS), transforming offensive security to help organizations proactively reduce risk, stay compliant and defend against evolving cyber threats. We are committed to making the world more secure by harnessing agentic AI innovations and a talented, vetted community of security researchers to deliver continuous penetration testing and autonomous vulnerability management. Synack has uncovered more than 83,500 exploitable vulnerabilities to date. For more information, please visit www.synack.com. ...Read More

Sysdig

Sysdig helps security and development teams prevent, detect, and respond to threats instantly. Founded by Falco and Wireshark creators and built on agentic AI, Sysdig delivers real-time defense grounded in the uncompromising truth of runtime. With streaming views of what’s running, Sysdig correlates signals across workloads, identities, and services to expose hidden attack paths and active risk, enabling teams to tailor defenses together. No guesswork. No black boxes. Just cloud security, the right way. ...Read More

Tines

Tines is an intelligent workflow platform that powers the world’s most important workflows. IT and security teams of all sizes, from Fortune 50 to startups, trust Tines for everything from phishing response, vulnerability and patch management, software lifecycle management, employee lifecycle management, and everything in between. Leaders across a wide array of industries –including Canva, Databricks, Elastic, Kayak, Intercom, and McKesson– use Tines AI-powered workflows to operate more effectively, mitigate risk, reduce tech debt, and do the work that matters most. ...Read More

Vanta

Vanta is the leading agentic trust platform that helps businesses earn and prove trust. Over 15,000 companies like Atlassian, Duolingo, Golden State Warriors, Icelandair, Ramp, and Synthesia rely on Vanta to earn and prove trust continuously. Founded in 2018, Vanta serves customers in 100 countries with offices in Dublin, New York, San Francisco, Sydney, and London. For more information, visit www.vanta.com. ...Read More

Vectra AI

Vectra AI is modern cyber-attack resilience for AI enterprises - empowering modern AI enterprises to continuously observe, understand, and act everywhere their modern network moves. The Vectra AI Platform empowers security teams with the observability, signal, and actions to proactively reduce exposure and preemptively stop modern AI‑powered attacks before impact. ...Read More

Vega Security Inc.

Vega delivers federated and AI-native search, detection, and investigation that strengthens coverage, speeds response, and gives SecOps unified access to all security data through its Security Analytics Mesh (SAM) platform. By analyzing data where it already lives, Vega eliminates blind spots, data silos, ingestion fees, migration headaches, and vendor lock-in. Security teams can finally enjoy a flexible, cost-efficient security architecture that gives them full visibility and AI-driven detection capabilities. ...Read More

Veracode

Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans and a proprietary AI-assisted remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. Thousands of the world’s leading development and security teams use Veracode every second of every day to get accurate, actionable visibility of exploitable risk, achieve real-time vulnerability remediation, and reduce their security debt at scale. ...Read More

Versa Networks

Versa, the global leader in unified networking and security, enables organizations to create self-protecting networks that radically simplify and automate their network and security infrastructure. Powered by AI, the VersaONE Universal SASE Platform delivers converged SSE, SD-WAN, and SD-LAN solutions that protect data and defend against cyberthreats while providing a superior digital experience. Thousands of customers globally, with hundreds of thousands of sites and millions of users, trust Versa with their mission-critical networks and security. ...Read More

Virtru

At Virtru, we empower organizations to easily unlock the power of data while maintaining control everywhere it goes. Virtru’s FedRAMP-authorized data-centric security platform allows the Defense Industrial Base to encrypt and control CUI in emails, files, and SaaS applications, facilitating CMMC compliance without the need for complex infrastructure overhauls. Trusted by thousands of organizations globally, Virtru provides the freedom to collaborate with confidence. ...Read More

XBOW

XBOW is the autonomous offensive security company redefining cyber defense for the AI era. Combining AI reasoning with offensive security workflows, the XBOW platform delivers expert-level security testing at machine speed. XBOW empowers security teams to transform from reactive to proactive defense at AI scale. For XBOW customers, autonomous offense is the best defense. ...Read More

XM Cyber

XM Cyber is transforming the way organizations prevent attacks that put their business at risk with the most reliable Continuous Exposure Management platform. The platform discovers, prioritizes, and drives remediation of validated exposures (including CVEs, misconfigurations, over-permissions, exposed credentials, AI exposures, and compensating controls) across on-prem and cloud environments, from the external attack surface all the way to critical assets. ...Read More

Yubico

Yubico (Nasdaq First North Growth Market Stockholm: YUBICO) is the inventor of the YubiKey, the gold standard in phishing-resistant multi-factor authentication (MFA), and a creator and contributor to FIDO open authentication standards. The company is a pioneer in delivering hardware-based passwordless authentication using the highest assurance passkeys to customers in 160+ countries. For more information, visit: www.yubico.com. ...Read More

Zero Networks

Zero Networks helps organizations prevent attacks, minimize blast radius, and maintain business continuity – even when attackers get inside.  We make every connection verified and intentional, using microsegmentation to keep attacks contained and the business running.

1Kosmos

1Kosmos enables identity verification and passwordless multi-factor authentication for workers, customers, and residents. By unifying identity proofing, credential verification, and strong authentication, the 1Kosmos platform prevents identity impersonation, account takeover, and transaction fraud while delivering a frictionless user experience via a privacy-preserving digital identity wallet. Trusted by leading banks, telcos, healthcare providers, retailers, universities, and government agencies, 1Kosmos performs millions of authentications daily. Learn more at www.1kosmos.com. ...Read More

Above Security

Above Security is an AI-native managed insider threat platform built to make insider risk proactive and operational through behavioral intelligence. Powered by a fleet of highly specialized AI investigators, Above analyzes behavior of both humans and their AI counterparts to surface real risk without rules, policies, or configuration. Above prevents and responds to insider risk with both in-the-moment coaching to stop risky behavior in real time and automatically produced evidentiary timelines that security, legal, and HR can actually use in the event of a real incident. ...Read More

Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. ...Read More

Acalvio Technologies

Acalvio is the leader in autonomous cyber deception, defending against APTs, insider threats, and ransomware. Its AI-powered Preemptive Cybersecurity Platform, protected by 25 patents, delivers threat detection across IT, OT, and cloud environments and advances Identity Threat Detection and Response (ITDR) with Honeytoken-driven Zero Trust security. Acalvio is headquartered in Silicon Valley. ...Read More

Adaptive Security

Adaptive Security is the next-generation cybersecurity platform protecting organizations from AI-powered cyber threats. Our cutting-edge security training and phishing simulations help enterprises defend against deepfakes, GenAI phishing, SMS phishing, and other emerging attack vectors. Trusted by leading financial institutions, technology companies, and critical infrastructure providers, Adaptive Security empowers security teams with the tools and knowledge to stay ahead of evolving threats. ...Read More

AiBound

AIBound is the AI Security Control Plane purpose-built for enterprise security teams to confidently accelerate AI adoption. In under 24 hours, our agentless, read-only platform discovers and eliminates shadow AI, builds a complete AI inventory, and enforces governance policy from endpoint to cloud. Powered by the Guardian engine, AIBound fuses telemetry from your existing browser, endpoint, network, and cloud tools into actionable risk signals. We empower CISOs to assess AI resources, understand data access patterns, and set real-time guardrails with zero friction or new agents. ...Read More

Aikido Security

Aikido builds category-leading security products across software security, including code, cloud, runtime, and penetration testing. Each product can be deployed independently to identify exploitable risk. When used together on Aikido’s platform, these products share context across code, cloud, and runtime to improve prioritization and remediation. Trusted by over 100,000 teams, including the Premier League, Revolut, SoundCloud, and Niantic. ...Read More

AiStrike

AiStrike is an AI-native cybersecurity platform that transforms security operations from reactive alert triage to proactive, intelligence-driven defense. It continuously improves detection quality, reduces alert noise, and accelerates investigation and response. Built to work with existing security tools, AiStrike helps organizations reduce risk, improve efficiency, and maximize the value of their security investments. ...Read More

