Exhibiting Vendors

Admin By Request
Admin By Request is developed by FastTrack Software. FastTrack Software is a global leader in developing tools by systems administrators. FastTrack Software was originally founded in Denmark in 2006 by systems administrators with the basic idea of creating simpler tools for other systems administrators. Admin By Request is a simple to deploy, infrastructure free security solution for the control and management of local administrative rights on desktop and servers. The solution completely removes the need for IT to perform disruptive and time-consuming remote-control sessions of staff computers.
For more information, visit https://www.adminbyrequest.com/

Armis
Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create. 40 Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, Cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive and unparalleled cybersecurity asset management, risk management, and automated enforcement. Armis customers are from across all industries, verticals & segments including governments, state, local, education (SLED), healthcare, critical infrastructure providers (CIP), retail, manufacturing, smart cities, transport, energy including organizations such as Colgate Palmolive, Allegro Microsystems, Takeda Pharmaceuticals, Mondelez, PepsiCo, DocuSign, the Booking Group and many more.
To find out more visit: https://www.armis.com/

Augmentt
Augmentt is a channel-enabled SaaS Security Management platform designed to help organisations understand their SaaS usage, enforce security policies, streamline operations and make better SaaS decisions. Augmentt’s platform provides total SaaS visibility and management across our 3 core products: Discover, Secure and Engage. Augmentt’s mission is to provide managed service providers (MSPs) with a smart solution to address the complexities driven by the growing adoption and reliance on SaaS.
Learn more here: https://www.augmentt.com/

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in anti-malware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com.

Bullwall
BullWall is a fast-growing international, privately owned digital innovator with headquarters in Denmark. BullWall is led with empathy and driven by passion, built on talent, dedicated to fight cybercrime in its many forms. Our overarching purpose is to break cybercrime and to combat digital fraud on file level – stop new and unknown strings of ransomware attacks in its tracks – and to provide solutions to report data breaches to regulators in a timely manner and secure way.
BullWall’s three innovative technologies; RC, FDS and IMS have the sole focus on analyzing and protecting organizations and their digital assets, whether it is protecting against a vicious ransomware attack, detecting advanced insurance fraud or reporting a data breach incident. Our people are the heart and soul of our company. We know what really matters; development, flexibility, recognition, and purpose, always with the customer in focus. BullWall has a global reach and provide cuttingedge technologies to customers within corporate, enterprise, and the public sector.

Energy Logserver
Energy Logsever has flexibility written into its code so that you could feel the beat of your company and be amazed #ByThePowerOfYourData. No matter the size of your organisation the platform is created to provide unlimited applicability in every department along with the clarity in all the data the company manages every second. With our innovative solution we support you in maintaining the full security of your company’s system and running your organisation effectively.
To learn more visit: https://energylogserver.com/ OR https://energysoar.com/

FileCloud
FileCloud is a hyper-secure content collaboration platform (CCP) that provides industry-leading compliance, data governance, data leak protection, data retention, and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete CCP stack. The platform offers powerful file sharing, sync, and mobile access capabilities on public, private, and hybrid clouds. FileCloud is headquartered in Austin, Texas. FileCloud is used by millions of users around the world, including top Global 1000 enterprises, educational institutions, government organizations, and managed service providers.
For more information, visit www.filecloud.com.
Booth Number – 9

Fortanix
Fortanix is a data-first multi-cloud security company and a pioneer in Confidential Computing. Today, data is spread across clouds, SaaS, applications, storage systems and data centers. Fortanix decouples security from infrastructure to address the challenges of securing sensitive data, wherever it may be located, across its entire life cycle, whether it is at-rest, in-motion or in-use. Fortanix customers include organizations of all sizes and a wide range of verticals, including some of the biggest global brands and Fortune 50 companies. Fortanix is a founding member of the Confidential Computing Consortium and has a strong ecosystem of strategic partners including Intel, Microsoft, AWS, Google, Snowflake and ServiceNow. Fortanix has been a recipient of many industry awards and recognitions including Gartner Cool Vendor.
Learn more at https://www.fortanix.com/
Booth Number – 11

