Exhibiting Vendors

Altaro
Altaro part of Hornetsecurity Group is a fast-growing developer of easy-to-use backup solutions for managed service providers (MSPs), IT resellers and IT departments. It specializes in backup for virtualized and cloud environments, providing affordable enterprise-class functionality while avoiding unnecessary features that add cost and undue complexity. With 50,000+ customers worldwide, 10,000+ partners globally and 2,000+ MSPs to date, the company’s flagship solution is Altaro VM Backup, which has gained traction as the natural choice for Hyper-V and VMware backup and replication. Altaro part of Hornetsecurity Group also provides an annual subscription solution to back up and restore Office 365 mailboxes, Altaro Office 365 Backup. Both are also available as monthly subscription programs for MSPs.

Armis
Armis was formed to help organizations discover and secure managed, unmanaged, and IoT devices, including medical devices and industrial control systems (ICS).
With almost 400 employees globally, we’re building a future that helps our customers and partners to quickly implement their digital transformation strategies and safely adopt new connected devices.
Our mission is clear.
To enable enterprises to adopt new connected devices without fear of compromise by cyber attack.

Ascertia
Since 2001, Ascertia has been a global leader in delivering high-trust e-security products focusing on: Digital Signatures | Timestamps | Evidence Archiving | OCSP Validation SigningHub delivers a complete signing solution enabling organisations to workflow documents for digital signature approval. When integrated into core business applications or used standalone, SigningHub optimises how internal and external users can review, approve and sign documents at any time on any device. ADSS Server is easy to deploy and offers a full range of PKI services. It is the cryptographic engine that powers SigningHub and offers modules for advanced or qualified digital signature creation and verification together with options for TSA, OCSP, SCVP, XKMS, LTANS as well as CA and RA services

Awingu
Awingu develops software to simplify enterprise mobility and liberate legacy applications.
Our software aggregates all company files and applications to one secure online workspace that can be accessed from any device or OS using any HTML5-based browser. Awingu mobilizes all company applications without disrupting how you run your IT and works with any cloud services. No agent is required on personal or corporate devices, and collaboration and file sharing are as simple as sending a URL. IT assets remain centrally secure and no data footprint is ever left behind for a safe way to implement BYOD. Awingu is the fastest and easiest way to empower a mobile workforce. Awingu is headquartered in Ghent, Belgium with affiliate offices in New York. Gartner Cool Vendor for Unified Workspaces 2017.

Barracuda
At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data, and applications with innovative solutions that grow and adapt with our customers’ journey. More than 150,000 organisations worldwide trust Barracuda to protect them – in ways they may not even know they are at risk – so they can focus on taking their business to the next level.

bluedog Security Monitoring
bluedog provides powerful and affordable internal network monitoring. cloud-based monitoring and threat detection, can be combined with bluedog security services, or your existing systems and support to enable you to quickly detect, diagnose, and resolve network issues that could lead to harmful cyber security attacks against your customers.
Our goal is to provide businesses with a level of network protection typically only afforded by large corporations. We aim to bring high quality technology, support and service to the small to medium business, helping protect their business from cyber threats.

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in anti-malware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com.

Bullwall
BullWall is a fast-growing international, privately owned digital innovator with headquarters in Denmark. BullWall is led with empathy and driven by passion, built on talent, dedicated to fight cybercrime in its many forms. Our overarching purpose is to break cybercrime and to combat digital fraud on file level – stop new and unknown strings of ransomware attacks in its tracks – and to provide solutions to report data breaches to regulators in a timely manner and secure way.
BullWall’s three innovative technologies; RC, FDS and IMS have the sole focus on analyzing and protecting organizations and their digital assets, whether it is protecting against a vicious ransomware attack, detecting advanced insurance fraud or reporting a data breach incident. Our people are the heart and soul of our company. We know what really matters; development, flexibility, recognition, and purpose, always with the customer in focus. BullWall has a global reach and provide cuttingedge technologies to customers within corporate, enterprise, and the public sector.

Carbonite | Webroot
Get total endpoint protection for the enterprise, SMB and consumer markets
Strengthen cyber resilience with the combined power of Carbonite data protection and back-up, Webroot endpoint protection and threat intelligence and OpenText Encase digital forensic and investigation solutions. Customers of all sizes can now benefit from total endpoint protection and comprehensive disaster recovery.
Unlike traditional EPP vendors, OpenText views security as an integral part of an information management strategy. This provides significant advantages, including:
Unique visibility into enterprise information. OpenText security experts work with customers to develop information protection strategies. Leveraging decades of experience conducting security assessments for enterprises of all sizes, the OpenText team crafts policies and procedures that are designed to protect critical business assets, infrastructure and information.
Scale with the enterprise. OpenText understands the complexity of global operations when deploying and maintaining technology. OpenText designs its products to support business environments as they grow by building scale into the foundation of our security solutions.