Akto

Akto is the Agentic AI Security platform for your teams to secure AI agents, MCPs, and LLMs in your organization. Akto's platform helps teams build their Agentic AI Security program through Discovery, Governance, red teaming, monitoring, and enforcing guardrails on Agentic AI assets. ...Read More

Alice

Alice is a trust, safety, and security company built for the AI era, safeguarding communicative technologies across UGC and generative AI. Trusted by leading tech platforms and 7 of the 10 top foundation model labs, Alice delivers end-to-end coverage across the AI lifecycle - from red-teaming and model hardening to runtime guardrails and drift detection - powered by Rabbit Hole, our adversarial intelligence engine built on billions of real-world data samples and expert analysis, so teams can advance unafraid. ...Read More

Allure Security

Built for the disinformation age, Allure Security is the only AI-powered, expert-led Scam Defense Platform solution that proactively protects brands by shutting down online scams before they strike. We detect, defuse, and eliminate threats and disinformation in minutes. The result is fewer fraud losses, stronger customer trust, and a safer digital experience across websites, mobile apps, the dark web, social media, and search engines. ...Read More

Anomali

Anomali delivers the first Intelligence-Native Agentic SOC Platform unifying a fully featured security data lake, threat intelligence, and agentic AI into a single modern experience. The platform accelerates detection, investigation, and response; delivering earlier insights, faster action, and scalable modernization across any environment. ...Read More

Anvilogic

Anvilogic is an AI SOC platform that serves as a security operations layer with advanced detection and triage. Its SIEM-like interface runs on top of wherever data lives, using detection content and SecOps agents to improve SOC efficiency, efficacy, and cost control.

apexanalytix

apexanalytix delivers enterprise risk resolution with touchless onboarding, auto-acting risk management and profit recovery outcomes. Over 300 of the world’s largest companies protect more than $9T in annual spend with the apexanalytix platform. Powered by Private Generative AI, 100M+ golden records, and integrated global data sources, organizations collaborate with suppliers and customers to build trust, create value, and resolve complex risk. Founded in 1988, apexanalytix has a proven history of enterprise risk resolution. Visit www.apexanalytix.com for more information. ...Read More

Apono

Apono is a software designed to automate access management for cloud infrastructure and data environments. The Apono Privileged Access Platform eliminates standing permissions to secure humans, machines, and agents, providing seamless secure access to cloud, data, and infrastructure. It provides features such as just-in-time and least-privilege access control, enabling organizations to grant temporary permissions to users or applications based on need and predefined policies. Because nothing should start the day with admin access. ...Read More

Appknox

Appknox proudly stands as a leader, securing its position in the Gartner Magic Quadrant for Voice of Customer 2023 as we continue to redefine industry standards. Offering dynamic Static Application Security Testing(SAST), automated Dynamic Application Security Testing(DAST), and robust API testing, Appknox ensures comprehensive vulnerability assessment for mobile applications. Additional features like Software Bill of Materials(SBOM) and Drift detection make the Appknox security suite comprehensive. Leading businesses across the world trust Appknox for unparalleled mobile application security. ...Read More

Aqua Security

Aqua Security protects what runs in the cloud. The Aqua Platform monitors the real behavior of running workloads to show which vulnerabilities and actions actually impact live applications. It evaluates images before deployment, observes workloads in production, and enforces policy at runtime to stop unsafe actions. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL protecting over 500 of the world’s largest enterprises. For more information, visit https://www.aquasec.com. ...Read More

ARCON

ARCON is a leading information risk-management solutions provider specializing in Identities, Vaults, Cybersecurity and Digital Risk Assessment solutions. Built on the pillars: Predict, Protect, Prevent, it offers solutions that enable robust perimeter security around IT systems, endpoints, and data while developing a comprehensive GRC framework. Product portfolio: ARCON|Converged Identity ARCON|Privileged Access Management ARCON|Endpoint Privilege Management ARCON|Security Compliance Management ARCON|Global Remote Access ARCON|My Vault ARCON|Cloud Governance ARCON|Drift Management ...Read More

Aryon Security

Aryon is redefining cloud security with a prevention-first approach. The Aryon Cloud Security Enforcement Platform enforces security policies at deployment, stopping risks before they reach production. By applying consistent controls across IaC and ClickOps, Aryon eliminates security gaps between workflows. The result is reduced risk, streamlined security and engineering processes, and the ability to build securely without slowing down development ...Read More

Astrix Security

Astrix secures every AI agent and the service accounts, API keys, OAuth apps, and secrets they use to operate. The platform uncovers all non-human access across multi-cloud, SaaS, and on-prem environments, enabling teams to assess, prioritize, and fix risks using deep context around ownership, usage patterns, and privilege levels. Astrix enforces enterprise-grade policies, detects anomalies and deviations, and integrates with SIEM, SOAR, and ITSM to automate and scale identity risk remediation. ...Read More

Axoflow

More than a data pipeline, Axoflow is an autonomous data layer for Security Operations delivering better security outcomes at reduced cost through better data. With AI-based autonomy, not just a chatbot, investigations are 70% faster, SIEM spend is 50% lower, and pipeline maintenance is near zero. ...Read More

Beacon Security

Beacon is the security data management platform that solves the tradeoff between cost, coverage, and context. Purpose-built for security operations, Beacon discovers coverage gaps, transforms and enriches telemetry, and routes optimized data to any destination – SIEM, data lake, or storage. With native connectors, reduction recipes, and real-time processing, Beacon improves data fidelity and investigation speed while reducing SIEM ingestion costs by 50-70%. Security teams gain visibility, eliminate blind spots, and ensure analysts have actionable data when it matters most. ...Read More

Bitdefender

Bitdefender provides cybersecurity solutions with leading security efficacy, performance, and ease of use to enterprise organizations and consumers. Guided by a vision to be the world’s most trusted cybersecurity solutions provider, Bitdefender is committed to defending organizations and individuals around the globe against cyberattacks to transform and improve their digital experience. For more information, visit https://www.bitdefender.com. ...Read More

Black Duck Software Ltd

Black Duck now defines the next frontier of application security. Thanks to expanding regulatory pressure combined with the avalanche of new code generated by AI, the world has moved beyond “good enough” find-and-fix tools, offloading security with a shift-left approach, or CI/CD where security is an afterthought. Black Duck provides solutions built to handle the scale, speed, and regulatory pressures of the new software world. Black Duck meets the demands of modern business with True Scale Application Security, ensuring uncompromised trust in software for the regulated, AI-powered world. ...Read More

Black Kite

Black Kite is the AI-native third-party cyber risk platform trusted by 3,000+ customers to manage every supplier and every risk across their ecosystem. Powered by high-quality risk intelligence spanning 40 million companies, Black Kite is defined by the accuracy and transparency of its data. The platform automates vendor monitoring, surfacing insights into ransomware, regulatory gaps, and financial exposure. With Black Kite, security teams gain always-on visibility and trusted intelligence to act early, reduce exposure, and stay ahead of third-party threats. Learn more at www.blackkite.com. ...Read More

BlinkOps

Blink is the enterprise platform powering the shift to fully agentic security. Replace disconnected tools and manual workflows with AI agents that operate autonomously - within the guardrails you define. SOC, threat hunting, vulnerability management, identity, and GRC, all on one platform. Accelerate your AI transformation without sacrificing oversight. You stay in control. Your agents scale the work. ...Read More

BlueVoyant

BlueVoyant delivers a comprehensive cloud-native security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains, extending to the clear, deep, and dark web. The platform integrates advanced AI technology with expert human insight to offer extensive protection and swift threat mitigation, ensuring enterprise cybersecurity. Trusted by more than 1,000 clients globally, and the 2024 Microsoft Worldwide Partner of the Year, BlueVoyant sets the standard for modern cyber defense solutions. ...Read More

Bolster AI

Bolster is an AI-powered cybersecurity company helping the world’s leading brands protect their customers from phishing, fraud, and digital impersonation. We combine deep learning and automation to detect, analyze, and take down threats in real time across web, social media, dark web, and app stores. Our platform is trusted by startups and many Fortune 500 companies alike to reduce risk, protect revenue, and defend brand reputation at scale. ...Read More

