by Tudor Cristea - Regional Sales Manager, Cortex With an automation-first approach, Cortex radically improves protection while transforming and streamlining today’s manual SecOps model.
by Paul Jespersen - VP WW Sales at Sandfly Security Linux is different so why are you using agent based solutions that was probably ported over from a Windows tools to protect your Linux hosts. Don't settle for lowest common denominator
by Umberto Sansovini - Territory Sales Manager at ENTRUST Cryptographic keys are some of your organization’s most precious assets. The value of any key is equivalent to the value of all the data it protects. If a key is compromised it’s
by Frank Lange - Technical Director at Anomali Breaches are inevitable, which is why security teams turn to technology to help overcome some of those challenges. Unfortunately, most solutions detect unknown threats by investigating suspicious activity observed in a customer’s environment,
by Yad Jaura - Ground Labs’ Head of Product Marketing Data is the lifeblood of a modern enterprise and its effective use is critical to an organization’s wellbeing. However, not all data is the same. Some data is much more sensitive
by George Chereches - EMEA Sales Engineer Team Lead, OPSWAT In this session you can learn about OPSWAT`s holistic approach to OT Security through a unique and innovative combination of technologies and solutions.
by Evgenia Izotova - Netwrix Regional Director Eastern Europe How can you ensure that your organization is more secure tomorrow than it is today? IT environments become more complex. Attacks increase in sophistication. Your teams struggle with disparate tools to manage
BY Vladimir Palacka - CyberSecurity Account Manager, SkyHigh Security From our earliest beginnings more than a decade ago, we focused on protecting data. As McAfee Enterprise, we continued to innovate, and now we are proud to launch as Skyhigh Security. We
By Eran Danino - Regional Sales Manager at Radware CEE New innovative Block-chain principles are utilized to provide superior Application Protection by using methods of Crypto identity to track and score accounts that access publicly exposed Web and API applications. The unique
by Igor Urban- Territory Account Manager at Forcepoint Latest events in the world brought the topic of Cyber security to the podium, but the primary challenges stayed the same. How to do an effective cyber security with limited number of cyber