Censornet
Censornet provides a multi-channel, multi-layered approach to securing the cloud via its purpose-built platform.
Censornet delivers integrated web security, email security, CASB and multi-factor authentication to provide security focused visibility and control of an organization’s assets. Our elastic security platform combines traditional security controls (e.g. web/URL filtering, email security) with granular cloud application control and adaptive multi-factor authentication to allow access while controlling outcomes. The complete solution helps enforce Internet usage policies, tracks cloud application usage, and controls access to sensitive data in cloud applications such as customer records in Salesforce.com, to protect against the biggest risks for the greatest impact.

Checkmarx
Checkmarx is the global leader in software security solutions for modern enterprise software development. Checkmarx delivers the industry’s most comprehensive Software Security Platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis, and developer application security awareness and training programs to reduce and remediate risk from software vulnerabilities.
When Software is Everywhere, Security is Everything
The way your company develops and depends on software has changed – and never has it exposed you to more risk. When software is everywhere, everything becomes an attack surface. And while software security has never been more business critical, you know if it gets in the way of DevOps, it just won’t work. Security must be inseparable from development.
Now, Software = Security.
Software security for DevOps and beyond.
Checkmarx makes software security essential infrastructure: unified with DevOps, and seamlessly embedded into your entire CI/CD pipeline, from uncompiled code to runtime testing. Our holistic platform sets the new standard for instilling security into modern development. With Checkmarx you get:
Security from the Start
We deliver the industry’s most comprehensive, unified software security platform that tightly integrates SAST, SCA, IAST and AppSec Awareness to embed software security throughout the CI/CD pipeline and reduce software exposure.
Best Fit for DevSecOps
Checkmarx leads the industry in delivering automated security scanning as part of the DevOps process.
DevOps Speed
Only Checkmarx enables you to manage software exposure at the speed of DevOps – getting applications to production quickly and securely without interrupting developer workflows.
Unmatched DevSecOps Expertise
We know software like no one else. We know security like no one else. Developers like Checkmarx better than anyone else.
Learn more at www.checkmarx.com

Clearcrypt
With the average annual loss to companies worldwide now exceeding $7.7 million through data breaches (studied companies losing up to $65 million) (5), organisations must recognise the threat lost USB devices pose to confidential information. This is particularly important if they operate in highly sensitive sectors such as finance, health and public sector. Losing sensitive data is not an option. The after-effect of a data breach is difficult to predict…
Aside from the data loss, reputational damage, customer trust implications and legal issues following a breach will be much more difficult to rectify.
In our ever-connected world, an encrypted USB device is not just an accessory but rather a necessity. The ClearCrypt range caters for all your data storage requirements, is flexible and cost-effective.

Cyglass
CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people. The CyGlass Cloud continuously analyzes the billions of conversations happening on your network, learns what is normal, and alerts when suspicious behaviors that risk the security of your critical IT assets are detected. CyGlass complies with data privacy laws as the CyGlass Cloud doesn’t require any personally identifiable information (PII) to detect threats.

Entrust
Entrust is continuously committed to quality in every aspect of serving our customers. As part of our ongoing effort to ensure the highest level of quality, we’ve launched key initiatives to ensure that our products and services meet the most demanding standards in the industry.

Hornet Security
The Hornetsecurity Group is the leading cloud security provider in Europe, which protects the IT infrastructure, digital communication and data of companies and organizations of all sizes. Its services are provided worldwide via 11 redundantly secured data centers. The product portfolio covers all important areas of email security, including spam and virus filters, legally compliant archiving and encryption, as well as defense against CEO fraud and ransomware. With around 350 employees, the Hornetsecurity Group is represented globally at 10 locations and operates in more than 30 countries through its international distribution network. The premium services are used by approximately 50,000 customers including Swisscom, Telefónica, KONICA MINOLTA, LVM Versicherung, DEKRA and Claas.

iboss
Securely connect any user on any device, to any application, from anywhere with our cloud platform.
The network perimeter has eroded, making traditional gateway security appliances ineffective at securing users who are no longer bound by network boundaries. Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures user Internet access from anywhere, including in and out of your physical network perimeter. Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. Since iboss cloud lives in the cloud, security goes where users go with elastic and instant scaling to meet the demands of the cloud-first future.

