Exhibitor Press Releases


  • Experts from the NSA and Darktrace discuss AI, invisible security, and why you really need to change your passwords.

  • Company remains committed to building on vendor-agnostic, open-platform approach to support the heterogeneous environments of MSPs

  • NCP Extends its Product Family for Juniper SRX and vSRX Gateways

    04 Dec 2018 Caroline Smith, Springboard Public Relations

    The NCP Exclusive Entry Client Version 11.2 Provides Enhanced Security for Small to Medium-Sized Companies

  •  Alert Logic, the SIEMless Threat Management™ company, today announced it has teamed up with Amazon Web Services, Inc. (AWS) to release support for two new native runtimes for AWS Lambda—Erlang and Elixer—adding Bring Your Own Language (BYOL) functions to AWS Lambda, allowing a larger pool of developers to leverage the platform. Developed by Alert Logic, this new support will allow Erlang and Elixer languages to run natively as AWS Lambda functions.

  • Tripwire Enterprise Now Collects Digital Forensic Data to Support Incident Response

    PORTLAND, Ore. – November 14, 2018 – Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, today announced that Tripwire® Enterprise now features the ability to collect digital forensic data in the event of a data breach.

    "Tripwire Enterprise monitors systems in real-time for changes that could be indicative of a breach," said Tim Erlin, vice president of product management and strategy at Tripwire. "When a security breach is suspected, Tripwire Enterprise's new Incident Response Rules can be used to collect in-depth data on what happened on a system to speed and support incident response."

    Tripwire Enterprise delivers forensic data from Windows-based systems file, network, process, USB, and USB artifacts. In each area, Tripwire Enterprise:

    • File Access: Identifies files which have been opened, searched for, or executed, including trusted Microsoft Office locations which may be abused by an attacker.
    • Network Artifacts: Identifies active network connections. These help in identifying whether malware is communicating with command and control servers, and check for active lateral movement from the endpoint.
    • Process Execution: Provides evidence of processes which have been executed on an endpoint. Tripwire Enterprise can show both actively running and executables which have evidence of having been run in the past.
    • USB Usage: Provides a list of actively installed USB drives, drives which have been installed in the past, and any mount points which may be set up on the endpoint. 
    • User Activity: Identifies actions the user has taken on the endpoint and what a user was searching for to help determine a malicious actor’s goal.
  • IoT-Security Kongress

    14 Nov 2018 Uniscon GmbH

    How can data from networked vehicles be evaluated in a legally compliant manner? And what other applications are there for a highly secure cloud platform? At the first IoT Security Congress organized by the TÜV SÜD subsidiary company Uniscon, everything revolved around IoT, data protection and IT security.

  • Eric Marterella, brings over two decades of global leadership and cyber security experience to digital risk and high-growth firm

  • PORTLAND, Ore. – October 31, 2018 – Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, announced today that the latest version of its vulnerability management solution, Tripwire® IP360™, Version 9.0.1, has achieved Common Criteria Evaluation Assurance Level 2 augmented with Flaw Remediation (EAL2+). Tripwire IP360 is currently one of 12 “Detection Devices and Systems” recognized globally as being Common Criteria Certified, which also includes Tripwire's secure configuration management solution Tripwire Enterprise.

    Internationally recognized as the evaluation standard for IT security products, Common Criteria certifications provide independent assurance to government and commercial agencies that the products being purchased satisfy security requirements for information systems.

    “Tripwire IP360 has a long history of enabling governments to accurately prioritize risk and take action on their most exposed assets,” said Mitchell Jukanovich, vice president of federal at Tripwire. “Achieving the most current Common Criteria Certification illustrates Tripwire’s continuing commitment to meet increasingly stringent U.S. national and international security standards and is assurance that we’re bringing the most secure products to market.”

    The certification was issued by the Communications Security Establishment (CSE), the Government of Canada’s center for IT security expertise, advice and guidance, and a participant of the Common Criteria Recognition Arrangement (CCRA). The CCRA brings together 28 nations who agree to accept a unified approach to the evaluations of IT products and protection profiles for information assurance and security. 

    As an industry-leading vulnerability and security risk management solution, Tripwire IP360 provides a comprehensive view of vulnerability risks across hybrid environments, including on-premise, in the cloud and in container-based environments. It offers both agent-based and agentless scanning options for a deeper, richer assessment of vulnerability risks, and prioritizes security risks within business context by combining business asset values with vulnerability scores.

    Tripwire’s award-winning cyber integrity solutions are used across every DoD Branch service, including Army, Air Force, Navy, Marine Corps, numerous intelligence agencies and more than 85 percent of the Federal Government’s civilian agencies.

