Spire Solutions is the region’s leading distributor of information security solutions and services. The company has exclusive distribution agreements with the world’s best-known security vendors. The key to Spire’s success is in bringing niche solutions to the market that do not create one problem while solving others. The company works with a selective range of technology partners, while leveraging its channel partnerships to help organisations build and maintain a secure, compliant and more confident operation.
Spire further provides an array of services that include governance, risk and compliance, malware audits, threat hunting, breach readiness assessment, vulnerability assessment, penetration testing, web application security testing, security design and architecture review, and security operational support. Additionally, Spire provides training and education on the use of its hardware and software solutions.
Spire’s strategic focus is to continue to anticipate and identify the challenges faced by organisations, and proactively provide effective solutions to help to improve security while optimising resource utilisation.
Digital transformation has significant implications for an enterprise’s attack surface and network and security architectures. Users, devices, applications, and data are moving outside of the enterprise perimeter and zone of control and are exposed. “Trust but verify” is no longer an option for businesses. Akamai helps businesses employ a Zero Trust security policy for users and devices by extending their perimeter to the cloud so the perimeter and security goes everywhere the users and devices go.
As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale with over 240,000 servers across 130 countries, within more than 1,600 networks, giving customers superior performance and threat protection. Akamai’s portfolio of cloud security, enterprise access and threat protection, web and mobile performance, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top businesses trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
FireMon (www.firemon.com) is the world leader in enterprise security devices management. Founded in 2004, we help organizations find, correct and ultimately avoid gaps in their existing network security infrastructure. Our proactive, real-time enterprise security management platform gives security decision makers key management and operations data to reduce risk and provide appropriate levels of access. The FireMon Security Intelligence Platform provides continuous, real-time visibility into network security infrastructure, policy effectiveness and underlying IT risk, allowing organizations to optimize existing defenses, remediate exposed vulnerabilities and prevent today’s multi-staged attacks.
FireMon Security Manager and its Policy Planner and Risk Analyzer modules empower organizations to:
- Analyze, manage and control firewall, routers, switches, etc… configurations centrally and more accurately
- Cleanup and improve policies to reduce complexity and limit access, even as demands change
- Cleanup device rules across the entire network to ensure that policies result in end-to-end protection
- Migrate firewalls and legacy devices faster, validating that defenses remain in place
- Analyze and report on compliance to comply with regulations and document mandated assessment
- Identify underlying instances of IT risk left exposed to access and inform necessary remediation efforts
- Retain real-time visibility into the effectiveness of all security device infrastructure to continually adjust defenses as requirements change
LookingGlass Cyber Solutions delivers unified threat protection against sophisticated cyber attacks to global enterprises and government agencies by operationalizing threat intelligence across its end-to-end portfolio. Scalable threat intelligence platforms and network-based threat response products consume our machine-readable data feeds to provide comprehensive threat-driven security. Augmenting the solutions portfolio is a worldwide team of security analysts who continuously enrich our data feeds and provide customers unprecedented understanding and response capability into cyber, physical and 3rd party risks. Prioritized, relevant and timely insights enable customers to take action on threat intelligence across the different stages of the attack life cycle. Learn more at https://www.lookingglasscyber.com/.
Lookout Mobile Endpoint Security is a mobile security solution that mitigates the risks of unprotected data accessed via mobile devices, provides visibility into mobile threats across apps, devices and the network, seamlessly integrates with and enhances existing mobile investments while minimising help desk tickets and being embraced by employees because of a mobile-optimised design. Unlike PC/web era providers that don’t account for the new requirements introduced by the mobile/app era, our solution has amassed a global sensor network of over 100M sensors thanks to the success of our consumer product. This network enables our platform to be predictive by letting machine intelligence identify complex patterns that indicate risk, patterns that would otherwise escape human analysts. No other vendor provides an enterprise security solution that ensures strong employee adoption across corporate and personally owned mobile devices.
Lookout secures your enterprise from app, network, and device-based threats, while enabling organisations to identify and control non-compliant mobile apps that pose a data leakage risk. With a seamless integration to your EMM solution, Lookout empowers your organisation to adopt secure mobility across personal and corporate owned devices without compromising productivity.
McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place. By building solutions that work with other companies' products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all. www.mcafee.com
As the leading distributor of top-quality IT products in the Middle East and Africa, Mindware's extensive portfolio includes prime global brands reaching out to over 3,500 resellers across more than 25 countries. Mindware’s comprehensive offering includes a selection of networking, security, and storage leading brands such as McAfee, Citrix, DellEMC, Juniper, Microsoft, Polycom and Veritas. As part of its VAD methodology, Mindware also offers supplementary value added services to its reselling partners including pre-sales consultancy, implementation services, local technical support, marketing enablement tools, and multiple channel-enabling programs. Headquartered in Dubai UAE since 1991, Mindware has been uncompromisingly serving its customers for more than quarter-century of successful presence in MEA. www.mindware.ae
Netskope is the leader in cloud security. Using patented technology, Netskope’s cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device. This means that security professionals can understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work today. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. Netskope — security evolved. To learn more, visit our website.
Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future.
The world's largest enterprises rely on Shape Security as their primary line of defense against fraud and attacks on their web and mobile applications. Shape customers include three of the Top 5 US banks, five of the Top 10 global airlines, two of the Top 5 US insurers, and two of the Top 5 global hotels. The company has raised $100M+ from Kleiner Perkins, Google Ventures, Eric Schmidt, and other leading investors to build an advanced web, mobile, artificial intelligence, and machine learning platform for global scale application defense. The Shape platform, covered by 50 issued patents and 100+ additional patent applications, was designed to stop the most dangerous application attacks enabled by cybercriminal fraud tools, including credential stuffing (account takeover), product scraping, unauthorized aggregation, and other threats. Shape was named by CNBC as one of the 50 most disruptive companies in the world. Today, the Shape Network defends 1.4 billion user accounts from account takeover and protects $1B of in-store mobile payments worldwide. Shape is headed by industry leaders from Google, Cisco, IBM, Raytheon, Palo Alto Networks, and the Department of Defense.
Thycotic, a global leader in next-generation IT security solutions, delivers an indispensable, comprehensive Privileged Account Management (PAM) solution to protect your “keys to the kingdom” from cyber-attacks and insider threats. Unlike any other security offering, Thycotic Secret Server assures the protection of privileged accounts while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered at a competitive price. Already securing privileged account access for more than 7,500 organisations worldwide, including Fortune 500 enterprises, Thycotic Secret Server is simply your best value for PAM protection.
Secret Server privileged account management creates a fundamental security layer – managed from a single console – to protect against cyber-attacks that use privileged accounts to strike at the core of the enterprise.
Password Reset Server provides simple, self-service password management to free up IT help desk staff from time-consuming and inefficient processes, and enforces stronger end-user password controls.
Group Management Server empowers non-IT personnel to securely manage their department’s Active Directory Groups without assigning them a privileged account.
For more information, please visit www.thycotic.com.
Education Seminar Sponsors
The Anomali suite of threat intelligence solutions empowers organizations to detect, investigate and respond to active cybersecurity threats. The award-winning ThreatStream threat intelligence platform aggregates and optimizes millions of threat indicators, creating a “cyber no-fly list.” Anomali integrates with internal infrastructure to identify new attacks, or search forensically over the past year to discover existing breaches, and enables security teams to quickly understand and contain threats. Anomali also offers STAXX, a free tool to collect and share threat intelligence, and provides a free, out of the box intelligence feed, Anomali Limo. To learn more, visit www.anomali.com and follow us on Twitter: @anomali.
Cloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers more than 10 trillion requests per month, which is nearly 10 percent of all Internet requests worldwide. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world's 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, New York, NY, Washington, DC, London, and Singapore.
Easy Solutions, a Cyxtera business, is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from digital threat protection and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 115 million customers at 430 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.
For more information please visit: www.manageengine.com
Matrix42 helps organizations digitize the workspace environment of their employees. The software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant. The innovative software supports the integration of physical, virtual, mobile and cloud-based workspace environments seamlessly into existing infrastructures.
