2026 Conference Exhibitors

Meet the world’s leading technology and solution providers at Gartner Security & Risk Management Summit 2026, in National Harbor, MD.

Connect with cybersecurity and IT solution providers

Solution provider landscape

Learn about the current landscape as you continuously evaluate and analyze product capabilities.

Interactive sessions

Make educated investment decisions based on objective insight from Gartner case studies and thought leadership.

Solution evaluations

Compare solutions and formulate your shortlists of providers that can best help solve your mission-critical priorities.

Exhibitor connections

Gain mind share and build relationships with executives from solution provider companies.

Premier

Hear peers share their experiences with solution providers

  • “Gartner has been essential in providing valuable insights that have helped to guide our information security program. The time that is saved in doing technology and product research helps us to move quickly and be more agile.”

    James Pardonek
    CISO, Loyola University Chicago

  • “This is one of the best conferences I’ve ever been to and ... we have repeatedly come back. The ability to get actionable information which can be implemented immediately [...] and access to one-on-one conversations with analysts is unparalleled.”

    Greg Swenson
    Security Analyst, Children’s Hospital of Philadelphia

  • “I look forward to this conference every year. It is a great place to get new ideas network with peers and meet new people from other companies. I enjoy seeing all of the new vendors and new cybersecurity strategies.”

    Melissa Livesey
    Director, TVA

1 3

Platinum

“This is my second time at this conference. I came back because I got so much from the one last year. I love this conference because of the CISO Circle, which always challenges me with strategy and forward thinking, as well as the deep content knowledge that’s here from all the Gartner experts. Of course, the networking between peers — meeting old friends and making new ones — is so refreshing. Vendor selections here are just “icing on the cake.”

Terry Grogan
CISO, Tower Health

Gold

Silver

background wave background wave background wave
Conference Exhibitor Directory

Armis Inc.

Armis, the cyber exposure management & security company, protects the entire attack surface and manages an organization’s cyber risk exposure in real-time. In a rapidly evolving, perimeter-less world, Armis ensures that organizations continuously see, protect, and manage all critical assets - from the ground to the cloud. Armis secures Fortune 100, 200, and 500 companies as well as national governments, state, and local entities to help keep critical infrastructure, economies, and society safe and secure 24/7. Armis is a privately held company headquartered in California. ...Read More

Axonius

Axonius transforms asset intelligence into intelligent action. Preemptively tackle hard-to-spot threat exposures, misconfigurations, and operational inefficiencies across your entire technology footprint – all in one place. The actionability era of cybersecurity is here.

Cloudflare

Cloudflare, Inc. is the leading connectivity cloud company. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business. Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. ...Read More

CrowdStrike

CrowdStrike (NASDAQ: CRWD) a global cybersecurity leader, has redefined modern security with the world’s most advanced AI-powered, cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. CrowdStrike's Falcon platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, and elite threat hunting. ...Read More

CYERA

Cyera is a pioneer in the data security space that empowers security leaders at AT&T, Paramount, Docusign, Skechers, Nordstrom, and others, to discover their data attack surface, control the use of data, monitor, detect, and quickly remediate risk. Cyera's agentless design deploys in just five minutes across any environment - and its AI-powered classification engine auto-learns over time, and delivers 95% accuracy. With Cyera, security and data leaders can focus on enabling their business to safely use data in all the ways they see fit - both now, and into the future. Learn more at cyera.com. ...Read More

Dispel

Dispel redefines how industrial organizations connect to OT. The Dispel Zero Trust Engine establishes a secure, scalable connectivity layer across all makes, models, and generations of equipment—enabling OT secure remote access, industrial data streaming, and integrated threat monitoring, even in the most complex environments. Dispel OTFusion accelerates digital transformation by standardizing data flows and unifying fragmented OT DMZs—maximizing operational efficiency. Defense is in our DNA. Learn more at dispel.com ...Read More

KnowBe4

KnowBe4 empowers your workforce to make smarter security decisions every day. Trusted by over 70,000 organizations worldwide, KnowBe4 helps you strengthen your security culture and manage human risk. KnowBe4 offers a comprehensive AI-driven ‘best-of-suite’ platform for human risk management (HRM), creating an adaptive defense layer that fortifies user behavior against the latest cybersecurity threats. The HRM+ platform includes modules for awareness and compliance training, cloud email security, real-time security coaching, crowdsourced anti-phishing, AI Defense Agents and more. ...Read More

Mattermost Inc

Mattermost is the leading collaboration platform for mission-critical work. We serve national security, government, and critical infrastructure enterprises. We accelerate out-of-band incident response, DevSecOps workflow, mission operations, and self-sovereign collaboration to bolster the focus, adaptability and resilience of the world’s most important organizations. Vetted by the world’s leading security organizations, Mattermost is co-built with over 4,000 open source project contributors who continuous strive towards our shared vision of accelerating the world’s mission-critical work. ...Read More

Microsoft

Microsoft Security offers AI-first, end-to-end protection for identities, endpoints, apps, and clouds, providing comprehensive security in the AI era, powered by unmatched threat intelligence. 

Okta

Okta, Inc. is The World’s Identity Company™. We secure identity, so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to use the power of identity to drive security, efficiencies, and success — all while protecting their users, employees, and partners. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com. ...Read More

ReliaQuest

ReliaQuest exists to Make Security Possible. Our Agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, contain, investigate and respond in less than 5 minutes, eliminating Tier 1 & Tier 2 security operations work. GreyMatter uses data-stitching, detection-at-source, AI and automation to seamlessly connect telemetry from across cloud, multi-cloud and on-premises technologies.  ReliaQuest is the only cybersecurity technology company that delivers outcomes specific to each organization’s unique architecture, technology & business needs ...Read More

Safe Security

SAFE is redefining cyber risk management through Agentic AI. We help CISOs, cybersecurity, and TPRM leaders continuously and efficiently quantify, prioritize, and mitigate cyber risks across their entire attack surface — enabling digital growth and resilience. SAFE is the category leader in cyber risk quantification (CRQ), and the first vendor to deliver fully autonomous third-party risk management (TPRM) and continuous threat exposure management (CTEM) — empowering organizations to identify, validate, and remediate critical exposures in real time. ...Read More

Sophos

Sophos defends your organization from inevitable cyberattacks with innovative, adaptive defenses and deep security expertise. Our extensive portfolio of managed security services, comprehensive endpoint, network, email, and cloud security solutions, and industry-leading threat intelligence from Sophos X-Ops all work together and adapt to defend through the Sophos Central platform. Our AI-driven platform is embedded in the security operations of thousands of organizations globally to identify risk, automate threat defense, and stop cyberattacks. Sophos provides 24/7 cybersecurity services. ...Read More

Tenable, Inc.

