Please contact us if you want to list your company here.


Siemplify’s security orchestration, automation and incident response platform removes common security operations roadblocks, boosting SOC performance and effectiveness. The platform is built atop a powerful context-based automation and orchestration engine that is delivered through a simple workbench designed to unify and streamline day-to-day security operations processes.

Siemplify security orchestration and automation uniquely enables security operations teams to:

  •   Automatically group related alerts into cases to combat alert fatigue.
  •   Understand relationships between affected entities with deep context-based investigation-
  •   Visualize and replay the threat storyline to instantly zero in on truly malicious activity
  •   Create repeatable, automated playbooks using an intuitive, code-free drag-and-drop playbook editor.
  •   Infinitely customize playbook logic using a Python-based or advanced integrated development environment (IDE).
  •   Manage the SOC from a single console

Founded by security operations experts, Siemplify was born from extensive experience building, running and training security operations teams around the globe. That’s why leading enterprises and MSSPs worldwide leverage Siemplify as their SOC workbench, tripling analyst productivity  and driving down mean time to respond by 70%.

For more information, visit


For 15 years, ScienceSoft has been protecting information of their customers. As an IBM Gold Business Partner, the company provides full-scale information security consulting services and proprietary information security solutions. ScienceSoft’s experienced team of certified security specialists has implemented projects in Banking and Finance, Healthcare, Public Sector, Retail, Telecom, Oil & Gas and other industries.

ScienceSoft helps customers to protect their cyberspaces from APT, ransomware and insider malicious activities by advancing in Security Information and Event Management (SIEM) as well as in Identity and Access Management (IAM).

Besides that, ScienceSoft provides vulnerability assessment and penetration testing services. The company thoroughly examines customers’ infrastructures to make sure all threats are identified and dealt with before any real cyberattacks are attempted.

Customers’ geography: 30+ countries including Fortune 500 companies.

Key customers:  Tieto, Robert Half, NASA JPL, RBC Royal Bank.

For more information visit: 


Alien Vault logoAlienVault’s mission is to enable organizations with limited resources to accelerate and simplify their ability to detect and respond to the growing landscape of cyber threats. Our Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by threat intelligence from AlienVault Labs and the AlienVault Open Threat Exchange—the world’s largest crowd-sourced threat data network — AlienVault USM delivers a unified, simple and affordable solution for threat detection, incident response and compliance management. AlienVault is a privately held company headquartered in Silicon Valley and backed by Trident Capital, Kleiner Perkins Caufield & Byers, Institutional Venture Partners, GGV Capital, Intel Capital, Jackson Square Ventures, Adara Venture Partners, Top Tier Capital and Correlation Ventures.

AlienVault, Open Threat Exchange and Unified Security Management are trademarks of AlienVault. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies.

For more information visit

Duo Security

Duo Duo SecuritySecurity is the world’s leading cloud-based two-factor authentication service. Duo’s patented technology enables organizations to protect their logins in as little as 15 minutes. Over 2,500 organizations in more than 80 countries rely on Duo Security to protect their networks, services and applications. Learn more and try it for free at Follow Duo Security on Twitter at: @duosec.


LogoCharities operate heavily in Cyberspace and are often custodians of sensitive information ranging from personal information on sex abuse and child abuse, to health issues like cancer, mental illness and diabetes. The problem is, most charities have this information exposed and often inadequately protected, making it the perfect game for the cyber attacker. They often find it difficult to attract or afford the wide range of professionals required to protect their treasure trove of personal data. is a platform that enables professionals to donate at least one day of their time to help charities with their cyber security needs.


1801SysAid are leading IT Service Management providers. Offering help desk software, asset management, knowledge management, mobile help desk, and modern ticketing systems, SysAid provide only the best in ITIL/ITSM software. Check out our blog to follow the latest trends, news, and interviews from within the world of ITIL and ITSM.

Here at SysAid, it’s your success and productivity that matters greatest. We strive to help you help your customers and make the entire IT service run as smoothly and effectively as possible.

Now having several years of experience behind us, and an established spot within the IT community, we better understand the challenges and opportunities that a business will frequently face. Combining this with our second to none existing industry best practices allows us to further help businesses and organisations maximise current and future ITSM and IT management needs.

