Three new products and services launched: Positive Technologies Industrial

Size: px
Start display at page:

Download "Three new products and services launched: Positive Technologies Industrial"

Transcription

1 Company History

2 employees Three new products and services launched: Positive Technologies Industrial Positive Technologies Application Firewall Cloud DDoS Protection, a new service that protects from Internet attacks by combining an anti-ddos solution with antihacking technologies PT BlackBox Scanner, a free cloud-based service to help protect web applicationsfrom attacks PT Telecom Security Assessment, for securing next-generation 4G and 5G networks Partnerships: Array Networks Inc., the network functions platform company, announces a partnership that will see Positive Technologies Application Firewall being run on Array's AVX Series Network Functions Platform. Positive Technologies and CriticalBlue provide automated defense against malicious bots and scripts for web and mobile applications by combining CriticalBlue's Approov and PT Application Firewall. Sparkle, the international service arm of TIM Group and among the top 10 global operators, and Positive Technologies launch the Signaling Protection Suite, a new complete suite of security services for signaling connectivity. PT Application Firewall listed for the third time in the Gartner Magic Quadrant for Web Application Firewalls, which also lauds Positive Technologies as a Visionary. Expertise: Positive Technologies experts have discovered over 50 vulnerabilities, 28 of them severe, in products and systems from Dahua, Hirschmann, Intel, Kaspersky Lab, Siemens, and many others.

3 employees Offices opened in Brno (Czech Republic) and Samara (Russia). Two new products launched: Positive Technologies Industrial Security Incident Manager (PT ISIM), designed to protect industrial control systems (ICS/SCADA) PT MultiScanner, a multithreaded system for identifying malicious content PT SS7 Attack Discovery (PT SS7 AD) developed for detecting attacks on telecom networks. PT Application Firewall (PT AF) ranked in the Gartner Magic Quadrant for Web Application Firewalls. Positive Technologies is the only company recognized as a Visionary in the Gartner rating. MaxPatrol named Vulnerability Management Product of the Year in the independent Cyber Security Awards employees Offices opened in three Russian cities: Nizhny Novgorod, Novosibirsk, and Tomsk. Revolutionary MaxPatrol SIEM launched to monitor security events and automatically detect hacking attempts. PT Application Firewall listed for the first time in the Gartner Magic Quadrant for Web Application Firewalls, with Positive Technologies debuting as a Visionary. MaxPatrol vulnerability and compliance management solution awarded CIS Security Software Certification in the area of Microsoft SQL Server. Company gains a new partner, Partner Data, a leading Italian distributor of IT security products and security software, identification systems, and loyalty programs. Company announces distribution agreement with Italian partner Itway VAD, a market leader providing IT and security solutions in Italy, Spain, Portugal, France, Greece, Turkey, Middle East, and Africa.

4 employees Positive Technologies included in Gartner's Hype Cycles as a promising supplier of security solutions for critical infrastructure and industrial control systems (OT, ICS, SCADA). The company's application security product lineup (PT Application Firewall an PT Application Inspector) goes on sale around the world. PT Application Firewall used 24/7 during the Sochi Winter Olympics to protect special Olympic-related apps and secure existing web portals. MaxPatrol achieves certified integration with the SAP NetWeaver technology platform. MaxPatrol integrated with QRadar, a leading SIEM technology from IBM employees Two new products added to lineup: PT Application Inspector and PT Application Firewall. PT Application Firewall successfully withstands hacker attacks from all over the world during the Summer Universiade in Kazan, Russia. Company ranked No. 1 by IDC among the fastest-growing security and vulnerability management companies. Positive Technologies receives CIS Security Software Certification for MaxPatrol.

5 employees Offices opened in Italy, South Korea, Tunisia, U.S., and Russia (St. Petersburg). Company now has over 1,000 corporate clients. Sixteen pilot projects launched internationally, including with Samsung, Vodafone, and the Indian Ministry of Defense. Siemens and Positive Technologies partner to secure Simatic WinCC. State-owned military systems manufacturer Bharat Electronics Limited (BEL) deploys MaxPatrol from Positive Technologies for automated vulnerability and compliance management of IT infrastructure. Leading Italian systems integrator Italtel adds MaxPatrol to its portfolio of Integrated Security solutions. Positive Technologies joins VMware Technology Alliance Program. National Election Commission (NEC) of South Korea selects MaxPatrol. Educational initiatives started: PHDays Young School competition and Positive Education program. Positive Hack Days draws 1,500 participants. The PHDays Everywhere initiative brings the conference to educational institutions and hackspaces worldwide in an interactive format, with participants all across Russia and in countries as far away as India and Tunisia employees Cooperation starts with Russian law enforcement and security agencies. Regular free infosec webinars started. Informzashchita training center becomes an authorized Positive Technologies training center. Positive Hack Days international security forum held for the first time.