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. ...Read More

ThreatLocker

Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and operational alert EDR and MDR solutions.

US AI

US AI is an Intelligent Computing and cyber-AI company specializing in securing customers' mission critical applications. Our portfolio is hosted on a FedRAMP High secure cloud. We have digitized application cyber hardening with our Archangel product. Once cyber hardened, customers' applications are then hosted in our secure cloud & monitored 24/7. AI then culls through massive amounts of log & scanning events, focusing on the truly threatening events. Once identified, we match cyber threats to the targets they seek. We then employ Gen AI to plan & deliver the solutions. ...Read More

Varonis

Varonis is the leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), AI security, identity protection, & insider risk management. Visit www.varonis.com ...Read More

Wiz

Wiz secures everything built and run in the cloud. Our platform powers a new operating model for security, development, and ops teams by providing a holistic view of risk. We give everyone clear visibility into their cloud and AI environments, enriched with context so they can prioritize what matters most. ...Read More

Abnormal AI

Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated attacks that target human vulnerability. Deploy in minutes with an API integration for Microsoft 365 or Google Workspace. Abnormal is trusted by more than 3,200 organizations, including over 20% of the Fortune 500. ...Read More

Airia

Airia is a leading Enterprise AI Orchestration Platform, empowering organizations to securely build, deploy, and manage AI solutions at scale. Our platform seamlessly integrates with existing systems and data sources to transform workflows into intelligent AI agents while upholding strict security and compliance standards. With flexible deployment options and full lifecycle management, Airia empowers teams to accelerate their AI initiatives across the organization with confidence. ...Read More

BeyondTrust

BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™ with an identity-centric approach. We are leading the charge in transforming identity security and are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners. Learn more at www.beyondtrust.com. ...Read More

Check Point

Check Point Software Technologies (www.checkpoint.com) is a global cybersecurity leader, dedicated to making the digital world safer through a prevention-first approach. The Check Point Infinity Platform combines more than 30 years of innovation and data from hundreds of millions of endpoints with AI-driven intelligent automation to stop threats before they can even enter your network. Named on Forbes' World’s Best Employers for five consecutive years and one of TIME’s 2024 World Best Companies, Check Point is trusted by the world’s leading organizations to secure their digital future. ...Read More

Claroty

Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threat detection. Backed by award-winning threat research and a breadth of technology alliances, Claroty enables organizations to effectively reduce CPS risk, with the fastest time-to-value and lower total cost of ownership. ...Read More

CyberArk Software

CyberArk is the global leader in identity security, trusted by organizations around the world to secure human and machine identities. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. Organizations can minimize operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource from anywhere. ...Read More

Darktrace

Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013 in Cambridge, UK, Darktrace provides the essential cybersecurity platform to protect organizations from unknown threats using AI that learns from each business in real-time. Darktrace’s platform and services are supported by 2,400+ employees who protect nearly 10,000 customers globally. To learn more, visit http://www.darktrace.com. ...Read More

DataBee from Comcast Technology Solutions

DataBee is an enterprise-ready security, risk, and compliance data fabric platform that helps you become more secure, compliant, and ready for what’s next. The data transformation and content engine transforms your security data to Open Cybersecurity Schema Framework (OCSF) and connects related insights to give your team business-relevant context they understand. Drive better and smarter decisions with analysis-ready datasets and an evidence-centric approach to security data. ...Read More

DigiCert

DigiCert is a leading global provider of digital trust, enabling individuals and businesses to engage online with the confidence that their footprint in the digital world is secure.DigiCert® ONE, the platform for digital trust, provides organizations with centralized visibility and control over a broad range of trust needs, securing websites, enterprise access and communication, software, identity, content and devices.DigiCert pairs its award-winning software with industry leadership in standards, support, operations, and is the digital trust provider of choice for companies around the world. ...Read More

Expel

Expel is the leading managed detection and response (MDR) provider to help expel adversaries, minimize risk, and build security resilience. Expel’s 24/7/365 coverage spans the widest breadth of attack surfaces, including cloud, with 100% transparency. We combine world-class security practitioners and our AI-driven platform, Expel Workbench™, to ingest billions of events monthly and still achieve a 23-minute critical alert MTTR. Expel augments existing programs to help customers maximize their security investments and focus on building trust—with their customers, partners, and employees. ...Read More

FASOO

Fasoo provides unstructured data security, privacy, and enterprise content management solutions. It allows organizations to protect sensitive and regulated data through data-centric security, zero trust authentication, and data lineage visualization. With advanced DSPM and DSP solutions, Fasoo offers comprehensive visibility and control across on-premises and multi-cloud environments, facilitating secure collaboration. Fasoo's ongoing commitment to customer innovation and creativity delivers market-leading solutions to the challenges faced by organizations of all sizes and industries. ...Read More

Horizon3.ai

Horizon3.ai's NodeZero® Autonomous Security Platform offers integrated threat detection, autonomous pentesting, third-party risk management, and comprehensive governance, risk, and compliance (GRC) through NodeZero Insights™. It enhances organizational security by proactively identifying and remediating exploitable vulnerabilities, while strategically deploying deception and threat detection through NodeZero Tripwires™. Founded in 2019 by former industry leaders and U.S. National Security veterans, Horizon3.ai is at the forefront of cybersecurity innovation. ...Read More

Island

Island, the Enterprise Browser is the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders of enterprise security and backed by leading venture funds, Island is redefining the future of work for some of the largest, most respected enterprises in the world. ...Read More

Kroll

As the leader in cyber and data resilience, we merge our elite security and data risk expertise with frontline intelligence from thousands of IR cases handled per year, regulatory compliance, financial crime and due diligence engagements to make our clients more resilient. We combine this with over 650+ experts with background experience in law enforcement, industry and regulatory agencies to help you establish efficient, sustainable solutions to complex and persistent cyber and data resilience issues. ...Read More

Lenovo

Lenovo is a US$50 billion Fortune Global 500 company serving customers in 180 markets around the world. Focused on a bold vision to deliver smarter technology for all, we are developing world-changing technologies that power (through devices and infrastructure) and empower (through solutions, services, and software) millions of customers every day and together create a more inclusive, trustworthy and sustainable digital society for everyone, everywhere. To find out more visit https://www.lenovo.com and read about the latest news via our StoryHub at http://storyhub.lenovo.com/. ...Read More

