Exhibitor News

Sample

Advert

Loading
  • Smart Traffic, Safe Transit.

    20 May 2019 Yandy Law

    Hikvision is committed to providing complete and innovative solutions in intelligent traffic systems (ITS). The latest solution from Hikvision Smart IP solutions, the intelligent Traffic System, includes dedicated, high-performance cameras for event capture, reliable embedded video terminals for event recording, and a centralized video management platform – perfectly unifying all ITS devices and delivering services – extensible applications.

  • Latest advances to Apache-Kafka®-powered, cloud-native event streaming service includes new consumption-based pricing and increased elastic scalability from 0 to 100 MBps

    Kafka® S3 sink connector, Confluent Schema Registry and Confluent KSQL are offered as fully managed cloud services, so organizations can connect all their applications and data to stream at enterprise scale across hybrid and multi-cloud environments

     

     

  • How can Hikvision smart retail solution empowers retailers to gain valuable insights through video surveillance in order to boost customer service and customer loyalty, manage real-time operation conditions, enhance competitive advantage and more.

  • UDomain

    Elite Group of Internet Solution Specialists

    Get you well equipped and shielded in the cyber world

  • MW, a leading brand in home automation will exhibit its latest line up of smart locks and smart hotel solution at the upcoming Cloud Expo 2019. The focus of this year's exhibition will demonstrate the application of the MW range of smart home products in a hotel scenario including smart power and lighting control, door access and unmanned check in and room allocation solution kiosk.

  • RedSo is certified by Google Cloud! As an experienced Google Cloud Partner, 8 members of our team are qualified with certificates and manifested proven capability of being cloud architects and data en ...
  • Kemp Validated as a Dell EMC Select Partner for Load Balancing on ECS Object Storage Platform

  • Predictive Prioritization combines Tenable-collected vulnerability data with third-party vulnerability and threat data and analyzes them together with the advanced data science algorithm developed by ...
  • Sophos study of 10 cloud server honeypots placed worldwide reveals the need for visibility and security to protect what businesses put into hybrid and all-cloud platforms

  • Trend Micro has announced enhancements to its Deep Security™  and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the  Google Kubernetes Engine (GKE) and Gmail on the G Suite. 

  • Open source software leaders Google Cloud and Confluent announce availability of a cloud-native event streaming platform built and operated by the original creators of Apache Kafka® on Google Cloud

    With Confluent for Apache Kafka, developers can build, deploy and scale event-driven applications on the trusted Google Cloud Platform backed by the robust open source community

  • Key highlights from the study include: Insufficient Visibility Into the Attack Surface: 80% of respondents cited lack of visibility into the attack surface , knowing what systems are part of their IT ...
  • Trend Micro Incorporated has announced a new research that demonstrates the threats facing manufacturing networks still running outdated technology, including risks to intellectual property and production processes.

  • Are these challenges familiar?
    IT resource cannot fulfil user's need
    A lot of paperwork and repeated administrative tasks Canned software is not capable of handling daily operations
    Lack of mobility for management to approve the process Unable to effectively assess employee productivity (KPI)

  • Best practices to defend against the three most prevalent types of spear-phishing attacks

     

  • Growing enterprise mobility drives demand for improved cybersecurity control and threat insights

  • The security challenge from insiders’ threats

    27 Mar 2019 Mr Yaron Mintzker

    Insiders threats is one of the biggest concerns to IT professionals

    Based on surveys made by CERT Division of the SEI collaborates with CSO Magazine: 

    https://insights.sei.cmu.edu/insider-threat/2017/01/2016-us-state-of-cybercrime-highlights.html

    “30% of all respondents reported that incidents caused by insider attacks were more costly or damaging than outsider attacks.

    These reports are based on surveys of approximately 400 organizations across USA, ranging in size from less than 100 employees to over 10,000.