    The Tripwire IP360 certification report is available at https://www.commoncriteriaportal.org/files/epfiles/383-4-446 CR v1.0.pdf 

    For more information on Tripwire IP360 please visit: https://www.tripwire.com/products/tripwire-ip360/

  • Through ongoing integration development with RapidFire Tools, Kaseya also announces Kaseya Compliance Manager, an all-in-one comprehensive compliance IT management security solution for MSPs and internal IT

  • Tripwire for DevOps Saas Debuts

    08 Aug 2018 Ray Lapena

    Tripwire for DevOps Saas Debuts – The First Dynamic Container Vulnerability Assessment Service for the DevOps Pipeline

    PORTLAND, Ore. – August 08, 2018 – Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, today announced the debut of Tripwire® for DevOps. After pre-releasing DevOps capabilities in an early access program earlier this year, Tripwire has launched Tripwire for DevOps as a generally available software-as-a-service (SaaS) solution.  Tripwire for DevOps integrates security assessments into the DevOps life cycle and toolchain, providing visibility into the security state of underlying application infrastructure throughout the pipeline. 

    Complementing application and source code analysis tools, Tripwire for DevOps assesses container images and container registries for vulnerabilities, with additional features, such as the ability to assess configurations for compliance with security policies, in near-term release. It integrates with the CI/CD pipeline to ensure components meet security standards as they move through build and deploy DevOps stages.

    "As organizations move their application and service deployment to a DevOps model, it's vital that they integrate security into the actual process," said Tim Erlin, vice president of product management and strategy at Tripwire. "In addition to securing custom code, businesses need to ensure that the application infrastructure and inherited code remain secure throughout the life cycle. We're excited to introduce a solution that embodies what's been referred to as 'DevSecOps,' true integration of security into the DevOps workflow."

    Tripwire for DevOps fully automates the assessment of container images in the CI/CD pipeline and can dynamically test live instances of application containers in an isolated, cloud-based sandbox. It can be used to establish quality gates at each stage to fail builds that don't meet defined security standards. It can also be used to simply monitor and assess repositories, providing visibility of potential risk without interfering with the roll-out process.

    In a report, Gartner analysts said, "Traditional application security testing relies on heavyweight, one-time gating inspections, typically performed during testing, taking days if not weeks and requiring security professionals to perform them. This won't work and it won't scale for DevSecOps. DevOps emphasizes continuous feedback and improved automation. Security needs to adopt and support a mindset where security starts at the very beginning of the service creation, throughout the DevOps processes, and is continuous, automated and improves with each subsequent iteration."*

    • Simplifying deployment and set-up, Tripwire for DevOps is a fully self-contained SaaS solution that features:
    • Integration with popular DevOps CI/CD build tools, including Jenkins, & TeamCity, with additional tools coming soon.
    • Compatibility with all Docker v2 repositories for container assessment.
    • A complete REST API and command line interface for DevOps engineers to write custom integrations.
  • NCP engineering Bridges the Gap Between Operational IT and Product/Production IT

    10 Jul 2018 Caroline Smith, Springboard Public Relations

    NCP Secure Enterprise Management Connects IIoT Security and Classic Remote Access

  • New functionality tackles publicly exposed cloud data; core secure configuration functionality now supports Google Cloud Platform

    PORTLAND, Ore. -- (BUSINESS WIRE)--Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, today announced expanded support for cloud environments with Tripwire® Cloud Management Assessor (CMA). The solution now features File Integrity Monitoring (FIM) capabilities for addressing publicly exposed data in the cloud, and its core secure configuration management functionality now supports all major cloud providers, including Google Cloud Platform.

    "Tripwire is dedicated to helping organizations implement critical security controls in their environments, especially as these environments grow more complex with the adoption of hybrid and multicloud models," said Tim Erlin, vice president of product management and strategy at Tripwire. "We've expanded our capabilities to help organizations keep their cloud environments properly configured and prevent inadvertent exposure of their data."

    New capabilities for addressing publicly exposed cloud data

    Tripwire CMA's new File Integrity Monitoring (FIM) capabilities allow organizations to discover publicly exposed cloud instances or "buckets." In light of several recent incidents where sensitive information was mistakenly left exposed on cloud servers, Tripwire CMA can be used to ensure buckets are properly configured and data is kept secure.

    The new FIM capabilities currently cover AWS S3 and Azure Blob and provide change monitoring of files stored in the cloud, as well as providing alerts to public-facing files and flagging suspicious or unauthorized changes. Additionally, these capabilities provide actionable information for mitigating issues.

    Secure configuration expanded to support all major cloud providers

    Tripwire CMA was launched in 2017 to help customers determine the security state of their cloud deployments by gathering, analyzing and scoring configuration data. It ensures that consoles are securely configured according to Tripwire policies, enabling customers to follow industry best practices like the Center for Internet Security (CIS) benchmarks. In addition to supporting AWS and Azure, Tripwire CMA’s core security configuration management functionality has expanded to include Google Cloud Platform. The cybersecurity solution monitors configuration changes that may affect the confidentiality, integrity or availability of a user’s cloud assets.

