WEST 2023 Sponsorship and Branding Opportunities

AFCEA and the U.S. Naval Institute have developed an enhanced sponsorship program for WEST 2023 that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure than at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback from sea service warfighters, and where industry thought leaders will discuss and demonstrate sea service solutions? Sponsorship opportunities are offered at a several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships and Advertising Opportunities. Branding Opportunities will be available soon.

Have an idea for a sponsorship not listed below? We are here to ensure you have the best conference experience. We are happy to create a custom sponsorship package to meet your specific needs. Let us know your vision, objective and budget and we’ll create a customized opportunity just for you.

All Sponsorships and Branding Opportunities for WEST 2023 are now closed.


St. Paul,  MN 
United States
  • Booth: SPONSORS

SelectiveTRUST™ by KnectIQ accelerates Zero Trust transformation for government partners. Prevents credential-based initial intrusions. Quantum safe data protection with true point-to-point information security. Real time cryptographic flexibility, data agility, and high availability for full spectrum C5ISR&T. Secures reliable connectivity to all trusted devices, everywhere, in real time, in any existing environment, at any classification level.


  • SelectiveTRUST
    A Zero Trust based software platform that securely authenticates and authorizes access for every device, everywhere, in any environment, at all classification levels, in real time. Makes secure communications within the JADC2 framework possible....

  • ----- Schedule a 15 minute in-person chat with CEO Ken Morris during the conference -----

    ----- Schedule a 15 minute in-person chat with Erik Cyre, CDR USN (Ret) during the conference -----

    SelectiveTRUST™ delivers the flexibility, scalability, and unique security that makes it ideally suited to support advanced military communications systems, such as Link-16, SatComm, and Joint All-Domain Command and Control (JADC2).

    SelectiveTRUST is a system and method that establishes a zero-trust ecosystem for secure data transfer. Using a software-based solution, it securely authenticates and authorizes access for an organization’s entire digital enterprise – every device, everywhere, in any environment, at all classification levels, in real time.

    SelectiveTRUST provides secure authorization and authentication of communication between trusted devices by replacing traditional public key infrastructure with unique single-use encryption keys dynamically generated for each communication between trusted devices. The trust relationship is established in real-time between two or more endpoints, guaranteeing that only the sender and receiver(s) in a pre-established trust relationship can encrypt and decrypt the communication.

    Our Device Access Security Broker (DASB) serves as a trusted third-party element that generates unique, one-time encryption keys only at the sender and receiver devices, in real-time for every communication. The DASB is an automated system that can be deployed on-premises or in a cloud environment such that the responsible organization controls which devices may establish a trust relationship with specified other devices.

    Importantly, the DASB never has access or otherwise handles the data transmitted between devices. KnectIQ achieves this by separating communications between a Control Plane and a Data Plane.

    KnectIQ endpoint software can be deployed on any type of device, on any network (U, S, TS, SAP) and is compatible with any data delivery mechanism (5G, SatComm, RF, internet-based, etc.). It can also scale indefinitely, enabling deployment in a C5ISR&T Fusion and Distribution Center, such as a combined air operations center (CAOC), or in combined arms operations incorporating manned and unmanned systems.

    How it Works:

    When a Sender transmits data, the device establishes a secure tunnel to the DASB requesting a unique entropy set. The DASB also provides information about the intended Receiver(s). The Sender's device automatically generates a unique symmetric key that is used to encrypt the Sender’s data. The encryption key is then destroyed. The Sender’s encrypted data is then transmitted using any transmission modality to the Receiver(s). The DASB sends the unique entropy set to the Receiver(s). The Receiver(s) device generates the unique encryption key and subsequently decrypts the data. The decryption key is then destroyed. This process is near-instantaneous and can operate at the enterprise-level, handling thousands of communications per second.

Contact this Exhibitor/Sponsor

Complete the information below and click "Send Email" to send an email to this exhibitor/sponsor. To return to the previous screen without saving, click "Reset".