BreachLock

BreachLock is a global leader in offensive security, unifying human-led, AI-augmented Penetration Testing as a Service (PTaaS), agentic AI-powered Adversarial Exposure Validation (AEV), and automated Continuous Attack Surface Discovery (CTEM) into one seamless platform. With this unified approach to offensive security, BreachLock's 1,200+ active customers benefit from truly cohesive, always-on security validation — without the complexity of fragmented tools. ...Read More

Britive

Britive is the cloud-native privileged access platform built to meet the velocity and security of the Cloud and AI era by eliminating static credentials. Pioneering Zero Standing Privileges (ZSP), we replace vaults with enterprise-grade JIT ephemeral access and dynamic runtime authorization. Our unified solution secures human, machine, and AI identities across hybrid environments, operationalizing Zero Trust at the speed of business. ...Read More

C1.ai

C1 empowers organizations to adopt AI securely and at speed by delivering the right access and context to every human, workload, and agent. Companies like Instacart, Ramp, Zscaler, and Brex trust C1 to accelerate AI adoption with confidence. Learn more at www.c1.ai

Cav

CAV delivers a continuous automation platform that optimizes tedious, incomplete, and expensive cyber compliance programs. ISSOs, ISSEs, ISSMs, SCAs, DAOs, and AOs can quickly and easily manage, review, and report on ATO initiatives for more than 50 frameworks, regulations, and mandates. With two-way integrations and APIs, CAV translates technical control evidence from security technologies like CNAPP, vulnerability management, and XDR for business applications like GRC, ITSM, and audit platforms to accelerate and streamline ATO. ...Read More

CDW

CDW Corporation is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada. A Fortune 500 company and member of the S&P 500 Index, CDW helps its customers to navigate an increasingly complex IT market and maximize return on their technology investments. Our broad array of products and services range from hardware and software to integrated IT solutions such as security, cloud, hybrid infrastructure and digital experience. ...Read More

Clarity Security

Clarity Security helps enterprises autonomously govern identity with speed, intelligence, and simplicity. We give organizations a smarter way to mature their identity posture by cutting the time and cost of access reviews, reducing audit stress, and eliminating the ticket fatigue that slows operations. With automated user access reviews and lifecycle management powered by ABAC, we empower organizations to turn identity security from a cost center into a driver of business growth. ...Read More

CLEAR

CLEAR's mission is to strengthen security and create frictionless experiences. With over 36 million Members and a growing network of partners across the world, CLEAR's secure identity platform is transforming the way people live, work, and travel by connecting you to the things that make you, you—making everyday experiences easier and more secure. By analyzing hundreds of identity signals, CLEAR enables enterprises to confidently verify the person behind the device—reducing fraud while maintaining a smooth user experience. ...Read More

Cloud Range

Cloud Range’s revolutionary cloud-based cyber range platform helps organizations measurably reduce cyber risk by testing and training both human and AI SOC agents to defend against real attacks. Its simulation platform includes an ever-changing library of realistic, live-fire attacks, IT/OT/IoT/cloud environments, skill development labs, advanced tabletop exercises, reporting, and more. Its AI Validation Range enables organizations to safely test, train, and validate AI models and agents without exposing real data in production environments. Ensure your organization is battle-ready. ...Read More

Cogent Security

Cogent: Agentic AI for Exposure Management Turn vulnerability findings into closed work. Cogent connects to your security tools, prioritizes what matters in your environment, and automates the investigation and coordination work that typically consumes your time; all while keeping humans in control. ...Read More

Corelight

Corelight defends the networks the world relies on by offering unified visibility and future-ready defense capabilities that adapt to evolving threats, accelerating response times to disrupt attacks, and driving AI SOC transformation. As a trusted force behind network resilience, we enable security teams to achieve mission velocity without sacrificing compliance and to hunt smarter for hidden threats. Our Open NDR Platform simplifies operations, improves SOC maturity, enhances analysts' skills, and puts elite defense within reach. ...Read More

CoreView

CoreView is the leading SaaS platform for Microsoft 365 Tenant Resilience. Trusted by enterprises worldwide, CoreView secures the configuration, identity, and access layers of Microsoft 365—hardening tenants against attack, reducing privilege and blast radius, detecting configuration tampering, and restoring security posture after incidents. By protecting Microsoft 365 & Entra at the tenant level, CoreView ensures organisations can prevent compromise, withstand intrusion, and recover with confidence from cyber threats and operational disruption. ...Read More

Coverbase

Coverbase helps security and IT teams design, implement, and operate modern cybersecurity programs. We partner with organizations to assess risk, select and deploy the right technologies, and optimize security operations across cloud, identity, data, and infrastructure. Our experts provide hands-on guidance, strategic advisory, and ongoing support to help teams scale securely, improve resilience, and drive measurable business outcomes. ...Read More

CovertSwarm

Since 2020, CovertSwarm has redefined enterprise security by launching constant cyber attacks across digital, physical, and social vectors. For a monthly fee, our ethical hackers relentlessly probe your entire brand to outpace threats. When we breach, you’re alerted—before real attackers strike. With most breaches detected too late, only continuous assault counters APTs and zero-day exploits. We're among the few CREST-accredited for Simulated Targeted Attack and Response. ...Read More

Cribl

Cribl, the AI Platform for Telemetry, empowers enterprises to manage and analyze telemetry for both humans and agents. Trusted by organizations worldwide, including half of the Fortune 100, Cribl bridges the gap between AI ambition and infrastructure reality. No lock-in. No data loss. No compromises. Cribl’s vendor-agnostic platform ensures data remains portable and interoperable. By cost-effectively handling increasing data volume and variety without delay, Cribl gives enterprises the choice, control, and flexibility to build what’s next. ...Read More

Critical Start

Critical Start is the AI-accelerated, human-validated Managed Detection and Response (MDR) provider that helps organizations reduce cyber risk and stop threats before they disrupt business. Our 24×7 U.S.-based SOC combines advanced analytics with expert investigation to eliminate false positives, investigate every threat alert, and take response actions. With transparent workflows, contractual SLAs, and deep integrations across endpoint, cloud, identity, and network tools, Critical Start delivers the clarity, speed, and accountability security teams need to turn alerts into trusted outcomes. ...Read More

CSC

CSC is the trusted security and threat intelligence provider for the Forbes Global 2000 and the 100 Best Global Brands (Interbrand?) providing domain security and management, and online brand and fraud protection. Our DomainSecSM platform helps enterprises identify cybersecurity oversights and secure their digital assets, allowing them to bolster their security postures, protect against cyber threat vectors and avoid revenue loss. CSC also provides online brand protection, with multidimensional views of threats outside the firewall, and fraud protection combatting phishing in the early stages. ...Read More

Cyberbase AI

Slow security reviews cost you deals. Contract redlining, DDQs, and security questionnaires pile up — every day in manual review is a day your buyer loses momentum. Cyberbase automates the compliance workflows between certification and closed-won. Start with a free Trust Center that gives buyers self-serve access to your security posture. When reviews come in, AI trained on your policies and frameworks delivers audit-ready responses mapped to source documents. Engineering team from Apple and Robinhood. SOC 2 compliant. Built for revenue teams selling into the enterprise. ...Read More

Cyberhaven

Cyberhaven protects sensitive data wherever it lives and goes. Built for the AI era, Cyberhaven’s unified data security platform combines DSPM, data loss prevention, insider risk management, and AI security with deep data lineage and agentic AI. Cyberhaven helps organizations stop data loss, reduce insider risk, and enable AI adoption securely, without slowing their business. ...Read More

CyberSagacity

Most AppSec data is wrong—and fixing everything slows development without reducing risk. CyberSagacity delivers an easy-to-use Application Security Intelligence Layer that validates and corrects security findings, quantifies real business risk, and identifies the defects that materially matter. The result: fewer false priorities, clearer governance, and faster, safer software delivery. Visit us to see how accurate AppSec intelligence changes security decisions. ...Read More