Fortanix
Autonomous integrated security that ensures your cyber defences react at lightning speed, day and night. Faster, smarter, and safer than humanly possible. Every business needs a solution that can effectively manage cross-channel attacks. Censornet’s Autonomous Integrated Security shares attack intel across email, web, and cloud applications — meaning that your company is automatically protected against cyber attacks, no matter the time of day or night. This ensures your cyber defences react at lightning speed, day and night. We verify and assess risk continuously – every person, every device, no exceptions. And we bring unprecedented insight from enterprise-class threat intelligence feeds, so you know you’ve always got the best response against the latest emerging threats. Censornet provides mid-sized businesses with enterprise-grade solutions. For our millions of users globally, Censornet is simple and effective, not costly and complex. You can set your own rules, or just plug-and-play. And when you need help, it’s good to know our award-winning team of customer support specialists are here for you 24×7.
Learn more at: https://www.censornet.com/
Booth Number – 26

Cyberelements
cyberlements.io is the security platform for business performance, allowing organizations to be better insured against cyberattacks without compromising workforce productivity. It provides secure access and identity management capabilities, for both remote and on-site employees, third-party providers and industrial operators to access the business applications and privileged systems of the organisation.
To learn more visit: https://cyberelements.io/
Booth Number – 19

Cyscale
At Cyscale, we believe that a safer Cloud means a safer World. We need to do something extraordinary to have a better, easier and more secure way of designing & deploying any Cloud Infrastructure in AWS, Azure, GCP, OpenStack, VMWare, IBM Cloud, Oracle Cloud and even Alibaba Cloud. That is why we create amazing tools so that everybody can build & deploy cloud infrastructure with security in mind, knowing the costs upfront, while maintaining continuous regulatory compliance. All done automatically with just a few clicks. We are the first Cloud Management, Security and Compliance company empowering both regular people and cloud professionals with visual tools to meet this level of cloud automation and security. We’re Cyscale, born in the Cloud to protect the Cloud!
To learn more visit: https://cyscale.com
Booth Number – 27

Hornet Security
The Hornetsecurity Group is the leading cloud security provider in Europe, which protects the IT infrastructure, digital communication and data of companies and organizations of all sizes. Its services are provided worldwide via 11 redundantly secured data centers. The product portfolio covers all important areas of email security, including spam and virus filters, legally compliant archiving and encryption, as well as defense against CEO fraud and ransomware. With around 350 employees, the Hornetsecurity Group is represented globally at 10 locations and operates in more than 30 countries through its international distribution network. The premium services are used by approximately 50,000 customers including Swisscom, Telefónica, KONICA MINOLTA, LVM Versicherung, DEKRA and Claas.
Booth Number – 23

iboss
Securely connect any user on any device, to any application, from anywhere with our cloud platform.
The network perimeter has eroded, making traditional gateway security appliances ineffective at securing users who are no longer bound by network boundaries. Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures user Internet access from anywhere, including in and out of your physical network perimeter. Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. Since iboss cloud lives in the cloud, security goes where users go with elastic and instant scaling to meet the demands of the cloud-first future.
Booth Number – 14

Liverton Security
Lepide is a global provider of data security solutions. We help some of the world’s largest enterprises improve data protection, meet compliance, and detect/react to threats through our Data Security Platform. With our Data Security Platform, you can locate and classify your sensitive data, govern access and track permission changes, analyze user behavior to spot anomalies, and much more. Detect a wide range of threats, from ransomware to rogue insiders, and alert and respond automatically in real-time. Reduce your attack surface by identifying privileged users and implementing zero trust. Meet compliance 70x faster with pre-configured reports. All from one comprehensive, scalable solution.
For more information, visit: https://www.lepide.com/
Booth Number – 3

Liverton Security
New Zealand-owned and founded, Liverton Security offers a range of security-related products to government and commercial customers across New Zealand. They have over 20 years experience providing complex, challenging and top quality products and services to local and international organisations and to New Zealand government agencies. Liverton Security aims to deliver innovative solutions that provide customers with quality levels of protection when it comes to all things cybersecurity.
For more information, visit https://www.livertonsecurity.com/
Booth Number – 4

Macrium
Macrium Software protects the most valuable asset in the world – data. We’re laser-focused on providing the most reliable and effective data backup and recovery solutions possible. We’re dedicated to creating dependable software, providing quality service, and maintaining superior relationships with our customers and partners. Since our founding in 2006, millions of people across the world have chosen us, and you’ll find our easy-to-use solutions in homes, small businesses, public sector networks, and multinational companies. We are proudly headquartered in Manchester, with offices in London, and Denver, Colorado, USA.
To learn more visit: https://www.macrium.com/
Booth Number – 22