LogicGate

LogicGate delivers modern, enterprise-grade GRC expertise through automated workflows, real-time insights, and AI-driven features. Risk Cloud, our flexible no-code platform, offers 40+ purpose-built solutions for rapid deployment and custom enterprise workflows. Seamlessly integrating with leading technologies, it streamlines risk reporting, compliance, and operational resiliency. By providing accurate, contextual data, LogicGate empowers GRC leaders to minimize risk and make strategic, data-driven decisions. ...Read More

ManageEngine

ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and MSPs. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT. ...Read More

Menlo

With Menlo Security, you don’t have to settle, and you don’t have to replace the browser that your users, partners, and contractors are working with now. With Menlo, there’s no new software to deploy, no browser versions to manage, and no need to miss out on the latest integrations from leading vendors. All the performance, innovative security, and application access capabilities you need. That’s the Menlo Secure Enterprise Browser solution. ...Read More

Mimecast

Mimecast advances security for the collaborative world with an AI-powered human risk platform purpose-built to protect organizations from the spectrum of cyber threats. Our technology integrates with human-centric pathways, enhances visibility and provides strategic insight that enables decisive action – empowering businesses to protect their collaborative environments, safeguard critical data and reduce external and internal risk. ​ ...Read More

MIND

MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management programs on autopilot to autonomously find, fix and stop data security issues in this AI era. MIND reimagines data security to deliver both posture and prevention – protecting data at rest, in motion and in use. With the MIND AI multi-layer classification engine, real-time detection and automated prevention and remediation, MIND enables enterprises to build effective data security programs with minimal headcount. ...Read More

Netskope

Netskope is a leader in modern security, networking, and analytics. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity. ...Read More

OpenText

OpenText™ is the leading Information Management software and services company in the world, delivering the only complete, fully connected IT Operations solutions—all powered by OpenText’s smarter AI, automation, and cloud flexibility. The OpenText™ Observability and Service Management Cloud is a composable platform unifying service management, AIOps, observability, automation, CMDB, and asset management, cuts the cost and complexity to transform the way you work. You can reveal assets accurately, resolve problems faster, and reduce operational waste. Operational freedom is your new normal. ...Read More

Proofpoint

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. ...Read More

Rapid7

Rapid7 is creating a more secure digital future by helping organisations strengthen their security programmes. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape. We foster open source communities and cutting-edge research–using these insights to optimise our products and arm the security community with the latest in attacker methodology. More than 10,000 customers worldwide trust our industry-leading solutions and services to stay ahead of attackers and ready for what’s next. ...Read More

Recorded Future

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape. ...Read More

SecurityScorecard

SecurityScorecard delivers the world's most powerful, AI-driven platform that identifies cyber risk across all attack surfaces. Powered by the largest proprietary risk & threat intelligence dataset on the planet, SecurityScorecard takes customers from risk identification to resolution. With the world's most trusted security ratings and AI-powered analytics, SecurityScorecard is trusted by 70,000 global enterprises and 70% of the Fortune 1000. Visit securityscorecard.com for details. ...Read More

SentinelOne

SentinelOne (NYSE:S) is the world’s most advanced, autonomous AI-powered cybersecurity platform. Built on the first unified Data Lake, SentinelOne empowers the world to run securely by creating intelligent, data-driven systems that think for themselves, stay ahead of complexity and risk, and evolve on their own. Leading enterprises around the world trust SentinelOne to Secure Tomorrow™. ...Read More

Snyk

Snyk is a developer-first security company that helps software-driven businesses develop fast and stay secure. Snyk gives you the visibility, context, and control you need to work alongside developers on reducing application risk. Snyk is securing industry leaders such as Google, Salesforce, Asos and Asurion. For more information or to get started with Snyk for free, visit https://snyk.io. ...Read More

StrongDM

StrongDM's Zero Trust PAM platform delivers accuracy, precision, and agility in managing privileged actions across any infrastructure. It enables seamless, secure access to resources necessary for users’ tasks, reducing attack surfaces by limiting unsanctioned actions and excess privileges through on-demand access. Continuous assessment and instant mitigation ensure continuous compliance. For more information, visit the StrongDM website. ...Read More

Tanium Inc.

Tanium Inc: Gestão Inteligente de Endpoints Tanium Autonomous Endpoint Management (AEM) é a mais completa solução para gestão autônoma de endpoints de forma inteligente e integrada em tempo real. Com funcionalidades como descoberta de ativos, complience, gestão de vulnerabilidades e riscos, conformidade e resposta a incidentes, além de aprimorar a experiência digital dos colaboradores, a Tanium protege mais de 34 milhões de endpoints no mundo todo, incluindo 40% da Fortune 100. Segurança em escala. Eficiência com confiança. https://www.tanium.com/ ...Read More

Trustwave

Global cybersecurity leader, Trustwave, reduces risk & fortifies organizations against advanced threats. Our AI-driven MDR, DFIR, advisory, pen testing, and data security services —powered by elite SpiderLabs threat intelligence—detect what others miss, respond fast, & optimize cyber investments. As the only pure-play MDR provider meeting FedRAMP & StateRAMP, we deliver unmatched protection for regulated industries. We align with UK GDPR, NIS, and the Cyber Security & Resilience Bill to help CISOs ensure compliance and lead with confidence. ...Read More

Veza

Veza is the identity security company, helping organizations secure access across the enterprise, including cloud infrastructure, data systems, SaaS apps, and on-prem apps. Powered by the Authorization Graph, Veza’s platform delivers visibility and control of permissions so that organizations finally achieve least privilege. Global enterprises like Wynn Resorts, Expedia and CrowdStrike trust Veza for privileged access monitoring, cloud access management, data lake governance, SaaS access security, automated access reviews and access, and identity provisioning. ...Read More

Zscaler

We accelerate digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. ...Read More

7AI, Inc.