    We are utilizing combined innovative technologies, among them ‘encryption without encryption’, fingerprints, AES 256 encryptions and bit level invisibility in order to ensure no leaking of sensitive information from the company outside even if it done legally, mistakenly or maliciously by insiders

  • Proof of concept lays a foundation for quantum-resistant digital certificates for IoT devices.

    Today, DigiCert, Inc., the world’s leading provider of TLS/SSL, IoT and PKI solutions; Utimaco, one of the world’s top three Hardware Security Module providers; and Microsoft Research, a leader in quantum-safe cryptography, announced a successful test implementation of the “Picnic” algorithm, with digital certificates used to encrypt, authenticate and provide integrity for connected devices commonly referred to as the Internet of Things (IoT). This proof of concept provides a path toward a full solution, currently in development, that will protect IoT devices from future threats quantum computing could pose to today’s widely used cryptographic algorithms.

  • Key Survey Findings:

    • Most cybercriminals are detected at the server (37 percent) or on the network (37 percent); 17 percent are found on endpoints and 10 percent are found on mobile devices
    • One-fifth of IT managers admitted not knowing how their most significant attack got in, or for how long it was there before it was detected
    • On average, organisations that investigate one or more potential security incidents each month spend 48 days a year (four days a month) investigating them
  • Growing needs of bandwidth for your intense workloads, streaming activities or online gaming? Dataplugs offer dedicated international bandwidth for all dedicated servers, which guarantees you always r ...
  • Our key focus is on the integration of development, infrastructure and operations (I&O) and business teams in a self-service, platform-independent solution.

  • SAN FRANCISCO (RSA® Conference 2019, Booth #6345) – March 05, 2019 – Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, today announced the expansion of Tripwire® ExpertOps to include vulnerability management as a managed service. With this addition, organizations with limited in-house cybersecurity resources can take advantage of the Tripwire ExpertOps service to maintain a strong foundation of security, from vulnerability management (VM) to security configuration management (SCM) and file integrity monitoring (FIM).

    Tripwire ExpertOps reduces the workload and complexity of managing critical security controls through personalized consulting and managed services. The new ExpertOps VM capabilities leverage the industry-leading capabilities of Tripwire IP360™, the company's enterprise-class vulnerability management solution. Tripwire's VM capabilities offer a comprehensive view of vulnerability risks along with actionable reporting and recommendations.

    "We've expanded our managed services capabilities to ease the workload of increasingly strained security teams," said Tim Erlin, vice president of product management and strategy at Tripwire. "The widening skills gap and continued increase in cybersecurity threats makes the job of the security professionals increasingly demanding. Tripwire ExpertOps has helped manage secure configurations for organizations lacking the resources to do this in-house, and now these organizations can take advantage of the service for vulnerability management."

  • SANTA CLARA, California – Mar. 6, 2019 – Veritas Technologies, a worldwide leader in enterprise data protection and software-defined storage, announced today that it has acquired APTARE, Inc. a privat ...
  • Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced that its Cloud App Security tool blocked nearly nine million high-risk email threats in 2018 as attackers continued to evolve their tactics, highlighting the importance of investing in multi-layered protection for online platforms like Office 365.

Sponsors

Diamond Sponsor


 

 

VIP Lounge Sponsor


 

 

Registration Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Platinum Sponsor


 

 

Gold Sponsor


 

 

Gold Sponsor


 

 

Gold Sponsor


 

 

Gold Sponsor


 

 

Silver Sponsor


 

 

Silver Sponsor


 

 

Silver Sponsor


 

 

Silver Sponsor


 

 

Bronze Sponsor


 

 

Bronze Sponsor


 

 

Bronze Sponsor


 

 

Bronze Sponsor


 

 

Partners

Associate Content Partner


 

News Distribution Partner


 

Official Indoor Map Partner


 

Strategic Event Partner


 

Event Partner


 

Event Partner


 

Event Partner


 

Event Partner


 

Event Partner


 

Event Partner


 

Knowledge Partner


 

Talent Partner


 

Media Partner


 

Media Partner


 

Media Partner