
Featured Exhibitors

Bullwall
BullWall is a fast-growing international, privately owned digital innovator with headquarters in Denmark. BullWall is led with empathy and driven by passion, built on talent, dedicated to fight cybercrime in its many forms. Our overarching purpose is to break cybercrime and to combat digital fraud on file level – stop new and unknown strings of ransomware attacks in its tracks – and to provide solutions to report data breaches to regulators in a timely manner and secure way.
BullWall’s three innovative technologies; RC, FDS and IMS have the sole focus on analyzing and protecting organizations and their digital assets, whether it is protecting against a vicious ransomware attack, detecting advanced insurance fraud or reporting a data breach incident. Our people are the heart and soul of our company. We know what really matters; development, flexibility, recognition, and purpose, always with the customer in focus. BullWall has a global reach and provide cuttingedge technologies to customers within corporate, enterprise, and the public sector.

Solarwinds
Security Ratings
Get a holistic view of any organization’s security posture based on the collection, analysis, and attribution of millions of critical data points.
The result is an unprecedented cyber security solution that provides an accurate view of risk across your ecosystem, encompassing uncorrelated risk posed by individual poor-performing vendors as well as correlated risk precipitated across groups of companies.
SecurityScorecard enables users to view and monitor security ratings, easily add vendors or partner organizations, and report on the cyberhealth of their ecosystems.
It also provides access to breach insights and other analytics, compliance, collaboration, digital asset management, and additional tools that help enterprises better manage security and achieve business objectives.

Macrium
What is Macrium Reflect?
Macrium Reflect is image based backup and cloning software.
Macrium Reflect creates an accurate and reliable image of a hard disk or the partitions on the disk. In the event of a partial or complete system loss, you can use this image to restore the entire disk, one or more partitions, or even individual files and folders.
Using Macrium Reflect you can backup whole partitions or individual files and folders into a single compressed, mountable archive file. You can use this archive to restore exact images of the partitions on a hard disk so that you can easily upgrade your hard disk or recover your system if it breaks. You can also mount images as a virtual drive in Windows Explorer to easily recover Files and Folders using Copy and Paste.

Jetico
PURE & SIMPLE ENCRYPTION AND DATA WIPING SOFTWARE
Trusted globally by over 1 million customers, from the Pentagon to a family near you.
Use data encryption to protect your data from physical and virtual threats. Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost and stolen – from threats both virtual and physical.
On top of pains from unwanted access to sensitive information, penalties have become more severe and more frequent for non-compliance with regulations on financial, medical and personal data.
No information security strategy is complete unless data is properly protected at the source where it is stored.
Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance.
If you store sensitive data, encryption is essential. Contact us to get started today!
Use Cases for Data Encryption
Prevent Data Breaches
Unwanted access – for data stored on active computers, shared workstations or network storage vulnerable to prying eyes
Physical theft – for data stored on lost or stolen computers, laptops, external drives & USB sticks
Protection of Sensitive Information Against Threats
Personally Identifiable Information (PII)
Electronic Health Records (EHR)
Credit card data
Insurance & financial records
Student information
Client records & customer databases
Proprietary information or trade secrets
Emails
Chat histories
How to Encrypt Data with BestCrypt
BestCrypt by Jetico delivers speed, flexibility and confidentiality for anyone concerned with protecting sensitive information – from IT experts at large organizations handling trade secrets to people at home concerned with personal privacy.
Encryption doesn’t have to hurt. To protect stored data, strong encryption with BestCrypt is easy to use and light on your system.

Liquidware
ADAPTIVE WORKSPACE MANAGEMENT SOLUTIONS
Organizations pursuing a digital transformation will also be dramatically changing the nature of work for their employees, yet, too many still rely on outmoded approaches to supply workers with computing resources. Digital transformation can be stalled for organizations which do not re-architect their workspace provisioning approaches. Liquidware presents a roadmap for delivering modern workspaces for organizations which are undergoing digital transformation. Liquidware’s Adaptive Workspace Management (AWM) suite of products can support the build-out of an agile, hybrid platform and cloud workspace provisioning engine. Liquidware’s AWM solutions, including ProfileUnity, Stratusphere UX and FlexApp, deliver an efficient, cost-effective and equitable approach for delivering compute resources to their workforce.
Our solutions offer the following strategic benefits by:
Building on existing infrastructure so investments are not lost. Staff works with familiar approaches. Existing infrastructure and systems are not disrupted or displaced.
Offering a platform-agnostic approach in which workspace environments are heterogeneous. Organizations are freed from stove-piped structures that restrict growth. Existing processes are automated to facilitate higher levels of control, security and efficiency that sets the stage for comprehensive disaster recovery.
Enabling emerging technologies and approaches to be introduced into the environment seamlessly and quickly, enriching the user experience without increasing cost over time.
Aligning workspace design to user requirements and work modes, supporting the use of best-of-breed workspace technologies for an optimum end-user experience.
Enabling administrators to migrate and co-exist users across evolving platforms easily (Windows OS/application versions, and virtual, physical, cloud platforms, etc.).

Trustwave
Trustwave is a leading cybersecurity and managed security services provider that helps businesses fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. Trustwave is a Singtel company and the global security arm of Singtel, Optus and NCS, with customers in 96 countries. Watch our video to learn more about who we are and what we do.

Redflare
Simplified assurance for all your regulatory needs
red flare provides an enterprise wide solution that collects, collates, and communicates key information on the effectiveness of the management structure, processes and controls.

Data 443
Replace Several Products
Data Discovery, Classification and Governance
GDPR Compliance: 13 of the Required Articles
Classify information at rest and in flight – local, network, cloud and database
Discover PII, PCI, HIPAA and Confidential information – local, network, cloud and database
Report and remediate – security access controls – local, network, cloud and database
Respond to DSAR and remediation actions – local, network, cloud and database
Winners_art
Winner of *3* – 2018 Cyber Security Excellence Awards
Local devices, network, cloud and databases are all ‘in scope’ for data security
Supporting more than 200 file types and 400 types of databases, ClassiDocs is the only platform to classify, govern and discover across all of these data silos.
With support for leading cloud service providers like Microsoft, Dropbox, Google, Salesforce and others, ClassiDocs ensures you have accurate, up to date and continuously maintained classified datasets.
ClassiDocs gives you a full-enterprise view of the entire data estate.

Index Engines
Organizations have struggled with managing unstructured corporate data assets for decades. Understanding what they have, determining its value, and making smart management and governance decisions has always been a challenge.
Index Engines was architected to meet the challenges of today’s data center and deliver a highly scalable and efficient indexing platform across both primary and backup storage data environments. It provides search, reporting, disposition and preservation of unstructured user data in support of stakeholders ranging from IT to legal and security.
Index Engines’ architecture was designed from the ground up to support petabyte-class data centers with minimal resources or disruption to the environment. Clients, including top financial services, health care organizations and government agencies, turn to Index Engines to support their most mission critical information management, cyber security and governance challenges.

Netshield
Trusted Network Protection
Small and midsized businesses are entrusted with critical data as part of their mission. That data deserves the best protection possible, which is why Netshield offers affordable, manageable cybersecurity solutions designed specifically for small and mid-sized business networks. 60% of small businesses that experience a data breach will fail within 6 months – let us help stop breaches before they happen and protect your trusted relationships.