Curtiss-Wright Defense Solutions is an industry-leading supplier of proven tactical & deployable communications products for complex and demanding applications. We are recognized around the world as one of the most innovative designers and manufacturers of rugged solutions for deployment in the harsh environments of aerospace and defense applications.
Archon is the industry’s only purpose-built end-to-end solution for CSFC protected Secure Remote Access, enabling the transfer and access to sensitive data from “Any Edge” through enterprise class approaches of CSfC. Through the combination of military-grade protection and commercial technology, we’ve created a collection of uniquely secure, cutting-edge resources that offer cloud connectivity anywhere in the world. At Archon, our CSfC-compliant hardware and service solutions for the tactical and enterprise data users make securing your Edge simple, fast, and cost-effective, while delivering usability, scalability and reliability to all end-users.
Ivanti, consistently recognized by Gartner and Forrester as a leader with deployments across IC, DOD, and Civilian Agencies provides solutions that make the Everywhere Workplace possible. In the Everywhere Workplace, Federal employees and contractors use myriad devices to access IT networks, applications and data to stay productive as they work from anywhere. The Ivanti automation platform, available from our FedRAMP certified cloud or on premise, provides agencies industry-leading unified endpoint management, zero trust security and enterprise service management solutions, providing a single pane of glass for enterprises to self-heal and self-secure devices, and self-service end users. 78 of the Fortune 100 have chosen Ivanti to discover, manage, secure and service their IT assets from cloud to edge to enterprise, and deliver excellent end user experiences for workers, wherever and however they work.
Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. Based in Austin, Texas, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries.
Founded in 1989 with the goal to secure data using public key cryptography, ISC specializes in the design and development of cybersecurity solutions for PKI credential management, encryption, authentication, and automated provisioning of relying applications.
Thales Trusted Cyber Technologies is a trusted, U.S. provider of cybersecurity solutions dedicated to U.S. Government. We protect the government’s most vital data from the core to the cloud to the edge with a unified approach to data protection. Our solutions reduce the risks associated with the most critical attack vectors and address the most stringent encryption, key management, and access control requirements.
In addition to our core solutions developed and manufactured in the U.S. specifically for the Government, we sell and support industry-leading, third-party commercial-off-the-shelf solutions. To mitigate the risks associated with procuring data security solutions developed outside of the U.S, we operate under a Proxy Agreement with DCSA for FOCI and CFIUS National Security Agreement.
Triitus designs and develops off-the-shelf security solutions that satisfy CSfC MACP and DAR requirements. Backed by years of experience serving the needs of DOD secret and TS classifications, Triitus provides an unrivaled ultra-secure environment. Boasting a transparent user-experience and endpoint performance on the latest commercial hardware, Triitus solutions enable voice and video streaming over enterprise VDI. Triitus is a must have for anyone needing a secure mobile workstation.
Aruba, a Hewlett Packard Enterprise company, is the global leader in secure, intelligent edge-to-cloud networking solutions that use AI to automate the network, while harnessing data to drive powerful business outcomes. With Aruba ESP (Edge Services Platform) and as-a-service options as part of the HPE GreenLake family, Aruba takes a cloud-native approach to helping customers meet their connectivity, security, and financial requirements across campus, branch, data center, and remote worker environments, covering all aspects of wired, wireless LAN, and wide area networking (WAN).
To learn more, visit Aruba at http://www.arubanetworks.
IT Veterans (ITV) is a technology consulting firm providing full lifecycle innovative solutions for Secure Mobility, IT Infrastructure Engineering, Cybersecurity, and Systems Administration. As an NSA approved CSfC Trusted Integrator, ITV has become a trusted partner for Secure Mobility across the U.S. Intelligence Community to include the DOD supporting DIA, USCENTCOM, U.S. Army Program Executive Office – Enterprise Information Systems, Naval Criminal Investigative Service, and the Department of Energy. Additionally, we host an off-site lab a.k.a Mobile Computing Collaboration Center to perform integration and security testing of mobility solutions.
NSA’s Laboratory for Advanced Cybersecurity Research (LACR) is responsible for enabling mission effectiveness by advancing the Science of Cybersecurity. LACR works in close collaboration across NSA, Industry, Acedemic, and Government Partners on short-term and long-term research activities. LACR has four main thrusts of research:
Apriva ISS is an NSA CSfC Trusted Integrator with over 11 years of experience designing, developing, deploying and operating both CSfC and HA communication solutions throughout the federal government and 5-eyes partners. In addition, Apriva’s MESA VPN and gateway solutions products provide security to tens of thousands of users across the federal government.
BYOS designs, builds, and delivers advanced Cyber Security Solutions
for network owners to protect, manage, and access their endpoints
on networks they can’t trust
BYOS technologies decouple the protection from the IoT/OT asset, making them invisible to the network by providing “DFMP” (Decoupled First-Hop MicroSegmentation Protection). This approach protects your assets against multiple attack vectors across OSI layers 1-5.
We allow your network owners secure remote access to their IoT/OT assets (from any trusted or untrusted network or device) while making it impossible for cybercriminals and adversaries to detect and target those assets. All attempts to scan, fingerprint, or enumerate are dropped at the BYOS Edge.