Immersive Labs
We empower organizations to increase, measure and demonstrate human capabilities in every part of their cybersecurity.
Immersive Labs enables you to evidence your cyber capability, risk and resilience across technical and non-technical teams for the first time. Our platform gives you the ability to measure real-time cyber efficacy as it relates to cyber teams, developers, engineers and executives. All in one platform, all kept up to date at the speed of cyber. We call this Cyber Workforce Optimization.
Learn more about #CyberWorkforceOptimization by visiting www.immersivelabs.com

Kemp
Kemp powers the secure, always-on application experience [AX] that enterprises and service providers demand.
Kemp’s load balancing, network performance monitoring, and network detection and response solutions deliver maximum value through simplified deployments, flexible licensing, and top-rated technical support. Kemp is the world’s most-popular application experience solution with more than 100,000 deployments in 138 countries. Take control of your AX at kemp.ax.

Panorays
Panorays is a rapidly growing provider of third-party security risk management software, offered as a SaaS-based platform. Panorays manages the whole process from inherent to residual risk, remediation and ongoing monitoring.
Unlike other solution providers, Panorays combines automated, dynamic security questionnaires with external attack surface evaluations and business context to provide organizations with a rapid, accurate view of supplier cyber risk. It is the only such platform that automates, accelerates and scales customers’ third-party security evaluation and management process, enabling easy collaboration and communication between companies and suppliers, resulting in efficient and effective risk remediation in alignment with a company’s security policies and risk appetite. Panorays serves as the missing link in third-party security management, creating an out-of-the-box process and security plan, which also easily integrates into existing organizational workflows and systems. It is trusted by organizations worldwide in industries such as financial services, banking, insurance and healthcare, among others.

Rackmount IT
INNOVATORS IN NETWORK SECURITY HARDWARE! Rackmount.IT is specialized in developing custom rack mount kits for desktop security appliances. So feel free to inquire if no ‘standard’ Rackmount.IT kit is available. Current offering includes rack mount kits for Apple Mac Mini, Aruba, AVM FRITZ!Box, Barracuda, Cisco, Cisco Meraki, Check Point, Forcepoint, Fortinet, HPE, Palo Alto Networks, SonicWall, Sophos, Ubiquiti, Vertiv and WatchGuard. Rackmount.IT can also provide custom made kits and in any color on project bases. Rackmount.IT products secure the appliance and power supply to prevent network and/or power interruption. The kits are designed to ensure optimal airflow with all ports redirected to the front of the 19 inch cabinet. It doesn’t only look great, but product reliability is maximized!

Octiga
Octiga helps organisations to achieve continuous and coherent security best practice with an easily and affordable SaaS cloud security solution. Whether you need to secure your organisation, or you are a IT service provider who juggles the security of your clients, Octiga is here to help.
We recognise that the world has changed. We must deliver a way so that business goes on without ignoring the risks any longer.
Disrupt Multi-client Security Management in Office 365 with Octiga.
-Get Single dashboard Visibility
-Deploy and monitor re-usable security templates.
-Prevent. Detect. Remediate.
-Get Compliance Trend Reports and Alerts

Systancia
Systancia is a global independent cybersecurity software vendor who provides workforces with a secure and smooth access experience to their digital workplace. We believe that behind every workplace there is a person who deserves to be empowered and trusted to access and do their work.
Our vision is to place intelligent and user friendly technology at the service of people. It is why we invest all the ingenuity of our teams in meeting the human challenge of the digital workplace. To realize this vision, we have brought together a set of technologies into a unique access experience platform, with a single pane of glass user experience, enabling organizations to manage the end-to-end chain of trust for all the workforces of their ecosystem: from the management of people identities and entitlements (IAM) to the secure remote access to their workspace (ZTNA and VDI), whether as a business user or as a privileged IT administrator (PAM).
Systancia delivers its offering as software products and/or as a cloud service platform, often in hybrid deployment models. It leverages artificial intelligence and workspace virtualization to empower and secure the end users. We are delighted to have hundreds of public and private organizations rely on Systancia’s secure access experience platform for projects such as secure teleworking, secure access by third parties, access surveillance, workforce on-boarding, unified access to multi-cloud infrastructures, migration to the cloud, application migration to SaaS, digital risk mitigation, to move on with agility for resilience, compliance for responsibility, technology for people.

WatchGuard
For 25 years, WatchGuard has pioneered cutting-edge cybersecurity technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network and endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables more than 250,000 small and midsize enterprises from around the globe to protect their most important assets including over 10 million endpoints. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.

usecure
The world’s leading Human Risk Management (HRM) solution.
Traditional security awareness training is built on the idea that humans are the weakest link in the cyber security chain, with irregular, unengaging and generic training mistakenly seen as a quick fix.
usecure believes that humans can be the strongest line of defence against evolving cyber threats — they just need the right tools to get them there.
That’s why usecure has built the one-stop solution for empowering businesses to measure, mitigate and monitor their human cyber risk, without having to sacrifice productivity for protection.

