See the full schedule here.
BlackBerry is a leader in endpoint security, endpoint management, secure communications, and embedded systems. Our end-to-end solutions connect and protect the world’s most important organizations from government to enterprise, across over half a billion endpoints. BlackBerry has been busy innovating so you can focus on what you do, better.
Attivo Networks®, the identity detection and response leader, delivers a superior defense to prevent privilege escalation and lateral movement threat activity. The ThreatDefend® Platform provides unprecedented visibility to risks, attack surface reduction, and attack detection across critical attack point, including endpoints, Active Directory, and cloud environments.
Broadcom's diverse portfolio provides leading semiconductor, infrastructure and cybersecurity solutions from acquisitions of LSI, Brocade, Computer Associates and Symantec. Our solutions cover the data center, networking, software, cybersecurity, broadband, wireless, and storage markets. As a single vendor with such a wide range of solutions, Broadcom is well positioned to provide prime contractors a holistic portfolio of products and services to meet the demands of today’s largest DoD environments.
Entrust enables confidence by delivering a higher standard of trust. We make secure interactions possible with trusted identities, payments, and data protection.
Exabeam is the leader in next-gen SIEM and XDR, reinventing the way security teams use analytics and automation to solve threat detection, investigation, and response (TDIR).
ExtraHop is on a mission to stop advanced threats. Our dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to threats––before they compromise your business. When you don’t have to choose between protecting your business and moving it forward, that’s security uncompromised.
F5 solutions provide the ability to deploy applications in a federal setting in a compliant, secure, automated, and scalable fashion across both cloud and on-premise environments.
Fidelis Cybersecurity enables security teams to engage with adversaries earlier in the attack lifecycle using active defense solutions that provide full visibility, detection and response across endpoints, network, and cloud, unified in a single platform.
Forescout leads the industry in providing an active defense for the Enterprise of Things. Over 3,800 global companies rely on Forescout to effectively mitigate risks from network-connected devices, including the Internet of Things (IoT) and operational technology (OT). Our mission is to actively defend the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing.
Gigamon delivers unified network visibility and analytics on all information-in-transit, from raw packets to apps, across physical, virtual and cloud infrastructure. We aggregate, transform and analyze network traffic to solve for critical performance and security needs, including rapid threat detection and response. For more information, visit www.gigamon.com
HackerOne empowers the world to build a safer internet by giving organizations access to the largest, global community of highly skilled ethical hackers. Armed with an extensive database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Slack, Starbucks, Twitter, and Yahoo. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020.
HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices.
More than 6,200 customers around the world trust Imperva to protect their applications, data and websites from cyber attacks. With an integrated approach that combines edge, application and data security, Imperva protects companies through all stages of their digital journey.
Infoblox is the leader in Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to on-premises, cloud and hybrid networks, managed through a single pane of glass. Infoblox has 8,000 customers, including 350 of the Fortune 500, representing 50 percent market share in the DDI space.
Since 2004, Mandiant® has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.
NetAbstraction enables organizations to protect the privacy and security of identities and systems by intelligently selecting and obscuring global network pathways on the Internet. Our intelligence-grade concealment technology is used by Fortune 500 organizations globally to ensure their cyber operations remain secure, anonymous, and non-attributable.
The Okta Identity Cloud is the only FedRAMP Authorized, cloud-native identity and access management platform consistently named a leader by major analyst firms. Already trusted by 14,000+ customers, Okta enables government agencies to confidently modernize and adopt zero trust through secure identity management, multifactor authentication with single sign-on, and least privilege access with continuous authorization. And with more than 7,000 pre-built, validated integrations with both cloud and on-premises systems, Okta makes deployment simple, reliable, and scalable. Learn more about Okta at okta.com/DoD
OPSWAT protects critical infrastructure (CIP). Our goal is to eliminate malware and zero-day attacks. Our products focus on threat prevention and process creation for secure data transfer and safe device access. 98% of U.S. nuclear power facilities trust OPSWAT for cybersecurity and compliance. OPSWAT. Trust no file. Trust no device.
Ping Identity enables Federal entities’ distributed workforces to perform secure, interoperable mission-critical work from anywhere. We do this by providing the IAM solutions and services organizations need to modernize their complex, hybrid environments and facilitate the move to a Zero Trust architecture.
Qmulos is the leading cybersecurity and IT compliance company that delivers premier professional services and innovative products to help organizations improve their security and compliance posture. Leveraging Splunk's robust and scalable technology, we unlock the value of your data and automate initiatives ranging from compliance and auditing to cyber defense.
RSA helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.
Saviynt’s Enterprise Identity Cloud (FedRAMP) helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience.
Our mission is to make the world a safer place by transforming the way organizations understand, improve, and communicate cybersecurity risk to their boards, employees, and vendors.
Securonix provides threat detection and response solutions powered by the most advanced analytics and built on a scalable, flexible cloud native architecture. Securonix Next-Gen SIEM and XDR enable fast, precise incident response, providing high fidelity alerts with analytics that pioneered the UEBA category. For more information visit www.securonix.com.
SentinelOne’s cybersecurity solution encompasses AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous platform.
Splunk is the data platform leader for security and observability. Our extensible data platform powers enterprise observability, unified security and limitless custom applications. Splunk helps tens of thousands of organizations turn data into doing so they can unlock innovation, enhance security and drive resilience.
Thales Trusted Cyber Technologies is a trusted, U.S. provider of cybersecurity solutions dedicated to U.S. Government. We protect the government’s most vital data from the core to the cloud to the edge. Our unified data protection solutions address the government’s most stringent encryption, key management and access control requirements.
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix’s security experts, along with an extensive partner ecosystem, accelerate technology innovation through machine learning and automation to empower over 40,000 business and government customers. More at https://trellix.com.
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects your agency or department and millions of individuals across clouds, networks, devices, and endpoints.
Venafi, the cybersecurity market leader and inventor of Machine Identity Management, delivers the only common criteria certified platform for automating and securing NPE credentials. From DevSecOps automation demands for “fastsecureâ€Â TLS & SSH to securing software supply chains, Venafi delivers automated and persistent machine authentication for your Zero Trust Architecture.
Veritas Technologies provides powerful, scalable solutions to efficiently manage large volumes of data across multiple environments and safeguard it against an ever-evolving threat landscape. Our unified platform approach enables government departments and agencies to get the most out of their data by ensuring its availability and facilitating proper oversight.
Zoom for Government offers a service designed for secure communication, collaboration, and continuity of operations. Zoom for Government has received Provisional Authorization (PA) from the Defense Information Systems Agency (DISA) for the Department of Defense (DoD) at Impact Level 4 (IL4). In 2021, the platform achieved an Authorization to Operate with Conditions (ATO-C) from the Department of the Air Force for conducting IL4 meetings.
Zoom for Government offers a service designed for secure communication, collaboration, and continuity of operations. Zoom for Government has received Provisional Authorization (PA) from the Defense Information Systems Agency (DISA) for the Department of Defense (DoD) at Impact Level 4 (IL4). In 2021, the platform achieved an Authorization to Operate with Conditions (ATO-C) from the Department of the Air Force for conducting IL4 meetings.