Visit our site today and download your free trial, and start making your IT work for you.

XO Communications

XO Commuxologonications is acknowledged as the industry-leading provider of network security services to businesses and enterprises both globally and internationally. XO Communications customizes each solution to meet the specific needs of their customers to help them safeguard their business information and to increase productivity with their cost-effective and flexible network security solutions. Protect your customers and your companies’ private data from outside attackers by contacting XO today to learn more on how they can help your business and provide you with the support you need. Visit their website today at, or follow them on Twitter at @XOComm.


Shred-it Logo

Shred-it specialises in providing tailored document destruction services that allow businesses to comply with legislation and ensure that the client, employee and confidential business information is kept secure at all times. Through our strict chain-of-custody processes, reliable on-time service and a global network of local service centres, Shred-it provides the most secure and efficient confidential information destruction service in the industry. For more information please visit:

Advanced Systems International

USB LockAdvanced Systems International. Global reach Company dedicated to data security software design, development, support, and licensing. Our goal is to continue to provide straightforward, effective solutions that do the job better, utilizing less system resources, with emphasis in easy of use, and real-time response. Founded in 2004 with the clear understanding of the urgency and importance of protecting organizations, and individuals information assets from the risk presented by the unauthorized use of plug & play driver-ready, storage-capable devices. Today our network endpoint security software solutions USB Lock RP – USB Lock RP Plus – USB Lock RP E are used to protect organizations data assets worldwide. More information visit: 


Random Storm

RandomStorm is a UK-based network security; vulnerability management and compliance company, that is focused on providing enterprise-level, proactive security management tools and services. RandomStorm’s experienced and certified security experts are able to offer customers a wide range of integrated world-class security vulnerability assessment and professional security services. Covering initial consultancy and gap analysis through to network and application testing, as well as managing client’s business compliance accreditation process, RandomStorm aims to work with organisations to ensure that their security investment is fully optimised on a 24/7/365 basis.

RandomStorm’s core products are supported by a range of complementary monitoring, alerting and remediation tools and services developed under the RandomStorm Open Source Initiative.

RandomStorm is a CESG CHECK security consultancy as well as a Qualified Security Assessor (QSA) and an Approved Scanning Vendor (ASV) for the Payment Card Industry Data Security Standard (PCI DSS).  Please visit for further information.


F5 Logo

F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to


Vasco BlogVASCO is a world leader in strong authentication and e-signature solutions, specializing in online accounts, identities and transactions. As a global software company, VASCO serves a customer base of approximately 10,000 companies in over 100 countries, including more than 1,700 international financial institutions. In addition to the financial sector, VASCO’s  technologies secure sensitive information and transactions for the enterprise security, e-commerce and e-government industries.


StorageIO VendorServer and StorageIO (StorageIO) is an vendor independent information technology (IT) advisory consultancy firm providing services to the IT industry. Our focus is on real-world advisory, consulting, lab validation and education services involving data infrastructure technologies, techniques, trends, best practices and topics.

Bulb Security

Bulb_SecurityBulb Security is the recognized leader in Network & Mobile Security.  They specialize in Vulnerability and Penetration Testing along with the sophisticated staff training and auditing necessary for a comprehensive Cyber Security program.  Bulb Security is 100% committed to protecting infrastructure through customized Security Solutions and Information Security Assessments tailored to a company’s needs.  These companies range from large, highly specialized federal government institutions along with state and local municipalities to private businesses looking to protect proprietary data through automated security workflows in this age of wireless and mobile.

The company’s founder, Georgia Weidman was hand selected by DARPA to develop an open source tool for smartphone penetration testing; introducing the world to a solution for assessing the security posture of smartphone devices in an enterprise.  Her perspicacious method of training and consulting has not only earned her the opportunity to teach at the coveted conferences such as Black Hat and Derbycon conferences but also the responsibility of protecting our most vulnerable data.  In this day and age of data breaches, smartphones, and spying, you need someone whose only interest is protecting you, who not only has the technical expertise to deliver, but can do so in a manageable and affordable way while not impeding you company’s goals.