Cyble

Cyble is a global cybersecurity company specializing in threat intelligence, digital risk protection, and dark web monitoring. Its AI-powered platform, Cyble Vision, driven by the Blaze engine, enables fast threat detection, automated analysis, and contextual insights on ransomware, phishing, and fraud. Cyble helps enterprises and governments identify risks, reduce noise, and respond quickly. With real-time alerts and automation, it strengthens cyber resilience and proactive defense worldwide. ...Read More

CyCognito

CyCognito is a leading exposure management platform that delivers an end-to-end solution, from asset discovery, security testing, risk prioritization, and remediation lifecycle management. It is the only solution offering seedless discovery. The platform continuously scans websites, cloud resources, and APIs to uncover exposed and vulnerable assets without relying on preloaded data. CyCognito maps assets to their corresponding business unit, providing critical business context and enabling rapid, accountable responses that reduce cyber risk and keep organizations ahead of evolving threats. ...Read More

Dataminr

Security teams have the signals, the tools, and the frameworks — what they lack is a system that connects them into timely, defensible decisions. Dataminr for Cyber Defense is an intel-driven threat and exposure management suite that uses agentic AI to fuse external threat data with your internal environment, prioritize those threats by business impact, and automate response. Powered by 100+ specialized AI models, it helps organizations know what's coming, understand what matters, and act before impact. ...Read More

DeleteMe

The leader in proactive privacy protection, DeleteMe helps organizations reduce human-targeted risk by removing employees’ personal data from data brokers and the internet - at scale.

DigitalXForce

DigitalXForce, "Digital Trust for the New Era," is the Unified Enterprise Security Risk Posture Management (ESRPM) SaaS Platform enabling Real-time, Continuous and automated GRC through Cybersecurity Mesh Architecture. The platform offers a comprehensive range of solutions, including Automated GRC, Enterprise Security Posture Management, AI Risk Management, Cloud Security Posture Management, risk quantification, automated audit, Third Party Risk Management and much more. Its innovative approach empowers organizations to enhance their security posture while meeting compliance. ...Read More

Diligent

Diligent is the leading modern governance, risk and compliance platform, giving CISOs a real-time, unified view of security, IT and third-party risk. We connect risk, compliance and audit data so you can quantify cyber exposure, prioritize remediation, automate reporting to executives and the board, and demonstrate resilience to regulators and stakeholders. ...Read More

Drata

Drata is a trust management platform that uses AI-powered automation to modernise governance, risk, and compliance, helping thousands of businesses develop a more secure, proactive, audit-ready, and risk-aware organisation to continuously maintain trust.

Echo

Echo is redefining cloud-native infrastructure with vulnerability-free software artifacts – from container base images to libraries, VMs, helm charts, EOL support, and more. Automatically patched, hardened, and FIPS-validated, our AI-powered software eliminates the vulnerability burden at the source and ensures that achieving enterprise-grade security doesn't mean slowing down development. ...Read More

Elastio

Elastio delivers Ransomware Recovery Assurance by adding a critical Data Integrity Layer to modern storage, backup, and disaster recovery environments. The platform continuously scan for ransomware encryption, insider threats, and corruption that traditional tools miss. Elastio validates clean recovery points, quantifies recovery readiness, and provides the assurance organizations need to prepare, report, and even insure against cyber disruption, reducing downtime and removing attacker leverage. ...Read More

Endor Labs

Endor Labs is an application security platform created by practitioners, academics, and builders who are experts in software supply chain security. We believe the biggest problem in AppSec today is that fixing risk is too hard—because security and development teams work differently. And now with AI generating more code than ever, that gap is only growing. Endor Labs bridges it by showing security teams what’s actually exploitable and what could break if you make a change. That way, you can have a smart conversation with developers about what to fix now, fix later, or fix never. ...Read More

eSHARE

eSHARE is transforming the digital workplace, enabling organizations to take control of secure, compliant collaboration within M365. Trusted by Global 2000 giants, including top names in aerospace and insurance, eSHARE delivers unparalleled data protection with intelligent guardrails and seamless user experiences. Accelerate M365 adoption, enhance secure collaboration with Copilot, and unlock your organization’s full potential. Join the thousands of users across nearly every country in the world who rely on eSHARE as the driving force behind Trusted Collaboration. Lead the way with eSHARE. ...Read More

ExtraHop

ExtraHop turns the network - the enterprise’s ultimate source of truth - into actionable insight to power security, performance, and resilience. Delivering superior data by design, we ensure superior defense by default. The ExtraHop modern network detection and response (NDR) platform provides visibility that thinks, analyzing behavior to intercept evasive risks before they cause damage. We transform network noise into definitive context, enabling security teams to make faster decisions and operate at uncompromised scale. ...Read More

Fable

Fable Security delivers the human risk platform that directly shapes employee behavior. Designed for simplicity and enterprise scale, our agentic platform synthesizes complex employee data, pinpoints risky behaviors, and deploys highly-relevant interventions to people automatically, in real time, right where they work. With Fable, modern enterprises tangibly reduce risk, sharpen security habits, and drive lasting organizational resilience. ...Read More

Factor Cybersecurity

Factor delivers a platform for MSSPs, service delivery partners (SDPs), and their enterprise customers to detect and respond to supply chain cyber risk before it becomes breach exposure. Factor SCDR is architected as a clearinghouse for vendor risk evidence — a higher-order layer that normalizes AI-driven attack-surface intelligence, internal telemetry, and customer-selected data sources into a single, inspectable view of vendor risk. AI agents handle tactical vendor work, enabling partners to manage larger portfolios with smaller teams. Learn more at www.factorcyber.com. ...Read More

Fenix24

Fenix24 is recognized as the leading breach recovery company in the world, and combines that unique expertise with prevention, protection, and a recovery guarantee that together delivers the most comprehensive cyber resilience program available today. It combines: ■ Full asset visibility and labeling, plus automated dependency mapping ■ Hardening and breach resistance informed by current threat behavior ■ Ongoing managed protection across the most targeted control areas ■ Rapid, battle-tested recovery ...Read More

FireMon

​​​​​​​FireMon improves security operations that will in turn lead to better security outcomes. FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions. Our platform is the only real-time solution that reduces firewall and cloud security policy-related risks, manages policy changes, and enforces compliance. ...Read More

Fluid Attacks

Fluid Attacks helps teams prevent, detect, manage, and remediate vulnerabilities with precision by combining our AI-native scanners, deterministic scanners, and certified penetration testers. Together, they deliver AI SAST, SAST, SCA, DAST, SCR, PtaaS, and RE to continuously reduce your attack surface. This approach ensures security keeps pace with innovation, without slowing development. Fluid Attacks provides expert insight into vulnerabilities and the guidance needed to remediate them effectively, so you can build and release software with confidence. ...Read More

Forcepoint

Forcepoint enables Self-Aware Data Security, an AI-native approach that helps enterprises and governments know their data everywhere, adapt to evolving risks and regulations in real time, and protect at scale with a unified, single-policy framework. Based in Austin, Texas, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries. ...Read More

Forescout Technologies, Inc.

For over 25 years, organizations and governments worldwide have trusted Forescout to secure their networks. From pioneering Network Access Control to delivering Universal Zero Trust Network Access, Forescout advances enterprise security across IT, OT, IoT and IoMT. The Forescout 4D Platform provides asset intelligence, continuous risk assessment and dynamic control for managed and unmanaged assets, powered by Vedere Labs threat research. With AI-driven workflows and human oversight, Forescout analyzes threats, orchestrates response and integrates with 180+ security and IT tools. ...Read More

Fortinet

Fortinet is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices and data everywhere, and today we deliver cybersecurity everywhere our customers need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet’s solutions, which are among the most deployed, most patented and most validated in the industry. ...Read More

Grip Security

Grip Security is the industry-leading SaaS + AI security platform, redefining how organizations discover, govern, and protect risk across SaaS and AI environments. Grip delivers comprehensive visibility, risk analysis, and prioritization across every application, with fast deployment, clear guidance, and automated protection that helps teams focus on what matters most and act with confidence. ...Read More

Harness

Harness provides complete application security on the industry's leading AI DevOps platform. Combining application security testing with API protection and AI security, Harness helps organizations secure everything after code. Pipeline-native security can keep up with development, scale across 1000s of applications, and continuously monitor runtime risk - for both traditional and AI-native applications. Security, DevSecOps, and platform teams rely on Harness to eliminate blind spots, stop advanced threats, simplify compliance, and accelerate secure delivery without slowing innovation. ...Read More