7AI is igniting a revolution in agentic security, empowering defenders with a swarming arsenal of AI agents to reclaim the advantage against relentless cyber threats. With the industry’s first marketplace of specialized AI security agents, 7AI redefines enterprise security, delivering outcomes that let teams move from reactive firefighting to proactive defense. Our platform doesn’t just accelerate workflows—it transforms them, enabling organizations to operationalize AI for tailored, precise, and relentless protection. ...Read More

Airlock Digital

Airlock Digital Application Control is an enterprise-scalable “Deny by Default” solution designed to provide organizations with precision execution control, reducing the risk of malware, ransomware, and unauthorized applications across IT and OT environments. Built by cybersecurity professionals, Airlock Digital is engineered for efficiency, scalability, and ease of management, ensuring organizations can enforce strict security policies without operational friction. ...Read More

AppOmni

AppOmni, the leader in SaaS Security, helps customers achieve secure productivity with their applications. Security teams and owners can quickly detect and mitigate threats using unmatched depth of protection, continuous monitoring, and comprehensive visibility. Trusted by over 4 of the Fortune 10, AppOmni specializes in securing diverse SaaS environments. ...Read More

Archer

For over two decades, Archer has been at the forefront of risk and compliance innovation, offering organizations the tools and insights needed to build resilient, high-performing businesses. Archer’s advanced solutions leverage artificial intelligence, risk quantification, and integrated approaches, enabling enterprises to confidently address emerging risks while driving strategic value. To learn more about Archer, visit www.archerirm.com/archer-evolv. ...Read More

AvePoint

Securing the Future. AvePoint is the global leader in data management and data governance, and over 21,000 customers worldwide rely on our solutions to secure the digital workplace across Microsoft, Google, Salesforce, and other cloud environments. AvePoint's global partner program includes over 3,500 managed service providers, value-added resellers, and systems integrators, with our solutions available in more than 100 cloud marketplaces. To learn more, visit www.avepoint.com. ...Read More

Beyond Identity

A leader in access security, Beyond Identity is committed to delivering a secure identity platform that accelerates productivity. Beyond Identity offers advanced solutions trusted by industry-leading organizations like Snowflake, Charlotte Hornets, the City of Albany, and Cornell University to eliminate access risks, promote zero-trust strategies, and deliver safe and efficient digital experiences for customers, employees, partners, and contractors. Learn more at beyondidentity.com. ...Read More

BlackCloak, Inc.

BlackCloak protects the personal devices, home networks and digital footprints of executives and key personnel to prevent security vulnerabilities exposing the organization to risk. Used by Fortune 500 companies, the BlackCloak Concierge Cybersecurity & Privacy™ Platform is a holistic solution including mobile and desktop apps and concierge support. Every solution is meticulously tailored and implemented with discretion, delivering high levels of personalized service and protection, without burdening internal resources. ...Read More

Checkmarx

Checkmarx helps the world’s largest enterprises get ahead of application risk without slowing down development. We end the guesswork by identifying the most critical issues to fix and give AppSec the tools they need, all while letting developers work the way they want. From DevSecOps to developer experience, security and development teams can now work better together. That’s why 1700+ customers rely on Checkmarx to scan over 1 trillion lines of code annually, improve developer productivity by 50%, and deliver 2X AppSec ROI. ...Read More

Cohesity

Cohesity is the leader in AI-powered data security. Over 12,000 enterprise customers, including over 85 of the Fortune 100 and nearly 70% of the Global 500, rely on Cohesity to strengthen their resilience while providing Gen AI insights into their vast amounts of data. Formed from the combination of Cohesity with Veritas’ enterprise data protection business, the company’s solutions secure and protect data on-premises, in the cloud, and at the edge. ...Read More

Concentric AI

Concentric AI is intelligent data security made easy. Our platform discovers, classifies, and protects data across cloud and on-premises environments. With AI-driven insights and co-managed services, we help businesses reduce risk, streamline compliance, and eliminate duplicate data records—transforming data from a liability into a well-managed asset. ...Read More

Cranium

As the foremost enterprise AI security and trust software firm, Cranium empowers organizations to ensure the security and compliance of their AI and GenAI systems. The Cranium Enterprise software platform offers comprehensive solutions for driving visibility, security, and governance across all AI and GenAI environments. Secure your enterprise’s AI today with Cranium.AI. ...Read More

Cymulate

Cymulate, the leader in exposure management and security validation, provides a modular platform for continuously assessing, testing, and improving cybersecurity resilience — before an attack occurs. More than 500 customers worldwide rely on Cymulate to drive their threat exposure management programs from scoping through discovery, prioritization, validation, and mobilization. The platform automates the attacker’s perspective to help organizations of all sizes understand threat exposure, how controls and processes respond to threats, and the improvements to mitigate exposure risk. ...Read More

Delinea

With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams’ adoption by deploying in weeks, not months, and makes them more productive by requiring 90% fewer resources to manage than the nearest competitor. With a guaranteed 99.99% uptime, the Delinea Platform is the most reliable identity security solution available. ...Read More

Dragos

Dragos provides the most effective OT cybersecurity technology for industrial and critical infrastructure to deliver on our global mission: to safeguard civilisation. With real-world experience handling landmark OT attacks, Dragos understands the complexity of industrial operations. The Dragos Platform provides advanced OT network visibility and monitoring of OT environments for asset identification, vulnerability management, and threat detection with continuous insights generated by the industry’s most experienced OT threat intelligence and services team. ...Read More

DTEX Systems

As the trusted leader of insider risk management, DTEX transforms enterprise security by displacing reactive tools with a proactive solution that stops insider risks from becoming data breaches. DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforce. Backed by behavioral science, powered by AI, and used by governments and organizations around the world, DTEX is the trusted authority for protecting data and people at scale with privacy by design. ...Read More

Elisity

Elisity redefines network segmentation to accelerate Zero Trust maturity, reduce risk, and simplify enterprise networks. Deployed in days with no downtime, it discovers all devices and builds the Elisity IdentityGraph™ to automate classification and apply identity-based microsegmentation policies. Managed in the cloud and enforced via existing infrastructure, policies are applied in real time—even to ephemeral IT/IoT/OT devices. Founded in 2019, Elisity serves a global base, including Fortune 500 companies. ...Read More

ExtraHop

ExtraHop empowers enterprises to stay ahead of evolving threats with the most comprehensive approach to network detection and response (NDR). By uniquely combining NDR, network performance management, intrusion detection, and packet forensics in a single, integrated console, customers gain complete network visibility and unparalleled context that supports data-driven security decisions. ...Read More

GTB Technologies

With a focus on delivering the best-in-class protection, GTB’s comprehensive platform of advanced features and capabilities, embodied in its “Get the Best™” approach, ensures that organizations receive unmatched security and peace of mind. GTB stands out as a leader in providing unparalleled protection for intellectual property and sensitive data in the age of AI and is the premier choice for organizations seeking robust solutions to safeguard their valuable IP assets including all sensitive data. Explore GTB Technologies, learn how to strengthen your cybersecurity & enhance your DLP defenses. ...Read More

Guardare

Guardare's AI-powered platform automates complex cybersecurity tasks, providing actionable insights and streamlining compliance efforts, enabling organizations to achieve and maintain strong security with limited dedicated security resources. Our platform harnesses AI to provide contextual insights into how your organization’s assets interact, accurately assessing fluctuating risk levels. This enables administrators to prioritize and address critical security issues, such as patches, application vulnerabilities, misconfigurations, and insecure protocols, services, and ports, among others. ...Read More