Against today’s complicated cyber security challenges, SECURRENT is a trusted partner of yours by delivering the best security technology by combining the best expertise and the outstanding services since 2009. Located in Istanbul and Dubai, SECURRENT provides next generation network security, identity and access management, payment security, encryption management and cloud security solutions for enterprise-class organizations including Banks, GSM Operators and Group Companies. Our mission is to shorten time for technical problems and create more time for optimizing security return of your investment. To realize that, we created unique professional services offering as a part of our support service portfolio. SECURRENT is the key partner of leading security vendors and our exceptional team is authorized by Check Point, Forcepoint, CyberArk, Thales, Gemalto, Cisco and more.
As one of our strategic vendors, Check Point Software Technologies (NASDAQ: CHKP) announced their new Gen V cyber security solution, Infinity delivers unprecedented
protection against current and potential attacks-today and in the future. Gen V security leaves the patch work, best-of-breed deployments of the past behind. Instead, it’s characterized by an architecture that unifies all networks, cloud, and mobile, supported by automatic and immediate threat intelligence.
Being only a 4 Star Partner of Check Point, SECURRENT has acquired the largest network of security projects for biggest customers in Turkey and we look forward to transferring our comprehensive expertise to customers in the GCC Region. During the event, SECURRENT’s team will reveal the details of the new Gen V benefits.
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored. We ensure that company and government data is secure and trusted in any environment - on premise, in the cloud, in data centers and in big data environments - without sacrificing business agility. Security doesn't just reduce risk, it's an enabler of the digital initiatives that now permeate our daily lives - digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices.
Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance - through encryption, advanced key management, tokenization, privileged user control and meeting the highest standards of certification for high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization's digital transformation. Thales e-Security is part of Thales Group.
Networking SponsorsCheck Point(r) Software Technologies Ltd. (Nasdaq: CHKP), the largest pure-play security vendor globally. Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises' networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Digital Shadows SearchLight™ provides digital risk monitoring that continuously analyzes the open, deep, and dark web to deliver tailored threats based on your specific organizational concerns. Our service is scalable, easy-to-use and integrates seamlessly to provide ease of consumption to your security teams.
Over the years, Green Method has assisted various clients in Banking & Financial Services, Government, Utilities, Hospitality, Transportation, Retail and large & medium enterprises in multiple services offerings and has built an extensive clientele in the region.
Green Method provides a wide range of Consulting Services, Testing Services, Training and Solutions in this domain. Green Method recently launched Managed Security Services in Dubai through its subsidiary Green Sentries.
Green Method had been pioneering the cause of evangelizing the information security best practices in the country and has executed a number large and small turnkey projects for some of the leading organizations here. Green Method had been in the forefront in assisting the organizations to be aligned with the evolving security standards.
Green Method has shown exemplary efficiency in enhancing the security posture of the organizations, and that too within their stringent budgets, resulting in continuous, repeated engagements. Our prestigious list of customers includes some of the major names in the region in the financial, government and other sectors.
Green Method partners with the world majors in the domain. Our Partner Veracode provides the world’s leading Application Risk Management Platform and has been ranked # 20 among the Forbes list of promising companies. Green Method has several other partnerships with leading providers like Mimecast, Wombat, Groundlabs, that has helped achieve the significant growth witnessed in the recent years.
As an IT service-provider organization, TNCT is established with the focus on offering professional IT services to address the market requirements in the Middle East and Africa regions for true value-added IT services including; educational services, technical implementation and project management services, consultancy services, as well as pre-sales and post sales technical support services.
Being a high-tech service-oriented organization and given our skills and expertise in the network security domain we aim to deliver such value-added services with the best quality yet in the most efficient way.
Our present focus is to provide these value-added services for technologies and solutions from our market leader vendor partners such as; Check Point Software Technologies, Tufin, and VMware within GCC and Africa regions. TNCT's foundation is based on believing in prioritizing customers’ needs and our talented and experienced team of network security specialists share same philosophy.Today’s enterprise networks must meet very high expectations for security, speed and performance. Companies need professional service provider partners that can ensure maximum security and reliability. TNCT provides clients with cutting-edge Network Security solutions to protect them against today's hard and dynamic cyber security challenges.
For further information please see: www.tnctrade.com