HiddenLayer

HiddenLayer is the leading provider of Security for AI. Its security platform helps enterprises safeguard the machine learning models behind their most important products. HiddenLayer is the only company offering turnkey AI security that does not add unnecessary complexity to models and does not require access to raw data and algorithms. HiddenLayer aims to protect enterprise’s AI from inference, bypass, extraction attacks, and model theft. The company is backed by M12, Microsoft’s Venture Fund, Moore Strategic Ventures, Booz Allen Ventures, IBM Ventures, and Capital One Ventures. ...Read More

Hyperproof

Hyperproof is a risk and compliance management platform that empowers IT, security, and compliance teams to automate and scale their workflows without the burden of jumping between multiple legacy platforms and spreadsheets. The Hyperproof platform enables teams to get complete visibility into their organizational risks, streamline the audit process, and reduce their ever-growing compliance workloads. Hyperproof is trusted by leading organizations like Veeva Systems, Fortinet, Appian, Outreach, and Thales. ...Read More

iCOUNTER

iCOUNTER is a redefining third-party risk through intelligence-driven detection of adversary intent. Powered by its Counter Threat Operating System (CTOS), the platform continuously monitors adversary reconnaissance, campaign staging, and targeting activity across the extended ecosystm, correlating threats to specific vendors and delivering prescriptive, evidence-backed actions. The third-party risk module moves from periodic assessment to operational defense, enabling organizations to identify and mitigate active threats before impact. ...Read More

IDMWORKS

IDMWORKS is the industry standard in IAM assessment, strategy, implementation, and management for organizations looking to improve their identity programs. Our Gartner-recognized approach has delivered over 4000 successful identity transformations across 850 client sites supporting everything from internal IAM programs to highly complex integrated workforce and CIAM transformations. IDMWORKS’ Managed Identity provides an effective solution to host and support day-to-day IAM service delivery without the overhead and complexity involved in internal IAM personnel. ...Read More

IGEL Technology

IGEL Technology delivers a secure, managed, and sustainable foundation for modern end-user computing. Built on an Immutable Endpoint OS, the IGEL platform enables organizations to simplify management, strengthen security, and extend device lifespan. Through the Adaptive Secure Desktop and Universal Management Suite, IGEL empowers IT to provide seamless, policy-driven access to digital workspaces across VDI, DaaS, and SaaS environments. ...Read More

Insight

Insight Enterprises is a leading Solutions Integrator that helps clients solve technology challenges by combining the right hardware, software, and services. We’re a global Fortune 500 technology company with a network of over 6,000 partners and experts around the world who provide access to end-to-end IT capabilities. For more than 35 years, we have delivered and optimized technology solutions for our clients efficiently, effectively, and safely. We are rated as a Great Place to Work, a Forbes World’s Best Employer, and a Fortune World’s Best Workplace. Discover more at insight.com. NSIT-M ...Read More

IONIX

IONIX Exposure Management protects enterprises’ external attack surface from cyber risks & increases security team efficiency by providing tools that shorten the time to discover & prioritize exposures. IONIX reduces the exploitable attack surface by discovering every internet-facing asset, assessing dependencies & connections, & validating exploitable risks to prioritize remediation of critical, impactful exposures. IONIX reduces alert fatigue, streamlines the process for resolving alerts & ensures they reach the right team. ...Read More

ISARA

ISARA is a crypto posture management company driving crypto agility and PQC compliance for enterprises and government agencies. ISARA Advance drives crypto agility today and PQC compliance for the future by Automating discovery and inventory, Quantifying the risk associated with servers, apps and infrastructure and Prioritizing and remediating the cryptography and configuration changes. ...Read More

ISC2

ISC2 is the world’s leading member organization for cybersecurity professionals, driven by our vision of a safe and secure cyber world. Our more than 265,000 certified members, and associates, are a force for good, safeguarding the way we live. Our award-winning certifications–including cybersecurity’s premier certification, the CISSP®–enable professionals to demonstrate their knowledge, skills and abilities at every stage of their careers. ...Read More

Jazz

DLP's rule-based framework is broken, creating noise instead of security. Jazz is the new model, combining a forensic endpoint agent for total visibility with an Agentic Investigator that deeply understands context & intent. It delivers clear, pre-investigated answers instead of alerts. Finally, DLP that works. ...Read More

Kanopy Security

Nokod is the leading application security platform dedicated to protecting the jungle of apps, automations, and AI agents created by business users. While rapid citizen development on platforms like Microsoft Power Platform, Copilot, Salesforce, and ServiceNow accelerates innovation, it introduces critical vulnerabilities that bypass traditional security oversight. Nokod provides complete visibility, risk detection, and automated remediation to secure this unseen attack surface. Trusted by Fortune 500 companies, Nokod turns hidden risks into governed, secure innovation. ...Read More

Keeper Security

Keeper Security is one of the fastest-growing cybersecurity software companies, protecting over 85,000 organizations in 150 countries. Keeper is a pioneer of zero-knowledge and zero-trust identity security, and its core offering, KeeperPAM®, is an AI-enabled, cloud-native platform that protects and manages access for all humans, machines, NHIs and AI agents. Recognized for its innovation in the Gartner Magic Quadrant for Privileged Access Management (PAM), Keeper secures passwords and passkeys, infrastructure secrets, remote connections and endpoints. ...Read More

Lineaje

Lineaje provides Autonomous, Full-Lifecycle Software Supply Chain Security Solutions for organizations sourcing, building, selling, or buying critical software. Lineaje enables organizations to source safe software with its vulnerability-free Gold Open Source packages and images, contextualize risks, autonomously-secure builds & containers with SBOM360, and manage risk and compliance with its SBOM Manager. Lineaje's new offering, UnifAI, enables organizations to build secure Agentic AI applications that align with corporate standards and meet global AI compliance standards. ...Read More

LockThreat

LockThreat GRC is an Enterprise GRC automation platform that centralizes visibility and delivers real-time insights to optimize policy management, risk mitigation, and compliance. By automating key GRC processes across all business functions organizations gain unified visibility and control across all standards, IT environments, and regions. ...Read More

Lumia Security

Lumia helps enterprises embrace AI with confidence by governing how employees and autonomous agents use AI, ensuring every interaction aligns with security, compliance, and business standards. By interpreting the content, context, and intent behind every AI action, Lumia delivers real-time security and governance at scale, enabling organizations to adopt AI safely and responsibly. ...Read More

Lumos

Lumos is an autonomous identity platform that uses an agentic, AI-native approach to enhance security, boost productivity, and ensure compliance. It automatically discovers and manages access across an organization’s entire tool stack, providing rich contextual intelligence to reduce identity risk without slowing operations. Powered by its identity agent Albus, Lumos enables adaptive governance and is trusted by companies like Pinterest, Anduril, and GitHub. ...Read More

Mate Security

Mate Security is the first AI SOC solution that understands organizational context. Powered by the Security Context Graph, Mate’s AI agents work alongside SOC analysts to investigate all alerts with unprecedented accuracy, accelerate investigations from hours to minutes, and scale elite-level expertise across the SOC. Trusted by Fortune 500 organizations, Mate continuously learns from every investigation to get smarter over time. ...Read More

Mesh Security

Mesh Security is the world's first Cybersecurity Mesh Architecture (CSMA) platform. Serving as an execution layer above existing security tools, Mesh connects fragmented tools, data, and infrastructure to reveal and eliminate viable attack paths to critical assets. Through agentless integrations across cloud, identity, SaaS, AI, data, network, CI/CD, and on-premises domains, Mesh creates a continuously updating graph that shows complete cross-domain attack chains – then drives remediation. Unlike point tools that flag isolated risks, Mesh orchestrates system-level security execution. ...Read More