Red Sift
Red Sift enables security-first organizations to successfully communicate with and ensure the trust of their employees, vendors and customers. As the only integrated cloud email and brand protection platform, Red Sift automates BIMI and DMARC processes, makes it easy to identify and stop business email compromise, and secures domains from impersonation to prevent attacks.
Founded in 2015 by serial entrepreneurs Rahul Powar and Randal Pinto, Red Sift is headquartered in London, UK, and boasts an impressive client roster including Domino’s, Telefonica, Pipedrive, Rentokil, Wise, and top global law firms. Products on the Red Sift platform include OnDMARC, OnINBOX, and OnDOMAIN, SaaS applications that work together to close the net on the phishing problem by blocking outbound phishing attacks, analyzing the security of inbound communications, and providing domain impersonation defense.

Zyxel
Focused on innovation and customer-centricity, Zyxel has been connecting people to the internet for nearly 30 years. We keep promoting creativity which meets the needs of customers. This spirit has never been changed since we developed the world’s first integrated 3-in-1 data/fax/voice modem in 1992. Our ability to adapt and innovate with networking technology places us at the forefront of understanding connectivity for telco/service providers, businesses and home users.

Progress Flowmon
Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through our high performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network & application performance and deal with modern cyber threats. Driven by a passion for technology, we are leading the way of NetFlow/IPFIX network monitoring that is high performing, scalable and easy to use.
The world’s largest businesses, internet service providers, government entities or even small and midsize companies rely on our solutions to take control over their networks, keep order and overcome uncertainty. With our solution recognized by Gartner, we are one of the fastest growing companies in the industry.

Bullwall
BullWall is a fast-growing international, privately owned digital innovator with headquarters in Denmark. BullWall is led with empathy and driven by passion, built on talent, dedicated to fight cybercrime in its many forms. Our overarching purpose is to break cybercrime and to combat digital fraud on file level – stop new and unknown strings of ransomware attacks in its tracks – and to provide solutions to report data breaches to regulators in a timely manner and secure way.
BullWall’s three innovative technologies; RC, FDS and IMS have the sole focus on analyzing and protecting organizations and their digital assets, whether it is protecting against a vicious ransomware attack, detecting advanced insurance fraud or reporting a data breach incident. Our people are the heart and soul of our company. We know what really matters; development, flexibility, recognition, and purpose, always with the customer in focus. BullWall has a global reach and provide cuttingedge technologies to customers within corporate, enterprise, and the public sector.

Solarwinds
Security Ratings
Get a holistic view of any organization’s security posture based on the collection, analysis, and attribution of millions of critical data points.
The result is an unprecedented cyber security solution that provides an accurate view of risk across your ecosystem, encompassing uncorrelated risk posed by individual poor-performing vendors as well as correlated risk precipitated across groups of companies.
SecurityScorecard enables users to view and monitor security ratings, easily add vendors or partner organizations, and report on the cyberhealth of their ecosystems.
It also provides access to breach insights and other analytics, compliance, collaboration, digital asset management, and additional tools that help enterprises better manage security and achieve business objectives.

Macrium
What is Macrium Reflect?
Macrium Reflect is image based backup and cloning software.
Macrium Reflect creates an accurate and reliable image of a hard disk or the partitions on the disk. In the event of a partial or complete system loss, you can use this image to restore the entire disk, one or more partitions, or even individual files and folders.
Using Macrium Reflect you can backup whole partitions or individual files and folders into a single compressed, mountable archive file. You can use this archive to restore exact images of the partitions on a hard disk so that you can easily upgrade your hard disk or recover your system if it breaks. You can also mount images as a virtual drive in Windows Explorer to easily recover Files and Folders using Copy and Paste.

