Back to top

Sponsors & exhibiting companies


CyberX delivers the only industrial cybersecurity platform built by blue-team military cyber-experts with nation-state expertise defending critical infrastructure. That difference is the foundation for the most widely-deployed platform for continuously reducing ICS risk and preventing costly production outages, safety failures, and environmental incidents.
Notable CyberX customers include 2 of the top 5 US energy providers; a top 5 US chemical company; a top 5 global pharmaceutical company; and national electric and gas utilities across Europe and Asia-Pacific. Strategic partners include industry leaders such as Palo Alto Networks, IBM Security, Optiv Security, DXC Technologies, and Deutsche-Telekom/T-Systems.
Customers choose CyberX because it's the simplest, most mature, and most interoperable solution for auto-discovering their assets, identifying critical vulnerabilities and attack vectors, and continuously monitoring their ICS networks for malware and targeted attacks. What's more, CyberX provides the most seamless integration with existing SOC workflows for unified IT/OT security governance.
For more information visit or follow @CyberX_Labs.

Today’s business environment is global and highly interconnected, increasing an organization’s probability of cyber threats. Organizations must remain secure, vigilant, and resilient to minimize risk and optimize new opportunities. Do you have the right cyber risk strategy to power performance? Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient?not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks.


Tufin is the leader in Network Security Policy Orchestration for enterprise cybersecurity. More than half of the top 50 companies in the Forbes Global 2000 turn to Tufin to simplify management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the company’s award-winning Tufin Orchestration Suite? to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries. Find out more at

Menlo Security protects organizations from cyber- attacks by seeking to eliminate the threat of malware from the web, documents, and email. Menlo Security’s cloud-based Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions.

Intelligent Wave primarily sells software solutions based on in-house developed package software. The main clients are in the financial services industry; core products focus on credit card transaction processing, low-latency secure communications, and data protection. The company’s businesses are broadly divided into the two segments: mainstay Financial Systems Solutions and Security Product Solutions.
In the Security Product Solutions segment, Intelligent Wave offers package base systems and technical support services for various industries and sectors, with a focus on in-house package software for internal information security and third-party package software for cybersecurity mainly from Israel. The segment has products including CWAT, an in-house software for internal information security and Traps, illusive networks, SecBI, ayhue, CyberArk and so on, a third-party product for cybersecurity.

Allot Ltd. (NASDAQ, TASE: ALLT) is a provider of leading innovative network intelligence and security solutions for service providers worldwide, enhancing value to their customers. Our solutions are deployed globally for network and application analytics, traffic control and shaping, network-based security services, and more. Allot’s multi-service platforms are deployed by over 500 mobile, fixed and cloud service providers and over 1000 enterprises. Our industry leading network-based security as a service solution has achieved over 50% penetration with some service providers and is already used by over 20 million subscribers in Europe. Allot. See. Control. Secure. For more information, visit

Developed by two of the world’s preeminent mathematicians, ThetaRay brings a transformational approach to big data analytics, isolating problems buried beneath big data and pinpointing opportunities concealed within traditional systems. Drawing inspiration from the manner in which complex systems operate in nature, ThetaRay’s patented algorithms grow more intelligent over time, yielding objective results in seconds.
Revolutionary in its approach, ThetaRay lets math discover meaning in the data without making any pre-assumptions. Its rule-free approach pinpoints items that matter now and in the future, mapping them in context, time and location.With ThetaRay, clients obtain measurable value in days and achieve full deployment in a matter of weeks. From that point on, ThetaRay’s system runs automatically, without intervention from client personnel and with the continuous support of an adaptable platform.TheraRay helps financial institutions, cyber security divisions and critical infrastructure businesses make giant strides in managing risk and generating new growth. With ThetaRay’s solution, organizations become as resilient as these times require: safeguarding assets, recovering from setbacks and capturing future growth amid continuous change.

Verint® (Nasdaq: VRNT) Cyber Intelligence Solutions is a leading provider of security and intelligence data mining software. Our solutions are built upon 25 years of domain expertise and are deployed across a wide range of applications, including cyber threat detection and response, predictive intelligence, advanced and complex investigations, security threat analysis, and electronic data and physical assets protection.   In the world of cyber security, Verint transforms how organizations around the world defend themselves against complex threats. We empower nations, governments, critical infrastructure providers and enterprises to anticipate cyber-attacks, prioritize risks, automate investigations, and accelerate their path from detection to response.   

This electronic message may contain proprietary and confidential information of Verint Systems Inc., its affiliates and/or subsidiaries. The information is intended to be for the use of the individual(s) or entity(ies) named above. If you are not the intended recipient (or authorized to receive this e-mail for the intended recipient), you may not use, copy, disclose or distribute to anyone this message or any information contained in this message. If you have received this electronic message in error, please notify us by replying to this e-mail.

ALog is a uniform log management solution to obtain access history to the enterprise-critical data without residing agent. It can detect security incident based on the information from servers, which doesn't rely in endpoints. ALog has been winning Japan's top share since it's release.

Cybereason, creators of the leading cybersecurity data analytics platform, gives the advantage back to the defender through a completely new approach to cybersecurity. Cybereason offers endpoint detection and response (EDR), next-generation antivirus (NGAV), and active monitoring services, all powered by its proprietary data analytics platform. The Cybereason suite of products provides unmatched visibility, increases analyst efficiency and effectiveness, and reduces security risk.

Zimperium, Inc. is a global leader in mobile security, offering real-time, mobile thread defense on-device protection against both known and unknown Android and iOS threats. The Zimperium platform leverages our award-winning machine learning-based engine, z9, to protect mobile data, apps and sessions against device compromises, network attacks and malicious apps. To date, z9 has detected 100% of zero-day mobile exploits without requiring an update or suffering from the delays and limitations of cloud-based detection?something no other mobile security provider can claim.Learn more at or our official blog at

Sompo Cyber security is providing optimum solutions according to clients cyber risks.
We provide a wide range of services in a one stop platform
(1) Vulnerability assessment
We assess and report vulnerabilities in customers’ systems (such as operation systems, middleware and applications). Our assessment and report are provided based on customers’ requests and system risk level. We provide a wide range of services from initial assessment by automatic solutions to advanced assessment as penetration tests operated by highly skilled experts (world-class white hackers).
(2) Policy formulation, system improvement, certification support
We assess customers’ cyber environment and systems holistically and support construction of effective management systems, security planning, formulation of policies and guidelines and acquisition of certifications.
(3) Cyber security enhancement service
We support employee education and training, as how to respond to targeted email attacks. We support enhancing and improving the customers’ cyber security, including measures to prevent unauthorized external access and malware attacks.
(4) Monitoring and detecting attacks, and responding to incidents
We provide security monitoring and operation services as security device monitoring, unauthorized access analysis, and incident response.