Miggo Security

Applications today, from traditional systems to AI-powered, evolve dynamically at runtime, while most security tools remain designed for static environments. The result is a growing gap: teams can’t patch everything, and exposure windows widen with every change. Miggo Security provides CISOs and security teams with runtime truth across the full applications landscape, from legacy and hybrid to AI and Agentic applications. This visibility enables teams to mitigate vulnerabilities and stop attacks before they become incidents, without wasting or requiring additional development time. ...Read More

Mimic

While ransomware continues to evolve, Mimic takes a fundamentally different approach — neutralizing threats before they cause damage to your critical applications. Our platform deflects ransomware, insider threats, and zero-days instantly, creating a deceptive environment where attackers believe they've succeeded. ...Read More

Neovera

Neovera helps financial institutions and regulated organizations protect how value moves across money, data, identities, applications, and infrastructure. We combine offensive security, Fraud Red Team simulation, security operations, and hybrid cloud management to stop fraud, expose control weaknesses, stabilize critical platforms, and demonstrate regulatory effectiveness. We design, pressure test, operate, and validate controls in live environments so security works in practice, not just on paper. ...Read More

Netarx

Netarx addresses one of the fastest-growing gaps in enterprise risk management - the inability of existing compliance frameworks to detect AI-generated fraud at the human layer. As deepfakes and synthetic impersonations render traditional identity verification controls unreliable, Netarx provides real-time detection across video, voice, email, and messaging, giving risk and compliance leaders a defensible, auditable first line of defense against the social engineering threats that no current control in their stack was built to catch. ...Read More

NINJIO

NINJIO’s human risk management platform reduces cybersecurity risk through personalized security coaching, engaging awareness training, and dynamic testing. Our multi-pronged approach to risk mitigation focuses on the latest attack vectors to build employee knowledge and the behavioral science behind social engineering to sharpen users’ intuition. Our simulated phishing and coaching tools build a proprietary Emotional Susceptibility Profile for each user to identify their specific social engineering vulnerabilities and change behavior. ...Read More

Nucleus Security

Nucleus is the Unified Exposure Management platform that orchestrates enterprise and public sector programs to drive exposure reduction outcomes. The platform continuously unifies security data from 200+ sources, prioritizes risk with intelligence, and mobilizes remediation at scale. ...Read More

Oleria

Oleria is building the industry's first data-first, AI-native identity security platform for a fully adaptive and autonomous future of identity. The Trustfusion platform continuously aggregates identity, entitlement, and activity data across human, non-human and AI identities to power adaptive governance and autonomous security outcomes. This approach enables enterprises to enforce least privilege, drastically reduce manual governance processes, and dramatically reduce the cost and complexity of identity security at scale. ...Read More

Ontinue

Ontinue is the only Microsoft-specialized MDR provider combining AI-driven autonomous investigation, tailored response automation, and 24/7 protection. Integrated with Microsoft 365 Defender and Sentinel, Ontinue resolves 99% of threats autonomously and accelerates investigation by 50%. Its platform reduces alert fatigue, optimizes SecOps workflows, and strengthens posture through continuous threat mitigation and real-time collaboration via Microsoft Teams. ...Read More

OpenVPN

OpenVPN's network security platforms provide secure remote access through both self-hosted, and cloud-delivered VPN solutions for business with the core tenets of Zero Trust Network Access (ZTNA), creating peace of mind for organizations with remote and hybrid employees. Built on the high-performance, enterprise-trusted open-source OpenVPN protocol, OpenVPN’s solutions for business, Access Server and CloudConnexa®, help teams securely access company resources, SaaS platforms, the web, and data. OpenVPN products are trusted by nearly 20,000 business customers. ...Read More

Optiv

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to more than 7,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. ...Read More

Optro

Optro (formerly AuditBoard) helps enterprises transform risk into opportunity, redefining GRC through an agentic system of action. More than 50% of the Fortune 500 trust Optro to elevate audit, risk, and compliance in addressing a new era of risk. Optro is top-rated by customers on G2 and was named a Leader in the 2025 Gartner® Magic Quadrant™ for Governance, Risk and Compliance (GRC) Tools, Assurance Leaders. To learn more, visit: optro.ai. ...Read More

Orca Security

Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world's most comprehensive coverage and visibility of risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure. ...Read More

Orion Security

ORION Security is the agentic data loss prevention platform used by enterprise cybersecurity professionals to unleash innovation while protecting sensitive data across all environments including endpoints, email, SaaS, cloud and generative and agentic AI. ORION autonomously discovers, classifies and protects sensitive data in motion using AI agents and a proprietary LLM to distinguish between legitimate data in motion and malicious data exfiltration. From copy / paste to shadow AI, ORION delivers the autonomous, AI-native DLP that substantially reduces policy reliance and false positives. ...Read More

Ovalix Security

Ovalix enables organizations to adopt AI with confidence by securing the entire AI ecosystem. The Ovalix platform mitigates data leakage, shadow AI, malicious prompts, excessive agent autonomy, and compliance risks across public GenAI applications, homegrown AI systems, and AI coding assistants. ...Read More

PhishingBox

PhishingBox is a web-based platform for organizations to conduct phishing simulations and cybersecurity training. This helps identify vulnerabilities and mitigate human risk. Our simple-to-use, cost-effective solution helps organizations achieve cybersecurity objectives.

Pindrop Security

Pindrop is the Real Human + Right Human® platform securing real-time communications with deepfake detection and continuous identity verification across voice, video, and digital interactions. Trusted by 7 of the top 10 U.S. banks and leading insurers and healthcare providers, Pindrop analyzes billions of real-time interactions annually in security-critical environments, powered by models trained on 5B+ interactions and 300+ patents. ...Read More

PlexTrac

PlexTrac is the leading AI-powered platform for pentest reporting and exposure assessment, trusted by Fortune 500 companies and top security providers including Expedia, Royal Caribbean, Mandiant, and Deloitte. Built to help cybersecurity teams continuously manage and reduce threat exposure, PlexTrac centralizes security data, streamlines reporting, prioritizes risk, and automates remediation workflows—empowering teams to drive measurable risk reduction. ...Read More

Portal26

The Portal26 GenAI Adoption Management Platform provides enterprises full visibility and control of all Generative AI usage to enable them to securely embrace and accelerate its competitive promise. For CISOs and security teams, they can in real-time isolate and prevent risk, discover ShadowAI, protect data and IP, allow for rapid audits and forensics, and support rigorous governance. Access deep employee GenAI consumption analytics for valuable insights to determine GenAI use cases, strategy, adoption, and ROI. Learn more at Portal26.ai ...Read More

ProcessUnity

ProcessUnity is the Third-Party Risk Management company. Our software platforms and data services help customers protect their businesses against cybersecurity threats, breaches, and outages that originate from their ever-growing ecosystem of business partners. The world’s leading brands rely on ProcessUnity for effective and efficient Third-Party Risk Management. ...Read More

Promptfoo

Promptfoo is the leading open-core AI security platform, helping developers and security teams find and fix vulnerabilities in AI applications before they reach production. Used by 300K+ developers and adopted by over 25% of the Fortune 500 companies, Promptfoo provides automated red teaming, real-time code scanning, and continuous monitoring across the entire AI stack, from prompts and RAG pipelines to agents and tool integrations. Backed by Insight Partners and Andreessen Horowitz, and recommended by OpenAI and Anthropic, Promptfoo is building the security layer for enterprise AI. ...Read More

Push Security

Push Security is on a mission to defend organizations where work and attacks actually happen: in the browser. Built by red and blue team experts, Push gives defenders visibility, control, and response power in a layer that’s historically been overlooked, but increasingly targeted. Push brings modern security to the modern workplace. ...Read More

Quilr AI

From Data to AI: Adaptive Security That Learns With You. QuilrAI’s guardian agents analyze content, context, and intent in real time. Safeguarding sensitive data, AI interactions, and human workflows without slowing you down.