HackerOne

HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. ...Read More

Hoxhunt

Hoxhunt is the Human Risk Management Platform that lets security teams and employees join forces to behave securely and fight social engineering attacks. Combining AI with behavioral science, Hoxhunt’s adaptive phishing training meets people where they’re at with personalized training for unparalleled reach. Hoxhunt transforms security culture with measurable behavior change beyond social engineering, too. Hoxhunt gives security teams real-time visibility into threats, with AI that does the heavy lifting on threat analysis to augment incident response and reduce risk. ...Read More

Hyperproof

Hyperproof is a risk and compliance management platform that empowers IT, security, and compliance teams to automate and scale their workflows without the burden of jumping between multiple legacy platforms and spreadsheets. The Hyperproof platform enables teams to get complete visibility into their organizational risks, streamline the audit process, and reduce their ever-growing compliance workloads. Hyperproof is trusted by leading organizations like Veeva Systems, Fortinet, Appian, Outreach, and Thales. ...Read More

Infoblox

Infoblox unites networking, security and cloud to form a platform for operations that’s as resilient as it is agile. Trusted by 13,000+ customers, we seamlessly integrate, secure and automate critical network services so businesses can move fast without compromise. Our DDI (DNS, DHCP and IPAM) solutions deliver unmatched performance and control across hybrid, multi-cloud environments, while our security solutions stop threats at the DNS layer, providing protection everywhere. The result? A smarter, more secure platform—built for the way organizations work today and ready for what’s next. ...Read More

NinjaOne

NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower IT costs. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support. ...Read More

Pathlock

Unlike traditional risk, audit, and security systems, Pathlock continuously monitors transactions across all enterprise applications where sensitive activities and data are concentrated. It surfaces actual violations, not theoretical possibilities. With Pathlock as the hub, all lines of defense work together to make informed decisions. Founded as Greenlight Technologies, we became the only solution endorsed by SAP that extends SAP Access Control to cloud and non-SAP systems. Today, we are the leader in application security and controls automation, serving customers worldwide. ...Read More

Pentera

Pentera is the global leader in Automated Security Validation, trusted by cybersecurity professionals in over 1000 organizations and service providers across more than 60 countries. Pentera’s platform empowers organizations to proactively test their complete attack surface against the latest cyber attacks and guides remediation priorities based on true and proven risk. Pentera provides the centerpiece of Continuous Threat Exposure Management operations at any scale. With Pentera, enterprises can effectively identify and reduce security exposure and improve their security teams' efficiency. ...Read More

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom. We let enterprises combine our best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between. This is all made possible using our simple drag-and-drop canvas. That’s why more than half of the Fortune 100 choose Ping Identity to protect digital interactions from their users while making experiences frictionless. ...Read More

RegScale

RegScale’s Continuous Controls Monitoring (CCM) platform streamlines GRC by bridging security, risk, and compliance with AI-driven automation. The platform reduces costs, accelerates certifications, and integrates compliance into DevSecOps. Organizations using RegScale achieve up to 90% faster certifications and 60% less audit prep effort, enhancing risk management and improving ROI. Recognized as the Best Compliance Solution by SC Awards, RegScale leads in transforming GRC efficiency. ...Read More

Rubrik

Rubrik (NYSE: RBRK) is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organisations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organisations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked. ...Read More

SailPoint Technologies

SailPoint equips the modern enterprise to seamlessly manage and secure access to applications and data through the lens of identity – at speed and scale. SailPoint delivers a unified, intelligent, extensible platform built to defend against today’s dynamic, identity-centric cyber threats while enhancing productivity and efficiency.  ...Read More

Sectigo

Sectigo is the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), with automated solutions and digital certificates that secure every human and machine identity for the world’s largest brands. Its automated, cloud-native, universal CLM platform issues and manages digital certificates provided by all trusted certificate authorities (CAs) to simplify and improve security protocols across the enterprise. Sectigo is one of the longest-standing and largest CAs with more than 700,000 customers and two decades of delivering unparalleled digital trust. ...Read More

Semperis, Inc.

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing Active Directory, Semperis’ patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. ...Read More

Sentra

Sentra is the global leader in cloud-native data security for the AI era. The company’s mission is to empower organizations to confidently scale their data operations across multi-cloud and on-premises environments while leveraging the power of AI without compromising security. Sentra ensures data is secured no matter where it travels by automatically detecting privacy and security risks, misconfigurations, over-permissions, unauthorized access, data duplication and other security issues. ...Read More

Specter Ops

SpecterOps is a leader in Identity risk reduction. Possessing deep knowledge of adversary tradecraft, the company enables organisations to detect and remove critical attack paths before attackers can act – a practice called Attack Path Management. SpecterOps maintains widely used open-source security toolsets including BloodHound, the company’s foundational tool that enables Attack Path Management in Active Directory & Entra ID. BloodHound Enterprise is the company's managed SaaS, allowing for attack path prioritization, remediation guidance and reporting to show improvement over time. ...Read More

Sublime Security

Sublime Security is the adaptive, AI-powered cloud email security platform that combines best-in-class effectiveness with unprecedented visibility and control. The open platform allows security teams to have transparency and flexibility in their email environment to spend less time on email-originated incidents. Advanced teams can customize detections, threat hunt, extend Sublime into their SIEM or SOAR, and collaborate with other teams. Deploy Sublime Core for free or Sublime Enterprise at https://sublime.security/start ...Read More

Synack

Synack’s Penetration Testing as a Service platform manages customers’ attack surfaces by discovering new assets, pentesting for critical vulnerabilities and gaining visibility into the root causes of security risks. We are committed to making the world more secure by harnessing a talented, vetted community of security researchers to deliver continuous penetration testing and vulnerability management, with actionable results. Synack's PTaaS platform has uncovered more than 83,500 exploitable vulnerabilities to date. For more information, please visit www.synack.com. ...Read More

Sysdig

For businesses innovating in the cloud, every second counts. Sysdig strengthens cyber resilience by reducing the attack surface, detecting threats in real time, and accelerating incident response. Our platform correlates signals across cloud workloads, identities, and services to enable teams to prioritize risks and act decisively. Sysdig. Secure Every Second. ...Read More

Thales

Thales is a global leader in cybersecurity, helping the most trusted organizations protect critical applications, data, identities, and software anywhere, at scale. Through Thales’ integrated platforms, customers achieve better visibility of risks, defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day. ...Read More

