Social Engineering: We are the target Sponsor Guide

Similar documents
Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Micro Focus Partner Program. For Resellers

THE ACCENTURE CYBER DEFENSE SOLUTION

Vendor Overview This is is the go to value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and inf

AKAMAI CLOUD SECURITY SOLUTIONS

FOR FINANCIAL SERVICES ORGANIZATIONS

Confirmed Exhibitors/Sponsors

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Transforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

IT Consulting and Implementation Services

Securing Your Digital Transformation

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

Merged with Cable & Wireless HKT in August 2000 to form PCCW

DATACENTER SERVICES DATACENTER

Services solutions for Managed Service Providers (MSPs)

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

The Little Fuchsia Book of HPE Data Center Solutions

SECURITY SERVICES SECURITY

RSA INCIDENT RESPONSE SERVICES

Perfect Balance of Public and Private Cloud

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY

2020 Vision for Cloud Services in the Enterprise. Tom Homer, Head of EMEA & Americas, Telstra

Simplify Your Network Security with All-In-One Unified Threat Management

Run the business. Not the risks.

Uptime and Proactive Support Services

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

BT Compute. BT Private Compute. Dedicated cloud infrastructure hosting your IT. BT Compute

with Advanced Protection

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

New Zealand Government IBM Infrastructure as a Service

Kaspersky Security. The Power to Protect Your Organization

Introducing Technologies, Widening Prospects.

STRATEGY STATEMENT OF QUALIFICATIONS

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Leisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner

RUAG Cyber Security Understand Cyber. Protect Values.

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Modern Database Architectures Demand Modern Data Security Measures

Intervate takes home double honours at Microsoft Partner Network Awards 2015

Technical Overview. Elastic Path Commerce

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Better Operational Agility. For more flexible, resilient and secure communications. Vodafone Power to you

Cisco Start. IT solutions designed to propel your business

Security-as-a-Service: The Future of Security Management

2017 Company Profile

Hybrid IT Managed Services

Security. Made Smarter.

Drive digital transformation with an enterprise-grade Managed Private Cloud

Cloud Computing Private Cloud

CloudSOC and Security.cloud for Microsoft Office 365

May the (IBM) X-Force Be With You

Transforming the UK police force through digital technology. Switch to a new way of working with BT

Sales Presentation Case 2018 Dell EMC

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Logicalis What we do

The Windstream Enterprise Advantage for Banking

2013 Frost & Sullivan Asia Pacific Smart City Solutions Provider of the Year

C O M P E T E A T Y O U R P E A K

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

Better skilled workforce

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile

VMware Hybrid Cloud Solution

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

AdaptiveMobile Security Practice

CYBERSECURITY AND THE MIDDLE MARKET

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Dimension Data TaaS Delivering Telecommunication As A Service Outcomes. accelerate your ambition 1

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

DIGITAL TRANSFORMATION IN FEDERAL GOVERNMENT. Securely Modernize and Mobilize Government IT to Advance Missions

Cloud Services. Infrastructure-as-a-Service

New Zealand Government IbM Infrastructure as a service

THE ESSENTIAL GUIDE: SELECTING A CLOUD COMMUNICATIONS PROVIDER

HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY

Securing Digital Transformation

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Capgemini Dynamic Services

5 Steps to Government IT Modernization

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

Reaping the Full Benefits of a Hybrid Network

Get Armoured Against Endpoint Attacks. Singtel Business. Managed Defense Endpoint Services Threat Detection and Response (ETDR)

NEC Australia Overview. au.nec.com

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

Your Trusted Partner in Europe European Business Reliance Centre

DIGITAL TRUST Making digital work by making digital secure

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Transform to Your Cloud

Preparing your network for the next wave of innovation

Transcription:

Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ

This ISfL Conference has been made possible by the exhibitors who kindly sponsored the event. Please show them your appreciation by taking the time to visit the stands, giving them the opportunity to showcase their latest products/services and at the same time you can find out how they may be able to help you now and in the future.

Lead Sponsor Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. Optimized for leading environments, including Amazon Web Services, Microsoft, VMware, and more, our solutions enable organizations to automate the protection of valuable information from today s threats. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. Trend Micro customers include 45 of the top 50 Fortune Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies. With over 5,000 employees in over 50 countries and the world s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud. For more information, visit www.trendmicro.com.