Reach Security

Reach Security is an AI-native security company focused on giving customers a single interface to understand and operate security controls at scale. We bridge the gap between knowing where you're exposed and taking action to fix it. We help organizations reduce risk by making better use of the tools they already have - delivering clarity, prioritization, and automation to turn understanding into results. ...Read More

Reality Defender

Reality Defender is an RSAC Innovation Award-winning cybersecurity company helping enterprises and governments detect deepfakes and AI-generated media. Utilizing a patented multi-model approach, Reality Defender is robust against the bleeding edge of generative platforms producing video, audio, and images. Reality Defender's products, including RealCall, RealMeeting, RealScan, and RealAPI, empower teams to identify fraud, disinformation campaigns, and harmful deepfakes in real time. ...Read More

Realm Security

Headquartered in Boston, Massachusetts, Realm.Security helps security teams cut costs and improve outcomes by transforming how they manage and route security data. Founded by industry veterans with decades of experience defending against evolving threats, Realm’s AI-native Security Data Pipeline Platform is radically simple to deploy and operate. By embedding artificial intelligence across the platform, Realm enables faster, smarter outcomes without the manual overhead, with modular capabilities including data filtering, privacy masking, normalization, and automated security data lakes. ...Read More

Reclaim Security

Reclaim Security: Automated Threat Exposure Remediation Move beyond discovery and detection to measurable risk reduction. Reclaim Security is an automated exposure remediation platform that operationalizes the CTEM lifecycle by fixing the misconfigurations other tools only flag. Utilizing our AI Security Engineer and PIPE™ (Productivity Impact Prediction Engine), we provide business-aware remediation that ensures zero disruption to workflows. We bridge the gap between exposure validation and mobilization, allowing you to optimize your existing security stack and eliminate drift at scale. ...Read More

Reco

Reco is the leader in Dynamic SaaS Security — the only approach that eliminates the SaaS Security Gap (the growing gap between what you can protect and what’s outpacing your security). This gap is driven by SaaS Sprawl — the proliferation of apps, AI, and identities; the challenge of keeping their configurations secure amidst constant updates, and the challenge of finding threats hidden within an ever-growing number of events. Dynamic SaaS Security by Reco keeps pace with this sprawl, no matter how fast it evolves. ...Read More

RedSeal

RedSeal helps organizations see, understand, and secure their hybrid digital environments by uncovering hidden risks, prioritizing exposures, and validating compliance. Trusted by Fortune 1000 companies and U.S. military branches, RedSeal strengthens resilience, streamlines operations, and reduces business risk across IT (on-prem, cloud, remote workers), OT, and IoT environments. ...Read More

Reva.ai

The Guardian Agent for the Agentic Era: Reva AI is the first unified platform for authorization and AI runtime security. By continuously evaluating intent, context, and risk, we govern every AI action in real time, Reva AI empowers enterprises to scale AI deployments with confidence and policy-driven control. ...Read More

Reveal Security

Reveal Security detects and stops identity threats and misuse after authentication. The Reveal solution uses ML/AI to continuously learn how human and non-human identities behave across infrastructure and applications and automatically intervenes when behavior turns risky. It's agentless, does not require detection rules or new operational overhead to manage. With Reveal you can proactively detect and respond to identity threats where access controls stop, including: insider threats, compromised credentials, and NHI and AI agents. ...Read More

Ridge Security

Ridge Security is a leader in Adversarial Exposure Validation and is dedicated to developing innovative cybersecurity solutions designed to protect organizations from advanced cyber threats. Ridge Security’s flagship product RidgeBot incorporates advanced artificial intelligence to deliver automated exposure validation continuously. With a focus on automation, intelligence, and actionable insights, Ridge Security enables security teams to stay ahead of emerging threats. ...Read More

RPost

Founded in 2000, RPost delivers advanced email security, eSignatures, and document protection trusted by governments and global enterprises. We would be showcasing our AI Powered RAPTOR™ pre-crime intelligence, double-layered DLP, and man-in-the-middle detection—all designed to help you stop threats before they strike. With patented legal proof technologies and seamless integrations, we empower enterprises secure communications, automate compliance, and stay ahead of risk. Ask us why RPost was named a world leader in eSign & eSecurity, innovator of the year by analysts. ...Read More

Saviynt

Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes. Customers trust Saviynt to safeguard their digital assets, drive operational efficiency, and reduce compliance costs. Built for the AI age, Saviynt is today helping organizations safely accelerate their deployment and usage of AI. Saviynt is recognized as the leader in identity security, with solutions that protect and empower the world’s leading brands, Fortune 500 companies and government institutions. ...Read More

SDG

With more than 30 years of experience partnering with global brands on complex business and IT challenges, SDG is a proven leader in advisory, transformation, and managed services that enable leaders to confidently execute AI, identity, threat, and risk management solutions that protect assets and provide business value. ...Read More

Secure Code Warrior

Secure Code Warrior is the AI Software Governance platform built for the way software is developed today — from human-written code to AI-assisted and fully agentic development. Developer must evolve their secure coding capability at every stage of that shift, and Secure Code Warrior's hands-on, role-based learning paths do exactly that. Practical exercises and real-world scenarios reduce the vulnerabilities introduced by AI-generated code — giving organizations the developer capability they need to adopt AI-driven development securely. ...Read More

Securiti

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized as Gartner "Cool Vendor in Data Security", Forrester "Privacy Management Wave Leader", and RSA "Most Innovative Startup". ...Read More

Seezo

Seezo empowers security teams to automate security design reviews (Seezo SDR) for every feature in development. This ensures engineers to receive context-specific security requirements before a single line of code is written. Learn more at seezo.io

Serval

Serval deploys AI agents for IT. Companies from the F500 to innovators like Perplexity, Notion, Mercor, and Clay use Serval to automate help desk tickets, just-in-time access requests, and onboarding/offboarding flows. With Serval, IT teams can turn natural language prompts into complex automations in seconds, automating >80% of tickets on day one. ...Read More

Silverfort

Silverfort secures every dimension of identity. We are the first to deliver an end-to-end identity security platform that is easy to deploy and won't disrupt business operations, resulting in better security outcomes with less work. Discover every identity across every environment, analyze exposures to reduce your attack surfaces, and enforce security controls inline to stop lateral movement, ransomware, and other identity threats. silverfort.com ...Read More

Singulr AI

Singulr AI provides a unified platform to govern and secure enterprise AI at scale. Security, IT, and AI teams gain real-time visibility, risk intelligence, and policy enforcement across every model, agent, and workflow. Organizations eliminate shadow AI, prevent data leakage, and ensure AI operates within approved consent and controls. Built-in red teaming and runtime safeguards help teams identify risk early, strengthen defenses, and accelerate AI adoption with confidence. ...Read More

SSH

SSH Communications Security (SSH) is a defensive cybersecurity company that secures communications and access for and between humans, systems, and networks. Our customers include Fortune 500 companies as well as SMBs across sectors like Finance, Retail, Critical Infrastructure, Healthcare, or Government. Our teams and partners in North America, Europe, and Asia help secure their business in the hybrid cloud and distributed IT/OT infrastructures. Our passwordless, keyless PrivX Zero Trust solutions reduce costs and complexity while quantum-safe encryption keeps critical connections future-proof ...Read More

Steg AI

Forensic watermarking for provenance, content leak protection, and deepfake security. Protect videos, images, documents, and audio from misuse.