Veracode

Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans & a proprietary AI-assisted remediation engine, the Veracode platform offers adaptive software security & is trusted by organizations worldwide to build & maintain secure software from code creation to cloud deployment. Thousands of the world’s leading development & security teams use Veracode to get accurate, actionable visibility of exploitable risk, achieve real-time vulnerability remediation, & reduce their security debt at scale. ...Read More

XM Cyber

XM Cyber is a leader in hybrid cloud exposure management that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. ...Read More

Yubico

Yubico (Nasdaq First North Growth Market Stockholm: YUBICO) is the inventor of the YubiKey, the gold standard in phishing-resistant multi-factor authentication (MFA), and a creator and contributor to FIDO open authentication standards. The company is a pioneer in delivering hardware-based passwordless authentication using the highest assurance passkeys to customers in 160+ countries. For more information, visit: www.yubico.com. ...Read More

Zero Networks

Founded in 2019, Zero Networks provides cloud-based network security solutions that enforce a zero-trust network architecture. Offered on a single platform and UI, the Zero Networks product suite enables full East/West and North/South network security, for enterprises of any size, via micro-segmentation and advanced ZTNA solutions. Easy to deploy and with fully automated rule and policy creation, Zero Networks is making true Zero Trust architecture a reality. Zero Networks is funded by Pico Venture Partners, F2 Capital and leading security luminaries. ...Read More

1Kosmos

1Kosmos enables remote identity verification and passwordless multi-factor authentication for workers, customers and residents to securely transact with digital services. By unifying identity proofing, credential verification and strong authentication, the 1Kosmos platform prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences and preserving the privacy of users’ personal information. ...Read More

Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. ...Read More

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect malicious activity inside perimeter in an accurate and timely manner. Acalvio's Distributed Deception platform, ShadowPlex is based on patented innovations. Acalvio is based in Silicon Valley and is backed by marquee investors. ...Read More

apexanalytix

apexanalytix delivers enterprise risk resolution with touchless onboarding, auto-acting risk management and profit recovery outcomes. Over 300 of the world’s largest companies protect more than $9T in annual spend with the apexanalytix platform. Powered by Private Generative AI, 100M+ golden records, and integrated global data sources, organizations collaborate with suppliers and customers to build trust, create value, and resolve complex risk. Founded in 1988, apexanalytix has a proven history of enterprise risk resolution. Visit www.apexanalytix.com for more information. ...Read More

Appknox

Appknox proudly stands as a leader, securing its position in the Gartner Magic Quadrant for Voice of Customer 2023 as we continue to redefine industry standards. Offering dynamic Static Application Security Testing(SAST), automated Dynamic Application Security Testing(DAST), and robust API testing, Appknox ensures comprehensive vulnerability assessment for mobile applications. Additional features like Software Bill of Materials(SBOM) and Drift detection make the Appknox security suite comprehensive. Leading businesses across the world trust Appknox for unparalleled mobile application security. ...Read More

Aqua Security

Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated Cloud Native Application Protection Platform (CNAPP). From software supply chain security for developers to cloud security and runtime protection for security teams, Aqua helps customers reduce risk while building the future of their businesses. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL protecting over 500 of the world’s largest enterprises. For more information, visit https://www.aquasec.com. ...Read More

Bitdefender

Bitdefender provides cybersecurity solutions with leading security efficacy, performance, and ease of use to enterprise organizations and consumers. Guided by a vision to be the world’s most trusted cybersecurity solutions provider, Bitdefender is committed to defending organizations and individuals around the globe against cyberattacks to transform and improve their digital experience. For more information, visit https://www.bitdefender.com. ...Read More

Black Duck Software Ltd

Black Duck now defines the next frontier of application security. Thanks to expanding regulatory pressure combined with the avalanche of new code generated by AI, the world has moved beyond “good enough” find-and-fix tools, offloading security with a shift-left approach, or CI/CD where security is an afterthought. Black Duck provides solutions built to handle the scale, speed, and regulatory pressures of the new software world. Black Duck meets the demands of modern business with True Scale Application Security, ensuring uncompromised trust in software for the regulated, AI-powered world. ...Read More

Black Kite

One in four organizations suffered from a cyber attack in the last year, resulting in production, reputation and financial losses. The real problem is adversaries attack companies via third parties, island-hopping their way into target organizations. At Black Kite, we are driving innovation in third-party risk management (TPRM) with a cyber ecosystem risk intelligence platform built on Accuracy, Speed, Transparency, and Collaboration. Our innovations empower organizations to make informed decisions, respond to risks with agility, and build a more resilient cyber supply chain. ...Read More

CDW

CDW Corporation is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada. A Fortune 500 company and member of the S&P 500 Index, CDW helps its customers to navigate an increasingly complex IT market and maximize return on their technology investments. Our broad array of products and services range from hardware and software to integrated IT solutions such as security, cloud, hybrid infrastructure and digital experience. ...Read More

Cloud Range

Cloud Range, the leading cyber range-as-a-service, measurably decreases exposure to cyber risk and overcomes the staggering cyber skills gap by preparing cybersecurity teams to defend against complex attacks through a customized, full-service, simulation-based cyber attack training program, including live-fire team-based simulations (blue, red, and purple teams, and CTF exercises), IT/OT/IoT/cloud environments, skill development labs, assessments, advanced tabletop exercises, reporting, and more. ...Read More

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Customers use Cribl’s vendor-agnostic solutions to analyze, collect, process, and route all IT and security telemetry data from any source or to any destination, delivering the choice, control, and flexibility required to adapt to their ever-changing needs. ...Read More

Crogl

Crogl analyzes every alert and documents every action. Our customers reduce risk and cut costs by enabling analysts to investigate alerts and threat hunt with consistency, speed, and depth—using the tools they already have. It learns from your environment, generates adaptive response plans, and documents every action without requiring schema normalization. Crogl is fully customer-managed, runs securely in the cloud or air-gapped environments, and keeps all data private. It’s the compound AI system that modern security operations demand. ...Read More

CSC

CSC is the trusted security and threat intelligence provider of choice for the Forbes Global 2000 and the 100 Best Global Brands® with focus areas in domain security and management, along with digital brand and fraud protection. CSC is a global company capable of doing business wherever our clients are—and we accomplish that by employing experts in every business we serve. Visit cscdbs.com. ...Read More

Cyberhaven

Cyberhaven is the AI-powered data security company revolutionizing how companies detect and stop the most critical insider threats to their most important data. Until now, data security products were limited to scanning data content and looking for specific user actions. Our AI technology analyzes billions of workflows to understand every piece of data within an organization, when it's at risk, and takes action to protect it. It's like nothing that's come before and protects data like nothing else. ...Read More

CyberSagacity

CyberSagacity delivers next-gen ASPM solutions that align software security with enterprise GRC objectives. Our platform reduces cyber risk, enhances regulatory readiness, and secures development—while accelerating delivery and maximizing DevSecOps ROI. Leveraging advanced analytics, financial risk modeling, and compliance mapping, we identify and prioritize high-impact flaws. We align findings to mandates like PCI-DSS, Zero Trust, and HIPAA, while enabling continuous, policy-driven governance across CI/CD pipelines. Stay ahead—without slowing down. ...Read More

Forescout Technologies, Inc.

