Cortex: reimagine the SOC
by Tudor Cristea - Regional Sales Manager, Cortex With an automation-first approach, Cortex radically improves protection while transforming and streamlining today’s manual SecOps model.
Agentless Linux Security
by Paul Jespersen - VP WW Sales at Sandfly Security Linux is different so why are you using agent based solutions that was probably ported over from a Windows tools to protect your Linux hosts. Don't settle for lowest common denominator
Encryption protects your data, HSMs protect encryption
by Umberto Sansovini - Territory Sales Manager at ENTRUST Cryptographic keys are some of your organization’s most precious assets. The value of any key is equivalent to the value of all the data it protects. If a key is compromised it’s
Cyber Resilience in a fragile World
by Frank Lange - Technical Director at Anomali Breaches are inevitable, which is why security teams turn to technology to help overcome some of those challenges. Unfortunately, most solutions detect unknown threats by investigating suspicious activity observed in a customer’s environment,
To protect your sensitive data, first you must know where it is…
by Yad Jaura - Ground Labs’ Head of Product Marketing Data is the lifeblood of a modern enterprise and its effective use is critical to an organization’s wellbeing. However, not all data is the same. Some data is much more sensitive
Protecting the World`s Critical Infrastructure
by George Chereches - EMEA Sales Engineer Team Lead, OPSWAT In this session you can learn about OPSWAT`s holistic approach to OT Security through a unique and innovative combination of technologies and solutions.
Bridge the gaps between your various security silos: Data, Identity, Infrastructure
by Evgenia Izotova - Netwrix Regional Director Eastern Europe How can you ensure that your organization is more secure tomorrow than it is today? IT environments become more complex. Attacks increase in sophistication. Your teams struggle with disparate tools to manage
Introducing Skyhigh Security
BY Vladimir Palacka - CyberSecurity Account Manager, SkyHigh Security From our earliest beginnings more than a decade ago, we focused on protecting data. As McAfee Enterprise, we continued to innovate, and now we are proud to launch as Skyhigh Security. We
Using Block-chain principles for Defensive and offensive Application Protection
By Eran Danino - Regional Sales Manager at Radware CEE New innovative Block-chain principles are utilized to provide superior Application Protection by using methods of Crypto identity to track and score accounts that access publicly exposed Web and API applications. The unique
Forcepoint ONE – Security Simplified
by Igor Urban- Territory Account Manager at Forcepoint Latest events in the world brought the topic of Cyber security to the podium, but the primary challenges stayed the same. How to do an effective cyber security with limited number of cyber