Anaconda is the world’s most popular open-source Python distribution platform. Drop by to find out how our curated Python and R package repository can reduce vulnerability risk at the source, manage dependencies and enable your organization or agency to adhere to data and software governance requirements.
|
Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G.
|
Atlassian is a software company dedicated to unleashing the potential of every team. Atlassian enables open teamwork in businesses of any size with products like Jira, Confluence, and Trello. Atlassian is uniquely positioned to connect teams across software, IT, and business.
|
BigID is a leader in data security, privacy, compliance, and governance: enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data landscape: including multicloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources. |
BlackBerry provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints, leveraging AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy. For more information, visit BlackBerry.com and follow @BlackBerry.
|
|
Eclypsium’s cloud-based platform provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises and government agencies from the deep implants and exploits that have become the vector of choice for modern adversaries. For more information, visit eclypsium.com.
|
Ekahau helps businesses build and maintain high-performing wireless networks. Our award-winning Wi-Fi design, site survey, and troubleshooting solutions create fast, reliable Wi-Fi networks that businesses can trust for their mission-critical wireless needs. We ensure networks are optimized using the RIGHT number of access points, positioned in the RIGHT locations, and with the RIGHT configurations to deliver awesome Wi-Fi every day. Businesses of every size—including the world’s biggest brands and events—trust Ekahau to get the best performance from their wireless networks.
|
Government must continuously protect data from cybercriminals, state actors, and malicious insiders wherever it resides. For years, agencies have used Entrust to protect sensitive information using hardened, tamper-resistant platforms that encrypt data, provide digital signatures, and generate and protect keys. For more information about how Entrust digital security solutions can address your unique needs, contact us at www.entrust.com.
|
Fidelis Cybersecurity safeguards modern IT with unparalleled detection, deception, response, cloud security, and compliance capabilities. We deliver context, accuracy, speed, and portability security professionals need to quickly find and neutralize adversaries. Fidelis Cybersecurity is trusted by many top commercial, enterprise, and government agencies worldwide. For more information, please visit www.fidelissecurity.com.
|
||
Forescout delivers automated cybersecurity across the digital terrain. We empower our customers to achieve continuous alignment of their security frameworks with their digital realities, across all asset types – IT, IoT, OT and IoMT. It is a non-stop journey, managing cyber risk through automation and data-powered insights
|
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
|
|
HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices.
|
Hitachi Vantara Federal is the trusted leader in mission-centric data solutions for the Federal government. We’re a collaborative, full-service company empowering data-driven insight with a deep bench of integrated partners –advancing Federal customer missions regardless of their data maturity levels. Hitachi Vantara Federal is a FOCI-mitigated subsidiary of Hitachi Vantara.
|
Infoblox is the leader in Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to on-premises, cloud and hybrid networks, managed through a single pane of glass. Infoblox has 8,000 customers, including 350 of the Fortune 500, representing 50 percent market share in the DDI space. Learn more at www.infoblox.com.
|
Okta’s cloud-native identity and access management platform enables government agencies to confidently modernize and adopt zero trust through secure identity management, MFA with SSO, and least privilege access with continuous authorization. With pre-built, validated integrations with both cloud and on-premises systems, Okta makes deployment simple, reliable, and scalable.
|
Ping Identity delivers intelligent identity solutions for ICAM modernization. We offer a standards-based Identity foundation for Zero Trust Architecture to enable fine-grained authorizations for interoperable mission work. With flexible deployment options, including FedRAMP High, DoD IL5, Air-gapped, and hybrid environments, Ping provides phishing-resistant multi-factor authentication, single sign-on, and access management.
|
|
Primer builds and deploys mission-ready AI applications that meet rapidly evolving defense needs. Our team of AI experts uses cutting-edge machine learning and advanced NLP models to help analysts and operators combat disinformation, detect cyber threats, and gain situational awareness from enterprise and open source data with speed and accuracy.
|
Proofpoint is a leading cybersecurity and compliance company that protects Government Agencies greatest assets and biggest risks: their people. With an integrated suite of cloud-based, on prem and hybrid solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. http://www.proofpoint.com.
|
Qrypt’s quantum-secure encryption gives people the tools they need to immutably secure their data and their right to privacy. Through great partnerships and an unmatched team pedigree, we have built patented encryption methods and applications that allow everyone to reclaim their right to digital autonomy.
|
RegScale frees organizations from paper via its continuous compliance automation software. Our API-centric software integrates with security and compliance platforms to manage the security control state, shifting compliance left to deliver audit-ready documentation in the world’s first real-time GRC platform used by organizations such as the Navy and the DOE.
|
Cybersecurity is constantly changing. Today’s challenges are nothing like tomorrow’s. Threats are becoming more advanced leveraging the power of automation. Our mission is to defeat every attack, every second, of every day. Our Singularity Platform defends against cyberattacks than any single human or even a crowd.
|
Splunk helps make organizations more resilient. Leading organizations use our unified security and observability platform to keep their digital systems secure and reliable. Organizations trust Splunk to prevent security, infrastructure, and application issues from becoming major incidents, absorb shocks from digital disruptions and accelerate digital transformation.
|
Thales Trusted Cyber Technologies is a trusted, U.S. provider of cybersecurity solutions dedicated to the U.S. Government. We protect the government’s most vital data from the core to the cloud to the edge. Our unified data protection solutions address the government’s most stringent encryption, key management and access control requirements.
|
|
|
Veeam Government Solutions, Inc.(VGS) is the leading backup solutions provider delivering Modern Data Protection for cloud, virtual, SaaS, Kubernetes, and physical environments to the U.S. federal government. With 1,200+ government customers, VGS provides simple, reliable, flexible and secure solutions agencies trust to protect, manage, and safeguard data. Visit www.veeamgov.com.
|
Venafi, the cybersecurity market leader and inventor of Machine Identity Management, delivers the only common criteria certified platform for automating and securing NPE credentials. From DevSecOps automation demands for “fastsecure” TLS & SSH to securing software supply chains, Venafi delivers automated and persistent machine authentication for your Zero Trust Architecture.
|
Veritas Technologies is a global leader in data protection and availability, uniquely equipped to serve organizations of all sizes. Through our integrated product portfolio, a reputation for reliability, and a versatile deployment model, we provide a unified data management experience that delivers unmatched performance — tactical edge to core to cloud.
|