Forescout Technologies, Inc. continuously identifies, protects and ensures the compliance of all managed and unmanaged cyber assets – IT, IoT, IoMT and OT. Fortune 100 organizations and government agencies trust Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout Platform delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats. ...Read More

Graylog

Graylog empowers security teams with cutting-edge, scalable solutions that make threat detection, investigation, and response (TDIR) faster, smarter, and more efficient—keeping organizations ahead of ever-evolving cyber threats. Trusted by over 50,000 organizations worldwide, Graylog combines machine learning for anomaly detection, real-time monitoring, and AI-assisted investigation tools to help teams streamline workflows, reduce alert fatigue, and optimize security operations—all while keeping costs in check. ...Read More

Harness

Harness is the leading AI-native platform for complete software delivery. It provides a simple, safe, and secure way for engineering and DevOps teams to release applications into production. Harness uses AI and machine learning to monitor the quality of deployments and automatically roll back failed ones, saving time and reducing the need for custom scripting and manual oversight, giving engineers their nights and weekends back. Harness is headquartered in San Francisco, and is backed by industry-leading investors like Menlo Ventures, IVP, Unusual Ventures, and Citi Ventures. ...Read More

IDMWORKS

IDMWORKS is the industry standard in IAM assessment, strategy, implementation, and management for organizations looking to improve their identity programs. Our Gartner-recognized approach has delivered over 4000 successful identity transformations across 850 client sites supporting everything from internal IAM programs to highly complex integrated workforce and CIAM transformations. IDMWORKS’ Managed Identity provides an effective solution to host and support day-to-day IAM service delivery without the overhead and complexity involved in internal IAM personnel. ...Read More

IONIX

IONIX Exposure Management protects enterprises’ external attack surface from cyber risks & increases security team efficiency by providing tools that shorten the time to discover & prioritize exposures. IONIX reduces the exploitable attack surface by discovering every internet-facing asset, assessing dependencies & connections, & validating exploitable risks to prioritize remediation of critical, impactful exposures. IONIX reduces alert fatigue, streamlines the process for resolving alerts & ensures they reach the right team. ...Read More

ISARA

ISARA Corporation develops quantum computing readiness solutions to bring post-quantum security and resiliency to your mission-critical workloads. Our cryptographic posture management solution mitigates your data harvesting risk and reduces your attack surface by uncovering your actively used algorithms, identifying vulnerabilities, and providing clear risk-based prioritizations. Take action to secure your crucial IT, embedded, and OT systems against quantum threats with ISARA’s production grade toolkit of standardized quantum-safe algorithms. ...Read More

Lineaje

Lineaje provides Continuous Software Supply Chain Security Management solutions. Lineaje launched novel suite of products to detect, prevent, and automate the remediation of software supply chain threats. Lineaje provides comprehensive visibility into the software supply chain, enabling organizations to proactively manage and eliminate risks by “fixing” insecure or risky open-source and applying comprehensive security measures through AI-driven automation. ...Read More

Mesh Security

Mesh empowers enterprises with a unified security platform that unlocks full context, visibility, and control across identities, endpoints, data, multi-cloud, SaaS, CI/CD, and networks. By integrating seamlessly in minutes, Mesh transforms disjointed tools and data into a real-time, adaptive defense—optimizing ROI, lowering TCO, and cutting MTTD/MTTR from days to seconds. Mesh serves as the execution layer for modern security—shifting from human-driven context to machine-led, autonomous defense at scale. ...Read More

Mimic

While ransomware continues to evolve, Mimic takes a fundamentally different approach — neutralizing threats before they cause damage to your critical applications. Our platform deflects ransomware, insider threats, and zero-days instantly, creating a deceptive environment where attackers believe they've succeeded. ...Read More

Netwrix Corporation

Netwrix empowers security professionals to face digital threats with confidence by enabling them to identify and protect sensitive data as well as to detect, respond to, and recover from attacks. More than 13,500 organizations across 100+ countries rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity, and infrastructure. By reducing the cybersecurity burden with Netwrix, organizations concentrate on advancing their cause while reducing cyber risk. For more information, visit www.netwrix.com ...Read More

Nokod Security

Nokod Security delivers security for no-code, RPA, and AI application development, addressing critical gaps left by traditional application security tools. Applications and automations developed on no-code and RPA platforms like Microsoft Power Apps, UiPath, ServiceNow, and Salesforce introduce severe vulnerabilities, including data leakage, secrets exposure, and supply chain threats. Nokod offers a comprehensive platform for this new attack surface that automatically discovers no-code apps and RPAs, detects risks and vulnerabilities, gives remediation guidance, and ensures compliance. ...Read More

Nucleus Security

Nucleus Security is the enterprise leader in unified vulnerability management. The Nucleus Security Platform enables organizations to prioritize and mitigate vulnerabilities faster, at scale.  Powered by the Nucleus Data Core, the platform automatically unifies, organizes, and operationalizes finding, threat, and business, data from all your tools. Nucleus features world-class vulnerability intelligence feeds, built-in business context, and dynamic ownership assignment empowering teams to effectively automate their vulnerability management programs.  ...Read More

Oleria

Oleria, a visionary leader in identity security, helps organizations accelerate at the pace of change, trusting that their data is protected. Oleria Identity Security, provides deep visibility into security posture, identifying and mitigating access risks before they can be exploited. Oleria ingests permissions and access data for all identities (human, non-human, AI) across all connected applications and infrastructure (SaaS, Cloud, On-Prem) - whether centrally or decentrally managed - providing a single place for understanding behavior and managing access. ...Read More

Ontinue

Ontinue is the only Microsoft-specialised MDR provider combining AI-driven autonomous investigation, tailored response automation, and 24/7 protection. Integrated with Microsoft 365 Defender and Sentinel, Ontinue resolves 99% of threats autonomously and accelerates investigation by 50%. Its platform reduces alert fatigue, optimises SecOps workflows, and strengthens posture through continuous threat mitigation and real-time collaboration via Microsoft Teams. ...Read More

PhishingBox

PhishingBox is a web-based platform for organizations to conduct phishing simulations and cybersecurity training. This helps identify vulnerabilities and mitigate human risk. Our simple-to-use, cost-effective solution helps organizations achieve cybersecurity objectives.