DIGISTOR, a CRU Data Security Group (CDSG) brand, provides CSfC-listed secure storage solutions for data at rest (DAR). CDSG is a leading provider of data security solutions and data transport and storage devices for government and military agencies, small and medium-sized businesses, the entertainment industry, corporate IT departments, data centers, and digital forensic investigators. Its other brands include CRU removable storage devices, ioSafe fireproof and waterproof data storage devices, and WiebeTech digital investigation devices.
For more than 40 years, INTEGRITY Global Security has safeguarded mission-critical endpoints. Our security solutions have been certified to the very highest level (EAL 6+) and have been deployed on commercial and U.S. military aircraft, in military radios and encryptors, and in safety-critical and purpose-built systems in the medical, automotive, and industrial industries – where a breach can mean loss of life. IGS products are part of the largest CSfC deployment currently in use, proving the enterprise scalability, affordability and usability of our products.
The ISEC7 Group is a global provider of digital workplace and managed mobility services and solutions. The company was one of the first movers in mobilizing company and business processes. Today, ISEC7 serves more than 1,300 customers in 37 countries including numerous renowned companies and governmental organizations.
Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale — and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. For more information visit keyfactor.com
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.
Seagate Federal, Inc. (d/b/a Seagate Government Solutions) and Seagate Technology, PLC are committed to building highly secure storage devices for our commercial and federal government customers. Seagate Federal – through various collaborations and research agreements with the US Federal Government – is designing the next generation of storage devices for deployment in all environments and missions. In partnership with Cigent, an In-Q-Tel funded company, Seagate is selling secure storage solutions that meet FIPS 140, Common Criteria, and Commercial Solutions for Classified requirements. The Seagate BarraCuda 515 is a M.2 client drive that meets US Government data-at-rest security requirements and comes in 256 MB, 512 MB, 1TB and 2TB capacities. More information is available on our website at https://www.seagategov.com.
SecureXperts is an information security company focusing on high encrypted solutions and cybersecurity assessments.
Sigma Defense Systems is a leading technology company serving the Department of Defense (DoD), providing tactical communications systems and services for digital modernization since 2006. Our software-focused approach to tactical communications accelerates information collection and sharing for faster decision making and better mission outcomes.
Sigma Defense specializes in delivering solutions and services for JADC2, C5ISR, SATCOM and DEVSECOPS to customers in the Army, Navy, Air Force, Marine Corps, Space Force and other government agencies. Customers turn to Sigma Defense for engineering, program management, and logistics services for technical solutions that encompass ground, air, and space-based systems and sensors and network and satellite communications.
wolfSSL provides lightweight and embedded security solutions with an emphasis on speed, size, portability, features, and standards compliance.
wolfSSL is currently the leader in embedded FIPS certification. We currently maintain a FIPS 140-2 certificate for the wolfCrypt Cryptographic Module: #3389. Certificate #3389 includes algorithm support required for TLS 1.3 and can be used in conjunction with the wolfSSL embedded SSL/TLS library for full TLS 1.3 client and server support.
wolfEntropy SP 800-90B Software TRNG Source:
The wolfEntropy library is a Software based source of entropy that utilizes timing jitter variations of memory accesses in different cache levels to derive entropy. It will soon go through the FIPS-140-3 level 1 validation process.
wolfDLE (CSfC-listed and NIAP Cert) Double Layer encryption library uses the FlPS-validated wolfcrypt AES GCM encryptlon/decryptlon algorithm to secure files, and includes two API interfaces. The wolfDLE library is being evaluated for NIAP certifications, and once certified, It can be listed In the CSfC program.
For more information, come visit us at Booth #12.
BiometricUpdate.com is the leading news property that publishes shareable breaking news, analysis, and research about the global biometrics market.
We provide the world’s leading news coverage and information on the global biometric technology market via the web and an exclusive daily newsletter. Our daily biometrics updates, industry perspectives, interviews, columns and in-depth features explore a broad range of modalities and methods, from fingerprint, voice, iris, and facial recognition, to cutting-edge technologies like DNA analysis and gait recognition, related identification tools such as behavioral biometrics, and non-biometric identification methods such as identity document verification and telephone forensics. Our coverage touches on all applications and issues dealt with in the sector, including national security, mobile identity, and border control, with a special emphasis on UN Sustainable Development Goal 16.9 to provide universal digital identification and the ID4Africa movement.
Our global audience of 2,000,000 readers each year includes governments, law enforcement agencies, financial institutions and many other other vertical industries along with OEMs, service providers, system integrators, enterprise and industry professionals.
Inside Cybersecurity delivers must-read news to stay ahead of a multitude of federal rules and
requirements targeting federal and defense contractors, the tech industry, communications
and telecom companies, software developers, consumer products, and industrial operations
and manufacturing. Visit insidecybersecurity.com to sign up for a free, no-obligation trial or
contact [email protected] for detailed subscription information.
Inside Defense, featuring four weekly newsletters — Inside the Pentagon, Inside the Air
Force, Inside the Army and Inside the Navy — and the biweekly Inside Missile Defense, is the best,
most comprehensive online news service for defense and aerospace professionals. We
specialize in exclusive, hard-hitting news on Defense Department programs, procurement and
policy-making. Visit insidedefense.com to sign up for a free, no-obligation trial or contact
[email protected] for detailed subscription information.