6 employees First international office opened (in London). Clients now include MegaFon, MTS, Rostelecom, Gazprombank, Gazpromneft, and Rosbank. Deployment of MaxPatrol at the company symbolizes the technological maturity of the business employees Research Center created at the company in order to identify vulnerabilities. The researchers' work has earned the gratitude of such world names as Google, Adobe, Apple, Red Hat, and Siemens employees MaxPatrol vulnerability and compliance management solution released. MaxPatrol is the most in-demand product of 2008, as well as the most effective network scanner. Special pentesting team formed. Courses launched for proficiency certification in use of MaxPatrol Enterprise Edition. Partner program created in Russia.

7 employees Software testing department created employees Development starts on MaxPatrol. "Check the Health of Your Network": project launched to enable any organization to check its network, free of charge, for vulnerabilities and receive recommendations for remediation. Project launched to perform non-stop testing of Masterhost virtual properties to identify known and potential software vulnerabilities employees First unique code audit performed.

8 employees First pentest performed. First major corporate clients: Sberbank, VimpelCom, Russian Ministry of Defense, and Magnitogorsk Iron and Steel Works employees Launch of first paid version of XSpider and successful go-to-market (300,000 downloads). New line of business added: security auditing employees Company founded and first office opened (in Moscow). This was the result of creation of the XSpider security scanner by two enthusiasts in A free open-source version of XSpider was released in The scanner, which is still considered one of the best smart security scanners in Eastern Europe, became so popular that it inspired creation of MaxPatrol, the flagship product in the Positive Technologies product lineup. Consulting services offered.

OUR PRODUCTS. PT Application Firewall. PT Application Inspector. MaxPatrol

OUR PRODUCTS. PT Application Firewall. PT Application Inspector. MaxPatrol ptsecurity.com WHO WE ARE Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application

More information

PROACTIVE APPROACH. INTELLIGENT CYBERSECURITY. ptsecurity.com

PROACTIVE APPROACH. INTELLIGENT CYBERSECURITY. ptsecurity.com PROACTIVE APPROACH. INTELLIGENT CYBERSECURITY ptsecurity.com WHO WE ARE Positive Technologies is a leading global provider of enter prise security solutions for vulnerability and compliance management,

More information

PT Unified Application Security Enforcement. ptsecurity.com

PT Unified Application Security Enforcement. ptsecurity.com PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over

More information

Confirming its role as Italy s leading exhibition dedicated to security and fire prevention. 333 exhibitor companies

Confirming its role as Italy s leading exhibition dedicated to security and fire prevention. 333 exhibitor companies Confirming its role as Italy s leading exhibition dedicated to security and fire prevention 333 exhibitor companies 18,955 professionals over the three-day event 2015 Edition Highlights 2 DESIGNERS & CONTRACTORS

More information

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab

More information

Skype: andrey.bondarenko. Qrator Lab (Moscow, qrator.net) DDoS mitigation and Hackers Attacks prevention SaaS.

Skype: andrey.bondarenko. Qrator Lab (Moscow, qrator.net) DDoS mitigation and Hackers Attacks prevention SaaS. Bondarenko Andrey 34 years old (25 June 1981), Male, Moscow, Russia, ready to relocate, Ready for business trips +7 903 7920724 me@andreybondarenko.com Skype: andrey.bondarenko Experience 13 years May

More information

InterLabService Company profile. Moscow, Russia

InterLabService Company profile. Moscow, Russia InterLabService Company profile Moscow, Russia 1 ILS today is the leading distributor of molecular diagnostics products 15 Years Of Success leadership!!! Mission To introduce new innovative molecular technologies

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

Cognitive Security in the Era of Always Online. Yiannis Giokas VP R&D

Cognitive Security in the Era of Always Online. Yiannis Giokas VP R&D Cognitive Security in the Era of Always Online Yiannis Giokas VP R&D Our Parent Company: HKT PCCW Global is an international operating division of HKT, Hong Kong s premier telecommunications service provider,

