CONTINUE NETWORKING! LOGIN TO BUSINESS CONNECT

Infosecurity Middle East 2018

Co-located

ISNR

Co-organised by

United Arab Emirates Ministry of Interior

Product Gallery

Loading
  • Mimecast
    Mimecast (NASDAQ: MIME) makes email and data safer for customers and millions of employees worldwide. Founded in 2003, the company’s next generation cloud based security, archiving and continuity services protect email and deliver comprehensive email risk management.
  • iStorage
    iStorage is the trusted global leader of PIN authenticated, hardware encrypted data storage devices, that include: USB Flash Drives, Hard Disk Drives, and Solid State Drive formats. We deliver the most innovative products to securely store and protect data to Military specified encryption levels, safeguarding your valuable business information whilst ensuring compliance to regulations and directives. iStorage extensive research and development, coupled with industry leading manufacturing processes, enables us to deliver high performance products in capacities ranging from 4GB up to 8TB, that will work on any USB device and compatible with any platform, operating system and embedded device.
  • Sophos
    More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers. Sophos is headquartered in Oxford, U.K., and is publicly traded on the London Stock Exchange under the symbol “SOPH.” More information is available at www.sophos.com/company.
  • Darktrace
    Darktrace’s Enterprise Immune System’s flagship threat detection and defense capability are based on unsupervised machine learning and probabilistic mathematics. Powered by advanced machine learning, together with a new branch of Bayesian probability theory, Darktrace is the only self-learning cyber defense technology proven to work at scale. It is capable of detecting cyber-threats and anomalous behaviors that bypass traditional security tools, without prior knowledge of specific threats, or using rules or signatures. Darktrace works by creating unique behavioral models for every user and device across the enterprise, and analyzing the relationships between them. Leveraging its unique machine learning algorithms, Darktrace forms an evolving understanding of an organization’s ‘pattern of life’ (or ‘self’), spotting very subtle changes in behaviors, as they occur. These behavioral changes are correlated and filtered, in order to detect emerging threats and anomalies. Darktrace is easily and rapidly installed into the heart of the network, typically at a SPAN or TAP port. It passively monitors raw network data – including cloud interactions – in real time, without disrupting business operations. Darktrace then provides instant visibility into all digital activity, notifying of in-progress attacks or emerging anomalies. Our self-learning approach is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. The typical installation time is one hour.
  • The Threat Visualizer
    The Threat Visualizer is Darktrace’s real-time, 3D threat notification interface. As well as displaying threat alerts, the Threat Visualizer provides a graphical overview of the day-to-day activity of your network(s), which is easy to use, and accessible for both security specialists and business executives. Using cutting-edge visualization techniques, the Threat Visualizer user interface automatically alerts analysts to significant incidents and threats within their environments, enabling analysts to proactively investigate specific areas of the infrastructure. Visualization techniques can also be used to provide a high-level overview of a company’s network for business executives, helping to bridge the gap between technical specialists and the boardroom. Executives are given an easy-to-consume oversight of security issues, improving their awareness and understanding of the network environment, and enhancing their ability to make management decisions.
  • Darktrace Industrial
    Darktrace Industrial, also known as the Industrial Immune System, is a fundamental innovation that implements a real-time ‘immune system’ for operational technologies, such as SCADA, and enables a fundamental shift in the approach to cyber defense. Darktrace Industrial retains all of the capabilities of Darktrace in the corporate environment, creating unique, behavioral understanding of the ‘self’ for each user and device within the network, and detecting threats that cannot be defined in advance by identifying even subtle shifts in expected behavior.
  • Darktrace Antigena
    The machine fights back When the human immune system is faced with a new threat, not only can it detect it, but it produces antibodies that bind to it, and ultimately neutralize it. Darktrace Antigena replicates this function of the human immune system, by creating ‘digital antibodies’ in response to in-progress threats. Darktrace Antigena acts automatically to restrain or contain threats quickly enough to allow humans to catch up. It could only take 20 minutes for a major threat, such as a ransomware attack, to evolve into a crisis – Darktrace Antigena’s automated action slows, or stops threats in a targeted fashion, to provide security teams with a vital time window in which to take mitigating action. Darktrace Antigena’s autonomous response capability allows organizations to directly fight back, and networks to self-defend against specific threats, without disrupting your organization. Self-defending Darktrace Antigena is capable of taking a range of measured, automated actions in the face of confirmed cyber-threats detected in real time by Darktrace. Because Darktrace understands the ‘pattern of life’ of users, devices, and networks, Darktrace Antigena is able to take action in a highly targeted manner, mitigating threats while avoiding over-reactions. Darktrace Antigena works by automatically creating digital antibodies for specific features found in previously unseen cyber-threats. Once Darktrace has identified a potential threat, Darktrace Antigena has the ability to take a variety of actions, depending on the severity of the anomalous activity. It can: Stop or slow down activity related to a specific threat Quarantine or semi-quarantine people, systems, or devices Mark specific pieces of content, such as email, for further investigation or tracking Without disrupting business operations or damaging productivity, Darktrace Antigena essentially enforces the ‘pattern of life’ that Darktrace has learned, without restricting people unnecessarily. It gives security teams time to respond to dangerous cyber-threats as they emerge.
  • Vunlerability management
    Continuously detect and protect against attacks, anytime, anywhere.
  • IOC
    Indication of Compromise: Threat hunting, suspicious activity monitoring, and malware family detection.
  • ThreatProtection
    Pinpoint your most critical threats and prioritize patching.
  • Continuous Monotoring
    Alerts you in real time about network irregularities.
  • Container Security
    Discover, track, and continuously protect containers.
36 Results

Co-Located & Featured

  • ISNR
  • ME3S
  • EmDi