Octiga
Octiga helps organisations to achieve continuous and coherent security best practice with an easily and affordable SaaS cloud security solution. Whether you need to secure your organisation, or you are a IT service provider who juggles the security of your clients, Octiga is here to help.
We recognise that the world has changed. We must deliver a way so that business goes on without ignoring the risks any longer.
Disrupt Multi-client Security Management in Office 365 with Octiga.
-Get Single dashboard Visibility
-Deploy and monitor re-usable security templates.
-Prevent. Detect. Remediate.
-Get Compliance Trend Reports and Alerts
Booth Number – 25

Parallels
Parallels is a global leader in cross-platform solutions that make it simple and seamless for individuals and businesses to access and use the applications and files they need on any device or operating system. The company’s portfolio of products includes Parallels Desktop, Parallels Toolbox, Parallels Remote Application Server, and Parallels Mac Management for Microsoft SCCM. Parallels solutions are used by millions of customers worldwide, spanning for individuals and SMBs to large corporations, universities and government agencies. Headquartered in Bellevue, Washington, Parallels also has offices in Northern America, Europe Australia and Asia.
For more information, visit: https://www.parallels.com/
Booth Number – 21

Progress
Progress is the experienced, trusted provider of products designed with you, our customers, in mind. With Progress, you can build what you need, deploy where and how you want, empower your customers, then manage it all safely and securely. That way, you achieve growth even faster. Because Progress is not only our name, it’s also what we want you to achieve.
How? Our people launch into your challenges and inspirations like they’re our own—because they are. As proactive problem solvers, we are invested in your outcomes, helping you drive faster cycles of innovation, fuel momentum and achieve your goals—with confidence.
That proven approach is Progress that’s built around you.
To learn more visit: https://www.progress.com/
Booth Number – 13

Security Scorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated, operating in 64 countries. Founded in 2013 by security and risk experts Dr. Alex Yampolskiy and Sam Kassoumeh, SecurityScorecard’s patented rating technology is used by over 25,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the only provider of instant risk ratings that automatically map to vendor cybersecurity questionnaire responses – providing a true 360 degree view of risk. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees and vendors.
To receive an email with your company’s current score, please visit instant.securityscorecard.com.
Booth Number – 10

SolarWinds
SolarWinds is a leading provider of powerful and affordable IT management software. Our products give organizations worldwide—regardless of type, size, or complexity—the power to monitor and manage their IT services, infrastructures, and applications; whether on-premises, in the cloud, or via hybrid models. We continuously engage with technology professionals—IT service and operations professionals, DevOps professionals, and managed services providers (MSPs)—to understand the challenges they face in maintaining high-performing and highly available IT infrastructures and applications. The insights we gain from them, in places like our THWACK® community, allow us to solve well-understood IT management challenges in the ways technology professionals want them solved. Our focus on the user and commitment to excellence in end-to-end hybrid IT management has established SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.
To learn more visit: https://www.solarwinds.com/
Booth Number – 8

SonicWall
SonicWall has been fighting the cyber-criminal industry for over 30 years defending small, medium-size businesses and enterprises worldwide. Backed by research from the Global Response Intelligent Defense (GRID) Threat Network, our award-winning real-time breach detection and prevention solutions, coupled with the formidable resources of over 10,000 loyal channel partners around the globe, are the backbone securing more than a million business and mobile networks and their emails, applications and data. This combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of the more than 500,000 global businesses in more than 215 countries and territories. Originally founded in 1991.
To learn more visit: https://www.sonicwall.com/
Booth Number – 15

Tethet
Founded in 2006 as EXO5, Tether was born in the cloud and it shows. Our unique client-to-cloud platform is able to connect and manage millions of devices while providing real-time control of those endpoints, all from a responsive, cloud-native console. Today’s mobile enterprise operates equally inside and outside the corporate firewall – we believe cloud is the best way to meet this challenge.
From its inception, Tether has only served the enterprise market. Our products are optimized for mass deployment and enterprise-wide management, and address the unique security challenges enterprises face. This also means we protect our customers from questionable consumer-level approaches to security (such as webcam snooping and keystroke logging), which can expose enterprises to employee privacy issues. We not only make products that IT organizations love, we make products that employees are happy and comfortable to be governed by.
Our unique engineering culture combines a world-class software development team with an Advisory Board of industry software experts that keep Tether at the forefront of cloud security innovation. It’s why IT professionals are delighted with Tether from the very first time they try it. It’s why Tether has become the must-have security service for enterprises worldwide – and it’s why our technology underpins other security vendor’s cloud-based products as well.
To learn more visit: www.tethersecurity.com
Booth Number – 17

usecure
The world’s leading Human Risk Management (HRM) solution.
Traditional security awareness training is built on the idea that humans are the weakest link in the cyber security chain, with irregular, unengaging and generic training mistakenly seen as a quick fix.
usecure believes that humans can be the strongest line of defence against evolving cyber threats — they just need the right tools to get them there.
That’s why usecure has built the one-stop solution for empowering businesses to measure, mitigate and monitor their human cyber risk, without having to sacrifice productivity for protection.
Booth Number – 20