More information

Topics & trends. The RWHT key topic is digital economy

Topics & trends. The RWHT key topic is digital economy Topics & trends The RWHT key topic is digital economy Key ICT market trends Digital Government 8 billion USD allocated for the Digital Economy of the Russian Federation programme Data centers More and

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio Redefining IT distribution The Portfolio The Nuvias vendor portfolio Distribution is changing and it starts here The world of IT is changing. The channel needs a new style of distributor to meet the demands

More information

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8 European Union Agency for Network and Information Security Capacity and community building for CSIRTs 2005 Start up

More information

Follow the expert 2018

Follow the expert 2018 Follow the expert 2018 NAG is a leading Russian developer and supplier of solutions and equipment for telecommunications, industry and business For 15 years we create data networks and security systems,

More information

1992 KUDITS-OBRAZ LLC was founded as an IT training company

1992 KUDITS-OBRAZ LLC was founded as an IT training company 1992 KUDITS-OBRAZ LLC was founded as an IT training company 1993 Beginning of a long-term partnership with IBM company as a training developer and provider 1997 IBM Authorized Training Center 2000 Part

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

May the (IBM) X-Force Be With You

May the (IBM) X-Force Be With You Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security

More information

From Managed Security Services to the next evolution of CyberSoc Services

From Managed Security Services to the next evolution of CyberSoc Services From Managed Security Services to the next evolution of CyberSoc Services Gianluca Busco Arré Country Manager pandasecurity.com MSSP / MDR Where the Industry is going leaders and laggers MSSP industry

More information

Vice General Manager & CFO Itway Group. London, October 2011

Vice General Manager & CFO Itway Group. London, October 2011 Group strategies and forecast 2011 Andrea De Marchi Vice General Manager & CFO Itway Group London, October 2011 These slides have been prepared solely for the use at the current p p y presentation and

More information

Kaspersky Industrial Cybersecurity Training Program

Kaspersky Industrial Cybersecurity Training Program Kaspersky Lab ICS CERT Kaspersky Lab ICS CERT Kaspersky Industrial Cybersecurity Training Program Training with Kaspersky Lab ICS CERT Courses 2018 2019 Table of Contents Courses 2018 2019 1 Intro Our

More information

THE BEST OF ICT WITH A HUMAN TOUCH

THE BEST OF ICT WITH A HUMAN TOUCH THE BEST OF ICT WITH A HUMAN TOUCH VINCI & VINCI ENERGIES WORLDWIDE PLAYER IN CONCESSIONS & CONSTRUCTION VINCI ENERGIES IS A DIVISION OF VINCI Technology Roads Construction Concessions VINCI VINCI Energies

More information

Kaspersky Security. The Power to Protect Your Organization

Kaspersky Security. The Power to Protect Your Organization Kaspersky Security SOLUTIONS The Power to Protect Your Organization We believe that every organization from the smallest business to the largest corporation or government body should feel empowered to

More information

Netwrix Virtual. Customer Summit 2016

Netwrix Virtual. Customer Summit 2016 Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive

More information

IBM offers Software Maintenance for additional Licensed Program Products

IBM offers Software Maintenance for additional Licensed Program Products Announcement ZS10-0142, dated October 5, 2010 IBM offers Software Maintenance for additional Licensed Program Products Table of contents 1 Overview 3 Description 1 Key prerequisites 4 Prices 2 Planned

More information

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological

More information

Connecting Business Opportunities in A Better Way

Connecting Business Opportunities in A Better Way Connecting Business Opportunities in A Better Way Sustainable Growth 250 200 150 100 CAGR: 13% 146.6 182.5 203.9 220 Sales revenue (billion CNY ) 239 13% America 16% Asia Pac 35% China H1: 135.8 Who is

More information

Security Made Simple by Sophos

Security Made Simple by Sophos Security Made Simple by Sophos Indian businesses in the radar of cyber-threats Frequency of cyber-attacks Most targeted systems / IT assets -- KPMG Cybercrime Survey Report 2015 3 ON AN AVERAGE, HOW MUCH

More information

Ponemon Institute s 2018 Cost of a Data Breach Study

Ponemon Institute s 2018 Cost of a Data Breach Study Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell

More information

Huawei Symantec Corporate Overview

Huawei Symantec Corporate Overview Huawei Symantec Corporate Overview Huawei Symantec Joint Venture Targeted Synergies Huawei Strengths Top 3 Comprehensive telecom solutions providers International reach to over 100 countries Partner with

More information

Your Technology and Network is safe with us!!!