  • Echoworx President and CEO Michael Ginsberg says encryption has become part of the normal business process to prevent against data breaches and cyber-attacks and using it to automate processes has bee ...
  • What exactly is IT security in 2018?

    16 Mar 2018 SecuLution

    Every year even big global players are involved in new costly attacks of cyber criminals. What they all have in common is the use of protection measures that staeyed the same for the last 30 years. But now they start loosing track of how the protection works and outsource every part of it to third party vendors instead of taking a chance and start all over with a new way of addressing an increasing issue that is IT-Security.

  • With over 2,600 members, the Security Institute is the leading organisation for security professionals in the UK. Membership benefits include excellent networking opportunities at educational and social events at UK-wide venues, special interest groups, careers support and partnership opportunities between the Institute and other specialist organisations.

  • Sophos

    13 Mar 2018

    Sophos will be located at stand number S2410!

  • London, UK - January 30, 2018 - With a growing reliance on the cloud and an increasing number of high-profile data breaches in the media, the must-attend Cloud Security Expo returns to London this Mar ...
  • Crest

    13 Mar 2018

    What is CREST

    A not for profit organisation that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry.


  • Elite Business are passionate about championing startups and SMEs with fresh ideas. Every issue covers up-to-the-minute content and presents a unique angle on the things entrepreneurs need to know, from automation to alternative finance. If you want a finger on the pulse of entrepreneurial Britain, then look no further.

  • CyberArk to Dramatically Simplify the User Experience for Privileged Business Users and Cloud Administrators While Extending Proactive Security Controls

    NEWTON, Mass. and PETACH TIKVA, Israel - March 12, 2018 CyberArk (NASDAQ: CYBR), the global leader in privileged account security, today announced the acquisition of certain assets of privately-held Vaultive, Inc., a cloud security provider. The deal closed today.

  • StayPrivate has launched a free email encryption service in response to the need for companies to keep communications secure under GDPR. This will be showcased at Cloud Security Expo 2018.

    StayPrivate started by ex-bankers Andrew Brogden and Rob Reid in 2014 uses technology developed by an ex-NATO and MOD cyber security expert to provide encrypted email, file sharing and messaging.

    Compatible with all email accounts and devices, it ensures safe and secure 2-way communication between businesses and their external contacts, both corporates and individuals.

  • Forcepoint Web Security adds additional CASB functionality with real-time, inline visibility and control of sanctioned enterprise cloud applications

    • Forcepoint Web Security and Email Security available with industry-first single pricing model for SaaS, hybrid or on-premises deployments for budget flexibility
    • Forcepoint V20000 appliance for Web, Email and Data Security delivers twice the performance of existing model, with support for more than 8,000 users
    • Forcepoint NGFW user dashboard speeds actionable understanding of user activity and extends online protection with Web Security integration
    • Forcepoint secures U.S. government agency missions with industry’s only risk-adaptive protection solution available through Continuous Diagnostics and Mitigation program
  • Jscrambler raises more than US$2.3 million in a Series A round led by Sonae IM with the co-investment of Portugal Ventures.

    Jscrambler is leader in JavaScript application security and its list of customers includes some of the Silicon Valley giants in sectors such as streaming, e-commerce and gaming and also Fortune 500 organizations in the banking and healthcare sectors.

  • Reblaze Technologies will be demonstrating several new capabilities of their cloud web security platform at the Cloud Security Expo conference.

    The Reblaze platform is a cloud-based SaaS application suite, providing comprehensive web security. It includes a next-generation WAF (Web Application Firewall), DDoS protection, advanced bot mitigation, and more. Recent additions to the platform include one-click deployment for users of Google Cloud Platform and full support for DevOps.

    “Reblaze Technologies is a Google Cloud Security Partner, and our platform provides robust web security to Google Cloud Platform users,” said Reblaze’s CTO, Tzury Bar Yochay. ”Now we’ve made it even easier to get started using Reblaze, by integrating it with Google’s Cloud Launcher.

    “Deploying Reblaze through Launcher can now be done from Google’s Cloud Platform website.

    Two clicks is all it takes to launch our web security platform and have it protecting your web assets, Also, we’ve completed adding full support for DevOps and continuous deployment. Reblaze not only provides an API for notification of new deployments, it also uses active machine learning to immediately adjust and adapt to them” Bar Yochay said.

    Reblaze Technologies is a Google Cloud Security Partner, an AWS Advanced Technology Provider, and a PCI-DSS certified service provider.




Diamond Sponsor

Platinum Sponsor

VIP Lounge Sponsor

Theatre sponsor


Gold Sponsor

Gold Sponsor

Silver Sponsors


Silver Sponsors


Silver Sponsor


Silver Sponsor



Headline Media Partner


PR Partner


Media/Event Partners