Veriato
Veriato is the leading provider of workforce behavior analytics, helping businesses monitor and analyze remote or hybrid workforce activity to boost productivity and keep sensitive data secure. Veriato is the partner of choice to deliver unmatched insights to help companies thrive in today’s complex work environment, especially in industries where sensitive data and IP is at stake. With powerful analytics that work across networks, in the cloud, and on-premise, companies gain complete visibility and understanding, ensuring maximum productivity and minimum risk.
To learn more visit: https://veriato.com/
Booth Number – 28

WatchGuard
For 25 years, WatchGuard has pioneered cutting-edge cybersecurity technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network and endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables more than 250,000 small and midsize enterprises from around the globe to protect their most important assets including over 10 million endpoints. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.
Booth Number – 12

Zyxel
Focused on innovation and customer-centricity, Zyxel has been connecting people to the internet for nearly 30 years. We keep promoting creativity which meets the needs of customers. This spirit has never been changed since we developed the world’s first integrated 3-in-1 data/fax/voice modem in 1992. Our ability to adapt and innovate with networking technology places us at the forefront of understanding connectivity for telco/service providers, businesses and home users.
Booth Number – 1

Bullwall
BullWall is a fast-growing international, privately owned digital innovator with headquarters in Denmark. BullWall is led with empathy and driven by passion, built on talent, dedicated to fight cybercrime in its many forms. Our overarching purpose is to break cybercrime and to combat digital fraud on file level – stop new and unknown strings of ransomware attacks in its tracks – and to provide solutions to report data breaches to regulators in a timely manner and secure way.
BullWall’s three innovative technologies; RC, FDS and IMS have the sole focus on analyzing and protecting organizations and their digital assets, whether it is protecting against a vicious ransomware attack, detecting advanced insurance fraud or reporting a data breach incident. Our people are the heart and soul of our company. We know what really matters; development, flexibility, recognition, and purpose, always with the customer in focus. BullWall has a global reach and provide cuttingedge technologies to customers within corporate, enterprise, and the public sector.

Solarwinds
Security Ratings
Get a holistic view of any organization’s security posture based on the collection, analysis, and attribution of millions of critical data points.
The result is an unprecedented cyber security solution that provides an accurate view of risk across your ecosystem, encompassing uncorrelated risk posed by individual poor-performing vendors as well as correlated risk precipitated across groups of companies.
SecurityScorecard enables users to view and monitor security ratings, easily add vendors or partner organizations, and report on the cyberhealth of their ecosystems.
It also provides access to breach insights and other analytics, compliance, collaboration, digital asset management, and additional tools that help enterprises better manage security and achieve business objectives.

Macrium
What is Macrium Reflect?
Macrium Reflect is image based backup and cloning software.
Macrium Reflect creates an accurate and reliable image of a hard disk or the partitions on the disk. In the event of a partial or complete system loss, you can use this image to restore the entire disk, one or more partitions, or even individual files and folders.
Using Macrium Reflect you can backup whole partitions or individual files and folders into a single compressed, mountable archive file. You can use this archive to restore exact images of the partitions on a hard disk so that you can easily upgrade your hard disk or recover your system if it breaks. You can also mount images as a virtual drive in Windows Explorer to easily recover Files and Folders using Copy and Paste.

Jetico
PURE & SIMPLE ENCRYPTION AND DATA WIPING SOFTWARE
Trusted globally by over 1 million customers, from the Pentagon to a family near you.
Use data encryption to protect your data from physical and virtual threats. Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost and stolen – from threats both virtual and physical.
On top of pains from unwanted access to sensitive information, penalties have become more severe and more frequent for non-compliance with regulations on financial, medical and personal data.
No information security strategy is complete unless data is properly protected at the source where it is stored.
Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance.
If you store sensitive data, encryption is essential. Contact us to get started today!
Use Cases for Data Encryption
Prevent Data Breaches
Unwanted access – for data stored on active computers, shared workstations or network storage vulnerable to prying eyes
Physical theft – for data stored on lost or stolen computers, laptops, external drives & USB sticks
Protection of Sensitive Information Against Threats
Personally Identifiable Information (PII)
Electronic Health Records (EHR)
Credit card data
Insurance & financial records
Student information
Client records & customer databases
Proprietary information or trade secrets
Emails
Chat histories
How to Encrypt Data with BestCrypt
BestCrypt by Jetico delivers speed, flexibility and confidentiality for anyone concerned with protecting sensitive information – from IT experts at large organizations handling trade secrets to people at home concerned with personal privacy.
Encryption doesn’t have to hurt. To protect stored data, strong encryption with BestCrypt is easy to use and light on your system.