Your Technology and Network is safe with us!!! Your Technology and Network is safe with us!!! Naizak Distribution, part of Abdul Karim Holding group (AKH) is one of the leading value add distributors (VAD) of security, systems administration, cloud,

More information

CenturyLink for Microsoft

CenturyLink for Microsoft Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property

More information

DATA CENTER SERVICES. A Higher Level of Service Expertise

DATA CENTER SERVICES. A Higher Level of Service Expertise DATA CENTER SERVICES A Higher Level of Service Expertise DATA CENTER SERVICES Trust the Data Center Experts for Service Solutions Designed to Keep Your Business Running At Vertiv, we want to work with

More information

Social Engineering: We are the target Sponsor Guide

Social Engineering: We are the target Sponsor Guide Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the

More information

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market

More information

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI CLOUD SECURITY SOLUTIONS AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your

More information

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I DOCUMENT* PRESENTED BY CYBER SECURITY formerly Wick Hill * Nuvias and the Nuvias logo are trademarks of Nuvias Group. Registered in the UK and other countries. Other logo, brand and product names are trademarks

More information

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits

More information

Mobile App Development Market Research Report- Global Forecast to 2022

Mobile App Development Market Research Report- Global Forecast to 2022 Report Information More information from: https://www.marketresearchfuture.com/reports/1752 Mobile App Development Market Research Report- Global Forecast to 2022 Report / Search Code: MRFR/ICT/1220-HCRR

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Getting over Ransomware - Plan your Strategy for more Advanced Threats Getting over Ransomware - Plan your Strategy for more Advanced Threats Kaspersky Lab Hong Kong Eric Kwok General Manager Lapcom Ltd. BEYOND ANTI-VIRUS: TRUE CYBERSECURITY FROM KASPERSKY LAB 20 years ago

More information

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014 Enabling Fast IT In the IoE era Alberto Degradi DCV Sales Leader November 2014 Agenda IT Challenges Today EMC + Cisco + Intel Cisco Unified Data Center Joint Data Center Solutions Cisco Confidential 2

More information

Improving digital infrastructure for a better connected Thailand

Improving digital infrastructure for a better connected Thailand Improving digital infrastructure for a better connected 1 Economies across the globe are going digital fast The Global GDP forecast 2017 Economies are setting policies to encourage ICT investment Global

More information

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER

More information

Securing a Dynamic Infrastructure. IT Virtualization new challenges

Securing a Dynamic Infrastructure. IT Virtualization new challenges Christian Fahlke GMT Channel Leader Internet Security Systems IBM Central & Eastern Europe, Middle East and Africa (CEEMEA) May 20th, 2009 Securing a Dynamic Infrastructure IT Virtualization new challenges

More information

THE ENERGY MANAGEMENT WORKING GROUP

THE ENERGY MANAGEMENT WORKING GROUP THE ENERGY MANAGEMENT WORKING GROUP Meeting Climate Goals through Energy Management Policies and Standards 5000&1 SEAPs 4 th Webinar February 23, 2017 Ms. Pamela de los Reyes Energetics Incorporated EMWG

More information

Global IP Network (GIN) Connects You to the World

Global IP Network (GIN) Connects You to the World Global IP (GIN) Connects You to the World Delivering your Business Vision with the World s Tier 1 leading IP network NTT Communications (NTT Com) Global IP network (GIN) 100GigE service is the fastest

More information

Digital Forensics - Global Market Outlook ( )

Digital Forensics - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009 Services Announcement ZS09-0202, dated October 6, 2009 Security software for IBM Proventia Endpoint Secure Control, IBM ISS Data Security Services endpoint system protection - Digital Guardian software

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

A Risk Management Platform

A Risk Management Platform A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention

More information

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform Fintech District The First Testing Cyber Security Platform In collaboration with CISCO Cloud or On Premise Platform WHAT IS SWASCAN? SWASCAN SERVICES Cloud On premise Web Application Vulnerability Scan

More information

Accelerate Your Cloud Journey

Accelerate Your Cloud Journey Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension

More information

Venusense UTM Introduction

Venusense UTM Introduction Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,

More information

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why

More information

ISO in the world today

ISO in the world today ISO 27001 in the world today 1 Agenda ISO 27001 worldwide Why ISO 27001 Framework to implement ISO 27001 2 ISO 27001 worldwide Source: ISO Annual Survey 3 ISO 27001 worldwide Number of Certificates Year