Jetico
PURE & SIMPLE ENCRYPTION AND DATA WIPING SOFTWARE
Trusted globally by over 1 million customers, from the Pentagon to a family near you.
Use data encryption to protect your data from physical and virtual threats. Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost and stolen – from threats both virtual and physical.
On top of pains from unwanted access to sensitive information, penalties have become more severe and more frequent for non-compliance with regulations on financial, medical and personal data.
No information security strategy is complete unless data is properly protected at the source where it is stored.
Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance.
If you store sensitive data, encryption is essential. Contact us to get started today!
Use Cases for Data Encryption
Prevent Data Breaches
Unwanted access – for data stored on active computers, shared workstations or network storage vulnerable to prying eyes
Physical theft – for data stored on lost or stolen computers, laptops, external drives & USB sticks
Protection of Sensitive Information Against Threats
Personally Identifiable Information (PII)
Electronic Health Records (EHR)
Credit card data
Insurance & financial records
Student information
Client records & customer databases
Proprietary information or trade secrets
Emails
Chat histories
How to Encrypt Data with BestCrypt
BestCrypt by Jetico delivers speed, flexibility and confidentiality for anyone concerned with protecting sensitive information – from IT experts at large organizations handling trade secrets to people at home concerned with personal privacy.
Encryption doesn’t have to hurt. To protect stored data, strong encryption with BestCrypt is easy to use and light on your system.

Liquidware
ADAPTIVE WORKSPACE MANAGEMENT SOLUTIONS
Organizations pursuing a digital transformation will also be dramatically changing the nature of work for their employees, yet, too many still rely on outmoded approaches to supply workers with computing resources. Digital transformation can be stalled for organizations which do not re-architect their workspace provisioning approaches. Liquidware presents a roadmap for delivering modern workspaces for organizations which are undergoing digital transformation. Liquidware’s Adaptive Workspace Management (AWM) suite of products can support the build-out of an agile, hybrid platform and cloud workspace provisioning engine. Liquidware’s AWM solutions, including ProfileUnity, Stratusphere UX and FlexApp, deliver an efficient, cost-effective and equitable approach for delivering compute resources to their workforce.
Our solutions offer the following strategic benefits by:
Building on existing infrastructure so investments are not lost. Staff works with familiar approaches. Existing infrastructure and systems are not disrupted or displaced.
Offering a platform-agnostic approach in which workspace environments are heterogeneous. Organizations are freed from stove-piped structures that restrict growth. Existing processes are automated to facilitate higher levels of control, security and efficiency that sets the stage for comprehensive disaster recovery.
Enabling emerging technologies and approaches to be introduced into the environment seamlessly and quickly, enriching the user experience without increasing cost over time.
Aligning workspace design to user requirements and work modes, supporting the use of best-of-breed workspace technologies for an optimum end-user experience.
Enabling administrators to migrate and co-exist users across evolving platforms easily (Windows OS/application versions, and virtual, physical, cloud platforms, etc.).

Trustwave
Trustwave is a leading cybersecurity and managed security services provider that helps businesses fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. Trustwave is a Singtel company and the global security arm of Singtel, Optus and NCS, with customers in 96 countries. Watch our video to learn more about who we are and what we do.

Redflare
Simplified assurance for all your regulatory needs
red flare provides an enterprise wide solution that collects, collates, and communicates key information on the effectiveness of the management structure, processes and controls.

Data 443
Replace Several Products
Data Discovery, Classification and Governance
GDPR Compliance: 13 of the Required Articles
Classify information at rest and in flight – local, network, cloud and database
Discover PII, PCI, HIPAA and Confidential information – local, network, cloud and database
Report and remediate – security access controls – local, network, cloud and database
Respond to DSAR and remediation actions – local, network, cloud and database
Winners_art
Winner of *3* – 2018 Cyber Security Excellence Awards
Local devices, network, cloud and databases are all ‘in scope’ for data security
Supporting more than 200 file types and 400 types of databases, ClassiDocs is the only platform to classify, govern and discover across all of these data silos.
With support for leading cloud service providers like Microsoft, Dropbox, Google, Salesforce and others, ClassiDocs ensures you have accurate, up to date and continuously maintained classified datasets.
ClassiDocs gives you a full-enterprise view of the entire data estate.

Index Engines
Organizations have struggled with managing unstructured corporate data assets for decades. Understanding what they have, determining its value, and making smart management and governance decisions has always been a challenge.
Index Engines was architected to meet the challenges of today’s data center and deliver a highly scalable and efficient indexing platform across both primary and backup storage data environments. It provides search, reporting, disposition and preservation of unstructured user data in support of stakeholders ranging from IT to legal and security.
Index Engines’ architecture was designed from the ground up to support petabyte-class data centers with minimal resources or disruption to the environment. Clients, including top financial services, health care organizations and government agencies, turn to Index Engines to support their most mission critical information management, cyber security and governance challenges.

Netshield
Trusted Network Protection
Small and midsized businesses are entrusted with critical data as part of their mission. That data deserves the best protection possible, which is why Netshield offers affordable, manageable cybersecurity solutions designed specifically for small and mid-sized business networks. 60% of small businesses that experience a data breach will fail within 6 months – let us help stop breaches before they happen and protect your trusted relationships.