Sponsor Centrify redefines security from a legacy perimeter-based approach, to protecting millions of connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure access to apps and infrastructure through the power of identity services. www.centrify.com CheckRecipient is an email security platform that helps organisations protect against the risk of misaddressed emails and the consequences of highly sensitive information being sent to the wrong person. Our goal is to help organisations of all sizes prevent data loss in a manner that requires minimal effort from IT teams and doesn t require end-user behaviour change. www.checkrecipient.com Clearswift is trusted by organisations globally to prevent today s information borne threats and protection critical information, giving teams the freedom to collaborate securely and drive business growth. Our unique technology supports an adaptive data loss prevention solution that avoids the risk of business interruption, enables visibility and control of critical data and assets, and mitigates threats and risks across email, web, cloud and endpoint. www.clearswift.com

Sponsor IBM has been building cyber security since we produced mainframes in 1952. Today, we re the world s largest Cyber Security company; leading the Gartner magic quadrants with our award winning technology, including 4 years running as the No.1 SIEM solution. IBM Security s Eco System approach to cyber defence is designed to protect your enterprise from the most pervasive zero-day attacks; utilising IBM Watson cognitive technology allows us to protect your enterprise from the most sophisticated and coordinated attacks. With every new technology comes new security concerns, many of our customers are seeing four key challenges: Optimize The Security Program, Stopping Advance Threats, Protect Critical Assets, Safeguarding Cloud & Mobile. How will you protect your enterprise against these challenges? IBM offers the worlds broadest and deepest Security portfolio, built by our 6000+ dedicated Security professionals across more than 130 countries; fully integrated to meet some of the world s most complex security needs. Come and talk to IBM Security at ISFL 2017 about your cyber security strategy. http://www.softbox.co.uk/ibm Ivanti: The Power of Unified IT. Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI and the data center, we discover IT assets on-premises and in the cloud, improve IT service delivery, and reduce risk with insights and automation. We also help you leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.co.co.uk and follow us at @GoIvanti.

Sponsor LogRhythm, a leader in security intelligence and analytics, empowers organisations around the globe to rapidly detect, respond to and neutralise damaging cyber threats. The company s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence. LogRhythm is consistently recognised as a market leader. The company has been positioned as a Leader in Gartner s SIEM Magic Quadrant report for four consecutive years, named a Champion in Info-tech Research Group s 2014-15 SIEM Vendor Landscape report, received SC Labs Recommended 5-Star rating for SIEM and UTM for 2016 and earned Frost & Sullivan s 2015 Global Security Information and Event Management (SIEM) Enabling Technology Leadership Award. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region. www.logrhythm.com FALCON (Fraud And Linked Crime ONline) is a team of specialist detectives within the Metropolitan Police Service Organised Crime Command. FALCON was established in October 2014 to tackle fraud and cybercrime in London. The CYBER PROTECT Team are the preventative arm of FALCON and seek to reduce the vulnerability of public, private & voluntary organisations and individuals, by providing cyber security advice to empower and protect individuals and organisations from becoming victims of cybercrime, raising their awareness and increasing their resilience. RSA have more than 30,000 customers worldwide including nearly half the global Fortune 500 rely on RSA Business-Driven Security solutions for cyber threat detection and response, identity and access management, online fraud prevention, and business risk management solutions. Armed with the industry s most powerful tools, enterprises can better focus on growth, innovation and transformation in today s volatile business environment. www.rsa.com

Sponsor SBL (Software Box Ltd) is a value added software and hardware reseller and Information Assurance specialist, with an in-house professional service practice enabling the delivery of a comprehensive and innovative range of IT Solutions. As a Cyber Security specialist, SBL has over 30 years experience helping some of the most sensitive areas of government to secure its valuable assets, and is widely recognised as a leader in information assurance. In addition to our software, hardware, training and professional services solutions, our innovations in Cloud Services support the Government Cloud Strategy to transform the public sector ICT estate into one that is agile, cost effective and environmentally sustainable. For more information visit, www.softbox.co.uk Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at www.tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc. VMware, a global leader in cloud infrastructure and business mobility, helps customers accelerate their digital transformation. VMware enables enterprises to master a software-defined approach to business and IT with VMware Cross-Cloud Architecture and solutions for the data center, mobility, and security. With 2016 revenue of $7.09 billion, VMware is headquartered in Palo Alto, CA and has over 500,000 customers and 75,000 partners worldwide. www.vmware.com

For further information contact: SBL Events Team events@softbox.co.uk Lead Sponsor