More information

CYBERTECH MIDWEST Indianapolis, Indiana

CYBERTECH MIDWEST Indianapolis, Indiana MIDWEST KICK-OFF EVENT October 23, 2018 CYBERTECH MIDWEST Indianapolis, Indiana KICK-OFF EVENT: Oct. 23, 2018 JW Marriott Indianapolis CONFERENCE & EXHIBITION: June 2019 MIDWEST KICK-OFF EVENT October

More information

A Strategic Approach to Industrial CyberSecurity. Kaspersky Industrial CyberSecurity

A Strategic Approach to Industrial CyberSecurity. Kaspersky Industrial CyberSecurity A Strategic Approach to Industrial Cyber Kaspersky Industrial Cyber 2015 Do industrial control networks need protection from cyberattacks? It s a question that, just a few years ago, was unlikely to feature

More information

Transforming Security Part 2: From the Device to the Data Center

Transforming Security Part 2: From the Device to the Data Center SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation

More information

Broadband & Satellite Russia Newsletter

Broadband & Satellite Russia Newsletter Broadband & Satellite Russia Newsletter 88 January 06-30, 2015 MOSCOW RUSSIA Contents TTK - Fourth in Broadband Access............ 3 Running out of Кu-band Transponders.......... 3 Olympic Frequencies

More information

Trend Micro Professional Services Partner Program

Trend Micro Professional Services Partner Program Trend Micro Professional Services Partner Program PROGRAM OVERVIEW The Trend Micro Partner Program provides professional services companies with the certification, training, technical support and access

More information

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security IBM Security Vaš digitalni imuni sistem Dejan Vuković Security BU Leader South East Europe IBM Security Compliance vs Risk based approach & o Zakon o informacionoj bezbednose, Zakon o tajnose podataka,

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

Secure & Unified Identity

Secure & Unified Identity Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong

More information

IBM Next Generation Intrusion Prevention System

IBM Next Generation Intrusion Prevention System IBM Next Generation Intrusion Prevention System Fadly Yahaya SWAT Optimizing the World s Infrastructure Oct 2012 Moscow 2012 IBM Corporation Please note: IBM s statements regarding its plans, directions,

More information

Intervate announces launch plans for Smart Citizen

Intervate announces launch plans for Smart Citizen MEDIA INFORMATION Johannesburg, South Africa, 1 November, 2016 Intervate announces launch plans for Smart Citizen Intervate s Citizen Reporting Framework re-positioned as a Smart Citizen Intervate to go

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

GEANT Cloud Framework Agreement

GEANT Cloud Framework Agreement TIM Overview Employees 65,867 Customers (Mln) 126 Revenues (Bn ) 19,718 Data as of December 2015 2 TIM Overview TIM is the leading Italian Telecommunications and ICT provider. In the areas of: fixed and

More information

Skills and career accelerator with a transparent compensation plan

Skills and career accelerator with a transparent compensation plan Skills and career accelerator with a transparent compensation plan Built on 3-year training program, stamped by recognized certifications completed with soft skills training, to help you become an Expert

More information

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks Mark Nicolett Notes accompany this presentation. Please select Notes Page view. These materials

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Cyber Security for Process Control Systems ABB's view

Cyber Security for Process Control Systems ABB's view Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control

More information

Excellium Services. La Cyber- sécurité en mode Entrepreneur pour des Entrepreneurs! Christophe Bianco Xavier Vincens Sept. 2015

Excellium Services. La Cyber- sécurité en mode Entrepreneur pour des Entrepreneurs! Christophe Bianco Xavier Vincens Sept. 2015 Excellium Services La Cyber- sécurité en mode Entrepreneur pour des Entrepreneurs! Christophe Bianco Xavier Vincens Sept. 2015 1 Who are we? Xavier" Vincens!! Managing Partner" christophe" Bianco!! Managing

More information

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT. SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is

More information

ABB Process Automation, September 2014

ABB Process Automation, September 2014 ABB Process Automation, September 2014 ABB Process Automation Services Services that add life to your products, systems and processes September 26, 2014 Slide 1 1 ABB Process Automation Services A proven

More information

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Cyber Resilience: Developing a Shared Culture. Sponsor Guide Lead : Cyber Resilience: Developing a Shared Culture Guide ISfL Annual Cyber Security Conference This ISfL Conference has been made possible by the exhibitors who kindly sponsored the event. Please show

More information

SAP PartnerEdge Program Guide for Authorized Resellers

SAP PartnerEdge Program Guide for Authorized Resellers SAP PartnerEdge Program Guide for Authorized Resellers Table of Contents 3 SAP PartnerEdge Program: Accelerating Your Growth Gain an Edge on Your Competition 5 Program Requirements: How to Become an Authorized