ProcessUnity

ProcessUnity is the Third-Party Risk Management (TPRM) company. Our software platforms and data services protect customers from cybersecurity threats, breaches, and outages that originate from their ever-growing ecosystem of business partners. By combining the world’s largest third-party risk data exchange, the leading TPRM workflow platform, and powerful artificial intelligence, ProcessUnity extends third-party risk, procurement, and cybersecurity teams so they can cover their entire vendor portfolio. ...Read More

Push Security

Attackers aren’t hacking in anymore, they’re logging in. Compromised identities are now the #1 cause of all reported breaches. Push Security stops identity attacks and secures your identity perimeter. Push is the industry’s first identity security platform that uses a browser extension to discover, monitor and defend workforce identities. Think of Push as being like EDR, but for your identities. Security teams use Push to map their identity attack surface, detect and respond to identity attacks in real time, and improve their overall identity security posture. ...Read More

Ridge Security

Ridge Security is a leader in exposure management and is dedicated to developing innovative cybersecurity products that benefit CISOs and security teams by reducing risk through validation and using automation to improve efficiencies. Ridge Security’s products incorporate advanced artificial intelligence to deliver comprehensive security validation, powerful workload protection and cloud security monitoring. ...Read More

SALT SECURITY

Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is the only API security solution that combines cloud-scale big data and ML/AI for protection across the full lifecycle of APIs. By correlating activities across millions of APIs and users, Salt delivers deep context with real-time analysis and continuous insights for API discovery, attack prevention, and hardening APIs. The Salt platform gives customers immediate value and protection, so they can innovate with confidence and accelerate their digital transformation initiatives. ...Read More

Saviynt

Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognized as an industry leader in identity security whose cutting-edge solutions protect the world’s leading brands, Fortune 500 companies and government organizations. For more information, please visit www.saviynt.com. ...Read More

Silverfort

Silverfort secures every dimension of identity. We are the first to deliver an end-to-end identity security platform that is easy to deploy and won't disrupt business operations, resulting in better security outcomes with less work. Discover every identity across every environment, analyze exposures to reduce your attack surfaces, and enforce security controls inline to stop lateral movement, ransomware, and other identity threats. silverfort.com ...Read More

Thinkst Canary

Most companies discover they've been breached way too late. Thinkst Canary fixes this: just 2 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Canaries are deployed and loved on all 7 continents... https://canary.tools/love ...Read More

Tidal Cyber

Stop guessing and know your defenses with Tidal Cyber's Threat-Informed Defense platform. Data-driven visibility organizes defensive coverage from your existing security stack, then overlays threat intelligence to calculate risk reductions from your currently deployed security tools with coverage maps showing residual risk. Additionally, our recommendations engine shows how to do more with existing resources by configuring existing tools to get the most coverage from relevant threats and protect from any security gaps. ...Read More

TrojAI

TrojAI helps the world’s leading enterprises secure the behavior of their AI/ML and GenAI models and applications. Our best-in-class AI security platform empowers enterprises to safeguard AI models and applications at both build time and run time. TrojAI Detect automatically red teams AI models during development, providing remediation guidance at build time. TrojAI Defend acts as a firewall for AI to protect against real-time threats. With comprehensive security at every stage, TrojAI ensures robust protection for AI models and applications. ...Read More

TXOne Networks

Cyber threats disrupt critical industrial operations. TXOne Networks, a global OT security leader headquartered in Taiwan, delivers specialized solutions protecting assets and ensuring continuous uptime for 3600+ enterprises. With offices and partners across Europe, the Middle East, Asia, and the Americas, we empower organizations to leverage digital transformation while maintaining operational safety, security and compliance with industry regulations like NIST throughout the asset lifecycle. https://www.txone.com/ ...Read More

Vectra AI

Vectra AI, Inc. is the cybersecurity AI company that protects modern networks from modern attacks. When modern cyber attackers bypass existing controls, evade detection and gain access to customers’ data center, campus, remote work, identity, cloud, and IoT/OT environments, the Vectra AI Platform sees their every move, connects the dots in real-time, and stops them from becoming breaches. With 35 patents in AI security and the most vendor references in MITRE D3FEND, organizations worldwide rely on Vectra AI to see and stop attacks their other tools can’t. More information, visit www.vectra.ai. ...Read More

Virtru

Virtru empowers organizations across the globe to securely share sensitive data beyond their perimeter while maintaining control. Powered by the Trusted Data Format (TDF), the Virtru Data Security Platform protects data across Microsoft 365, Google Workspace, SaaS apps, and cloud environments. With seamless workflow integration, Virtru provides data-centric security that enables 6,700+ global organizations to confidently collaborate with external partners while keeping sensitive information protected. ...Read More

YSecurity.io

YSecurity is a specialized security team with elite talent from Apple, Netflix, Robinhood, and other tech giants. We operate as part of your team to help you close deals faster, cut compliance time by 50%, and pass audits with confidence. We believe you deserve to innovate on your terms—so meet us at the Exhibit Showcase and land your next big deal sooner and stress-free. ...Read More

Zafran Security

The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your hybrid environment.

Zenity

Zenity helps the world’s leading enterprises secure and govern AI Agents everywhere. With Zenity’s agent-less platform, security teams can now implement security guardrails, generate prioritized lists of vulnerabilities, and autonomously remediate vulnerabilities with centralized visibility, risk assessment, and governance. ...Read More

Zepo

Zepo is a cybersecurity platform that helps organizations reduce human risk through AI-powered training, real-time threat detection, and personalized simulations. By focusing on the human element, Zepo empowers teams to recognize and respond to digital threats, strengthening the company's overall security posture. ...Read More

Zimperium

Zimperium is the world leader in mobile security. Purpose-built for mobile environments, Zimperium delivers unparalleled protection for mobile applications and devices. As cybercriminals adopt a mobile-first attack strategy, Zimperium’s AI-driven mobile security enables organizations to stay ahead of evolving threats including mobile-targeted phishing (mishing), malware, app vulnerabilities and compromise, as well as zero day threats. Learn more at www.zimperium.com. ...Read More

Ready to join us in National Harbor?

Experience the Gartner difference — talk with experts, meet your peers and turn insight into action.