Liquidware
ADAPTIVE WORKSPACE MANAGEMENT SOLUTIONS
Organizations pursuing a digital transformation will also be dramatically changing the nature of work for their employees, yet, too many still rely on outmoded approaches to supply workers with computing resources. Digital transformation can be stalled for organizations which do not re-architect their workspace provisioning approaches. Liquidware presents a roadmap for delivering modern workspaces for organizations which are undergoing digital transformation. Liquidware’s Adaptive Workspace Management (AWM) suite of products can support the build-out of an agile, hybrid platform and cloud workspace provisioning engine. Liquidware’s AWM solutions, including ProfileUnity, Stratusphere UX and FlexApp, deliver an efficient, cost-effective and equitable approach for delivering compute resources to their workforce.
Our solutions offer the following strategic benefits by:
Building on existing infrastructure so investments are not lost. Staff works with familiar approaches. Existing infrastructure and systems are not disrupted or displaced.
Offering a platform-agnostic approach in which workspace environments are heterogeneous. Organizations are freed from stove-piped structures that restrict growth. Existing processes are automated to facilitate higher levels of control, security and efficiency that sets the stage for comprehensive disaster recovery.
Enabling emerging technologies and approaches to be introduced into the environment seamlessly and quickly, enriching the user experience without increasing cost over time.
Aligning workspace design to user requirements and work modes, supporting the use of best-of-breed workspace technologies for an optimum end-user experience.
Enabling administrators to migrate and co-exist users across evolving platforms easily (Windows OS/application versions, and virtual, physical, cloud platforms, etc.).

Trustwave
Trustwave is a leading cybersecurity and managed security services provider that helps businesses fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. Trustwave is a Singtel company and the global security arm of Singtel, Optus and NCS, with customers in 96 countries. Watch our video to learn more about who we are and what we do.

Redflare
Simplified assurance for all your regulatory needs
red flare provides an enterprise wide solution that collects, collates, and communicates key information on the effectiveness of the management structure, processes and controls.

Data 443
Replace Several Products
Data Discovery, Classification and Governance
GDPR Compliance: 13 of the Required Articles
Classify information at rest and in flight – local, network, cloud and database
Discover PII, PCI, HIPAA and Confidential information – local, network, cloud and database
Report and remediate – security access controls – local, network, cloud and database
Respond to DSAR and remediation actions – local, network, cloud and database
Winners_art
Winner of *3* – 2018 Cyber Security Excellence Awards
Local devices, network, cloud and databases are all ‘in scope’ for data security
Supporting more than 200 file types and 400 types of databases, ClassiDocs is the only platform to classify, govern and discover across all of these data silos.
With support for leading cloud service providers like Microsoft, Dropbox, Google, Salesforce and others, ClassiDocs ensures you have accurate, up to date and continuously maintained classified datasets.
ClassiDocs gives you a full-enterprise view of the entire data estate.

Index Engines
Organizations have struggled with managing unstructured corporate data assets for decades. Understanding what they have, determining its value, and making smart management and governance decisions has always been a challenge.
Index Engines was architected to meet the challenges of today’s data center and deliver a highly scalable and efficient indexing platform across both primary and backup storage data environments. It provides search, reporting, disposition and preservation of unstructured user data in support of stakeholders ranging from IT to legal and security.
Index Engines’ architecture was designed from the ground up to support petabyte-class data centers with minimal resources or disruption to the environment. Clients, including top financial services, health care organizations and government agencies, turn to Index Engines to support their most mission critical information management, cyber security and governance challenges.

Netshield
Trusted Network Protection
Small and midsized businesses are entrusted with critical data as part of their mission. That data deserves the best protection possible, which is why Netshield offers affordable, manageable cybersecurity solutions designed specifically for small and mid-sized business networks. 60% of small businesses that experience a data breach will fail within 6 months – let us help stop breaches before they happen and protect your trusted relationships.