AlienVault provides unified security management and crowd-sourced threat intelligence solutions. Its solutions include Unified Security Management, a platform that enables mid-market organizations defending themselves against today’s advanced threats.

ArcMail provides email and data archiving solutions and offers the industry's fastest search functionality and is the innovator in email archiving by developing solutions for Gmail, IM, SharePoint, Salesforce Chatter as well as a Cloud Storage Gateway product.

Barracuda Networks offers industry leading products for three distinct markets. As the worldwide leader in content security appliances, Barracuda Networks offers products that protect organizations from threats over email, Web, and IM. With a strong security heritage, Barracuda Networks offers networking products that improve application delivery and network access with SSL VPN, Internet link load balancing, and server load balancing product lines.

Bitdefender works with government organizations, large enterprises, SMEs, and private individuals in over 150 countries. With 1,000 employees and a team of 500+ engineers and researchers, Bitdefender is one of the most innovative IT security software vendors in the world.

Digital Guardian provides data security solutions to protect data from insider and outsider threats. It offers data loss prevention solution that automatically blocks and controls only those behaviors that pose a threat to organization based on the user, event, and data type.

Fidelis protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks.
Products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities.

Infrascale’s Data Protection Platform is the most comprehensive available in the industry. Our technology represents the broadest product line in the industry, covering the most devices and operating systems, all managed from a single interface. Our products protect data both in motion and at rest, and provide a complete all-in-one data protection ecosystem, managed from a single pane of glass.

Jatheon Technologies-  helps clients from various industries to store, index and manage their digital communication data in a single repository. Proper access, management and easy retrieval of data is critical for reasons such as regulatory compliance, business productivity and preparedness for litigation. Jatheon empowers your organization to meet a wide range of compliance requirements, regardless of the industry or market it belongs to. Our clients include businesses, government agencies, educational, financial and healthcare institutions.

Proofpoint - Your people do business well beyond the bounds of traditional network perimeters and connected endpoints. Email, social media, and mobile devices are the new tools of the trade—and for cyber criminals, the new tools of attack. Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.

Radware's mission is to ensure application service levels are guaranteed at all times, in any operational scenario. Our DDos protection, application delivery and load balancing solutions optimize business operations, minimize service delivery degradation, and prevent downtime.

Safetica believes that every company – not just the large enterprises – deserve to know that their data is secure. Consequently their mission is to protect sensitive data from internal and external threats.

STEALTHbit's mission is to focus on protecting an organization's credentials and sensitive information. Their solutions monitor Active Directory, file servers, NAS, SharePoint, Exchange, and cloud repositories to identify sensitive files, ensure only the right people have access, monitor and log usage, and intervene proactively when content is abused and mishandled.