Straiker.ai

Straiker provides agentic security for AI agents through Ascend AI for continuous adversarial testing and Defend AI for runtime security. Our proprietary detection engines read signals across the entire AI agent stack—models, MCP/tools, data, and identity—to protect against new threat classes. The AI engine delivers 99% detection accuracy with sub-second latency, detecting prompt injection, tool manipulation, data exfiltration, and autonomous chaos without slowing down AI agents. ...Read More

SUMO LOGIC

Sumo Logic unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec and Ops teams to simplify complexity, collaborate efficiently and accelerate data-driven decisions that drive business value. Customers around the rely on the Sumo Logic SaaS Log Analytics Platform to ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures. ...Read More

Terra Security

Terra Security provides agentic AI-powered continuous penetration testing aligned to code changes and evolving attack surfaces, combining a swarm of trained AI agents with human supervision for safety and control. The company works with Fortune 500 organizations to ensure every attack surface is covered across the web, AI, internal apps, APIs, mobile, networks, and the cloud. For more information, visit https://terra.security. ...Read More

Thinkst Canary

Most companies discover they've been breached way too late. Thinkst Canary fixes this: just 2 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Canaries are deployed and loved on all 7 continents... https://canary.tools/love ...Read More

Tidal Cyber

Tidal Cyber flips the model putting real adversary behavior​ at the heart of defense. ​By delivering a level of specificity never seen before,​ we align your security stack to techniques and sub-techniques to ​show where you’re truly exposed. Procedures reveal how​ adversaries attack, giving you a higher level of precision to​ manage and optimize your capabilities.​ Threat-led defense moves beyond assumptions, CVE-counting, and ​checkbox compliance by measuring security stack effectiveness ​against real adversary behavior, reducing the probability ​of attacker success.​​ ...Read More

Torq

Torq is the enterprise AI SOC platform that combines adaptive agentic insights and automation to triage, investigate, and remediate your most critical threats. Torq streamlines every step from alert through fix, from events through resolution. The platform analyzes your risk context to reveal your biggest risks. Working alongside your SecOps staff, the platform integrates with your security stack to facilitate containment and remediation workflows. ...Read More

TrojAI

TrojAI helps the world’s leading enterprises deploy AI agents and systems with confidence. The TrojAI security platform empowers teams to safeguard agents, applications, and models at build time and runtime. TrojAI Detect features Agent-Led AI Red Teaming to test systems before deployment. TrojAI Defend goes beyond the prompt layer to deliver runtime protection against real-time threats like prompt injection and data leakage. TrojAI Defend for MCP secures agentic workflows with visibility, policy control, and runtime protection. TrojAI delivers comprehensive security for AI at every stage. ...Read More

TrustCloud

TrustCloud is the only Security Assurance Platform that provides AI-native GRC transformation for Chief Information Security Officers. This integrates the relationship between GRC and cybersecurity for CISOs. With TrustCloud, CISOs are moving beyond low-confidence record keeping and embracing continuous control monitoring and programmatic compliance and risk assessments to prove with high-confidence that their business can operate securely, safely, and consistently. Purpose built for the Global 2000 and proven by 200+ customers in highly regulated industries. Learn more at TrustCloud.ai. ...Read More

Turbot

Turbot prevents cloud misconfigurations through automated guardrails. Preventive controls block costly mistakes, eliminate alert fatigue, reduce risk, & stop teams from chasing incidents. Turbot sits alongside your CNAPP to prevent issues at scale.

Tuskira

Tuskira's mission is to deploy a fleet of self-learning AI analysts that continuously assess and manage cybersecurity risks by transforming traditional defenses into adaptive, self-adjusting systems. These AI agents autonomously analyze AI-driven attacks and known vulnerabilities, ensuring continuous validation and optimization of defenses in real time. By continuously managing and reducing threat exposure, Tuskira aims to accelerate response times, strengthen defenses, and minimize operational costs, all while adapting to the evolving threat landscape. Learn more at www.tuskira.ai. ...Read More

TXOne Networks

Cyber threats disrupt critical industrial operations. TXOne Networks, a global OT security leader headquartered in Taiwan, delivers specialized solutions protecting assets and ensuring continuous uptime for 3600+ enterprises. With offices and partners across Europe, the Middle East, Asia, and the Americas, we empower organizations to leverage digital transformation while maintaining operational safety, security and compliance with industry regulations like NIST throughout the asset lifecycle. https://www.txone.com/ ...Read More

Venn

Venn, the leader in BYOD Security, is revolutionizing the future of remote work. We are the innovator behind Blue Border™ – the world’s first purpose-built technology that protects company data and applications on the personal or unmanaged computers used by contractors and remote employees. With Venn, you can eliminate the burden of purchasing and securing laptops or managing virtual desktops (VDI/DaaS.) Venn keeps users working locally on natively installed applications without latency – all while extending corporate firewall protection to business activity only. Learn more at www.venn.com ...Read More

VMRay

VMRay offers the most powerful threat analysis & detection platform, helping security teams to counter novel, targeted and evasive malware and phishing threats. Headquartered in Germany, VMRay operates globally and is trusted by public and private sector organizations around the world. Use Cases • SOC: Automated validation, context enrichment, and triage of alerts from EDR, XDR, SOAR, SIEM and TIP environments • CERT: Automated in-depth analysis of malware to accelerate containment and remediation • CTI: Curated threat data and context to support proactive hunting and detection engineering ...Read More

VulnCheck

VulnCheck closes the exploitation-timing gap by enabling security teams to operate on attacker timelines instead of disclosure timelines. By delivering machine-consumable, evidence-driven intelligence on when vulnerabilities become exploitable and how attackers actually use them, VulnCheck helps organizations prepare earlier, respond decisively, and verify exploitation without relying on scores or delayed consensus. ...Read More

Whistic

Whistic is the AI-first Risk Operations platform built for the teams who actually do the work. Agentic AI handles the heavy lifting across the full risk lifecycle: vendor assessments, a Trust Center Exchange network of thousands of vendor profiles, always-on monitoring of public, dark web, and SEC sources, and internal control testing that captures evidence automatically. Every alert, response, and test is logged with timestamps, so security and risk teams scale their programs, take action in one workflow, and stay audit-ready from day one. Learn more at whistic.com. ...Read More

WitnessAI

WitnessAI is the confidence layer for enterprise AI. Our unified platform provides network-level visibility and intent-based controls to govern your entire workforce, human employees and AI agents alike. We deliver runtime security for models, applications, and agents, deployable through network integration or lightweight APIs. Our single-tenant architecture ensures data sovereignty and compliance. ...Read More

Xint by Theori

What would it look like if the world's best hackers rebuilt AppSec from the ground up? It would provide the most comprehensive coverage against all vulnerability types, including the complex business logic vulnerabilities typical SAST/DAST tools miss. It would flag real vulnerabilities instead of mostly false positives. You would know what conditions trigger an exploit and what the payoff to an attacker would be so you could focus on just the vulns that matter. And it would be fast with results in hours, not weeks or months. Meet Xint: AI AppSec bringing human insight at machine speed & scale ...Read More

Xopero | GitProtect

GitProtect by Xopero is a world-leading automated and manageable backup and Disaster Recovery solution for all Jira, Bitbucket, GitHub, GitLab, Azure DevOps, and more DevOps stack data. GitProtect is the only vendor empowering customers with both granular restore and Disaster Recovery Technologies, preventing any data loss scenario - from human errors to major disruptions. Trusted by Security Teams, it helps to meet the Cloud Shared Responsibility Model, comply with security standards, and empower them with audit-ready governance, advanced reporting, and best-in-class security controls. ...Read More

Zafran Security

Zafran is an AI-native Threat Exposure Management platform that helps organizations proactively stop vulnerability exploitation. By analyzing runtime context, internet exposure, threat intelligence, and existing security controls, Zafran proves that 90% of critical vulnerabilities are not exploitable, then rapidly mitigates and remediates the 10% that truly put the business at risk. ...Read More

Zenity

Zenity secures AI agents everywhere. As the first security and governance platform purpose-built for AI agents, Zenity protects where enterprise AI risk is most critical, within the anatomy and autonomy of the agent itself - how it’s configured, what it can access, and how it acts across the modern environment. The platform unifies observability, posture management, and intent-based runtime detection with inline prevention to govern agent behavior before and during execution. Organizations gain the clarity, control, and enforcement needed to confidently operationalize AI. ...Read More

Zepo

Zepo Intelligence is a human risk management platform that transforms employee behavior into measurable security metrics through hyper-personalized, multi-vector simulations, enabling organizations to build a capable human defense layer against social engineering threats. We help organizations understand how people actually behave in the face of digital risk. Through continuous simulations, behavioral insights, and adaptive learning, we turn everyday actions into actionable intelligence, building cultures where security becomes natural. ...Read More

Zimperium

Zimperium is the world leader in AI-empowered mobile security. Purpose-built for mobile environments, Zimperium delivers unparalleled protection for mobile applications and devices, enabling organizations to stay ahead of today’s evolving threats. Learn more at www.zimperium.com.

Ready to join us in National Harbor?

Experience the Gartner difference — talk with experts, meet your peers, and turn insight into action.