More information

CONFIRMED RETURN TO GROWTH FOR THE CONSTRUCTION INDUSTRY: INTERMAT 2018 INTRODUCES ITS NEW SPECIAL EVENTS TO MEET THE CHALLENGES OF THE FUTURE

CONFIRMED RETURN TO GROWTH FOR THE CONSTRUCTION INDUSTRY: INTERMAT 2018 INTRODUCES ITS NEW SPECIAL EVENTS TO MEET THE CHALLENGES OF THE FUTURE Press Release of 04/05/2017, Paris CONFIRMED RETURN TO GROWTH FOR THE CONSTRUCTION INDUSTRY: INTERMAT 2018 INTRODUCES ITS NEW SPECIAL EVENTS TO MEET THE CHALLENGES OF THE FUTURE All of the indicators seem

More information

Maximizing IT Security with Configuration Management WHITE PAPER

Maximizing IT Security with Configuration Management WHITE PAPER Maximizing IT Security with Configuration Management WHITE PAPER Contents 3 Overview 4 Configuration, security, and compliance policies 5 Establishing a Standard Operating Environment (SOE) and meeting

More information

Services solutions for Managed Service Providers (MSPs)

Services solutions for Managed Service Providers (MSPs) McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive

More information

SECURITY SERVICES SECURITY

SECURITY SERVICES SECURITY SECURITY SERVICES SECURITY SOLUTION SUMMARY Computacenter helps organisations safeguard data, simplify compliance and enable users with holistic security solutions With users, data and devices dispersed

More information

Data Loss Prevention - Global Market Outlook ( )

Data Loss Prevention - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Thales Cyber Assurance Webinar Your first step to Cyber Security

Thales Cyber Assurance Webinar Your first step to Cyber Security www.thalesgroup.com Thales Cyber Assurance Webinar Your first step to Cyber Security 10 February 2012 Ross Parsell/Edward Wolton 2012 Thales UK Ltd. 2 / Edward Wolton Edward has been working in what is

More information

A Comprehensive Guide to Remote Managed IT Security for Higher Education

A Comprehensive Guide to Remote Managed IT Security for Higher Education A Comprehensive Guide to Remote Managed IT Security for Higher Education About EventTracker EventTracker enables its customers to stop attacks and pass IT audits. EventTracker s award-winning product suite

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Company Introduction

Company Introduction All information, ideas, concepts, methods and technologies mentioned in this document are trade secrets and/or proprietary information of J. Gordon Consulting Engineers Ltd. and may not be used, duplicated

More information

No Industry 4.0 without Security

No Industry 4.0 without Security 24-04-2017 No Industry 4.0 without Security 24-04-2017 Introduction to Atos and Industry 4.0 Who is Atos? At a glance Revenue 2016 (M EUR) * Employees 2016 (Global) Employees 2016 (Germany) Countries 12,000

More information

ClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead

ClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead ClearPass Ecosystem Tomas Muliuolis HPE Aruba Baltics lead 2 Changes in the market create paradigm shifts 3 Today s New Behavior and Threats GenMobile Access from anywhere? BYOD Trusted or untrusted? Bad

More information

Transforming networks and services for communications service providers

Transforming networks and services for communications service providers Transforming networks and services for communications service providers Do you need more agility to keep pace with new challengers in your market? The change is happening right now The growing number of

More information

Security Challenges: Integrating Apple Computers into Windows Environments

Security Challenges: Integrating Apple Computers into Windows Environments Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

TechValidate Survey Report: SaaS Application Trends and Challenges

TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.

More information

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT

More information

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom WEAT Webinar Who Goes There? Access Control in Water/Wastewater Siemens AG 2018. siemens.com/ruggedcom ACCESS CONTROL WEBINAR TABLE OF CONTENTS TOPIC Why Access Control? Risks If Not Used Factors of Authentication

More information

IBM Security AppScan now supports SAP code quality and data loss prevention testing with Virtual Forge CodeProfiler for IBM Security AppScan Source

IBM Security AppScan now supports SAP code quality and data loss prevention testing with Virtual Forge CodeProfiler for IBM Security AppScan Source IBM United States Software Announcement 212-255, dated July 24, 2012 IBM Security AppScan now supports SAP code quality and data loss prevention testing with Virtual Forge CodeProfiler for IBM Security

More information