Web Application Security Researcher
Web Application Security Researcher
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 120,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and EducationTM. For more information on (ISC)², visit www.isc2.org, follow us on Twitter or connect with us on FacebookVisit Website
A10 Networks have pioneered a new generation of application networking technologies. Our solutions enable enterprises, service providers, Web giants and government organizations to accelerate, secure and optimize the performance of their data center applications and networks. Our Advanced Core Operating System (ACOS®) platform is designed to deliver substantially greater performance and security relative to prior generation application networking products. Our software-based ACOS architecture provides the flexibility that enables us to expand our business with additional products to solve a growing array of networking and security challenges across cloud computing and mobility. A10 Networks has a portfolio of application-layer networking products that assure user-to-application connectivity is available, accelerated and secure.Visit Website
AccessData Group has pioneered digital forensics and litigation support for almost thirty years. Over that time, the company has grown to provide both stand-alone and enterprise-class solutions that can synergistically work together to enable both criminal and civil E-Discovery of any kind, including digital investigations, computer forensics, legal review, compliance, auditing and information assurance. More than 130,000 customers in law enforcement, government agencies, corporations and law firms around the world rely on AccessData software solutions, and its premier digital investigations products and services. AccessData Group is also a leading provider of digital forensics training and certification, with our much sought after AccessData Certified Examiner® (ACE®) and Mobile Phone Examiner Certification AME programs.Visit Website
Akamai® is the leading provider of Content Delivery Network (CDN) services, making the Internet fast, reliable and secure. At the core of Akamai’s solutions is the Akamai Intelligent Platform™, a next-generation CDN combined with cloud services to provide extensive reach, unmatched reliability, security, visibility and expertise. Akamai helps enterprises around the world optimize website performance and software delivery with solutions for web acceleration, mobile optimization, application delivery, streaming media and mobile video. Akamai’s Cloud Security Solutions include web application firewall (WAF) and DDoS mitigation tools for protection against web security threats such as DDoS attacks. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and helping enterprises provide secure, high-performing web experiences on any device, anywhere.
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on theAkamai Intelligent Platform™, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
ARCON is a leading technology company specializing in risk control solutions. It offers a proprietary unified governance framework, which addresses risk across various technology platforms. In the last decade ARCON has been at the forefront of innovations in risk control solutions, with its roots strongly entranced in identifying business risk across industries. It is in a unique position to react with innovative solutions and products.
Team ARCON consists of experienced professionals with industry knowledge and strong technology background and have in past worked for some of large corporations including several Fortune 500 companies. The team is fully equipped to conceptualize and deliver solutions across various risk interfaces. Further ARCON has one of the best in class risk labs established in Europe, which helps in research and development efforts. At ARCON we believe CLOUD computing will bring back the era of supercomputers and virtualization will become the next buzzword for large corporations. One of its technology innovations include risk control for these emerging environments.
With offices and partners in the leading cities of the world, ARCON can provide support and services matched to the best in the industry.Visit Website
ASCENT MIDDLE EAST FZC is formed with an Intent to provide the best quality of Security framework and become a trusted security partner for our customers. We have security consultants who help the organizations in securing their critical and confidential information across its lifestyle.What makes us unique is our complete focus on specialized vendors who have proven themselves in the areas of Information and Network Security and focus on the Next Generation Threat Protection. We Represent Various It Security Vendors across the region and provide them strong platform to launch in market.
We feel proud to represent the below vendors in Information and Network Security:
Attivo Networks® is the leader in dynamic deception technology, which in real-time detects intrusions inside the network, data center, and cloud before the data is breached. Not reliant on signatures, Attivo uses high-interaction deception techniques to lure BOTs/APTs to reveal themselves, provides actionable alerts, and the forensics to shut down cyber-attacks.Visit Website
We help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations.
We do this using our unique set of solutions, systems, experience and processes – often collecting and analysing huge volumes of data. These, combined with our Cyber Special forces – some of the most skilled people in the world, enable us to defend against cyber-attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems.
We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA.Visit Website
Bit9 + Carbon Black is the market leader in Next-Generation Endpoint Security. We have sold more licenses, have more experience, and more customers than any other NGES company because our solution is the most effective way to prevent, detect and respond to advanced threats that target users, servers, and fixed-function devices.Visit Website
Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors and reseller partners.
Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security provider in virtualization and cloud technologies.
Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world’s leading virtualization and cloud technology providers.
More information is available at www.bitdefender.comVisit Website
Powerful technology and unparalleled support – that’s BlackStratus.
Since 1999, BlackStratus has been providing reliable and innovative security information event management (SIEM) products and services. Through our years of experience with the world’s leading managed service providers (MSPs) and enterprises, we’re able to offer the most highly evolved security and compliance management platform in existence and unparalleled support to help MSPs develop new or improve their current cloud security-as-a-service business.Visit Website
For 30 years, Boldon James has been a leader in data classification and secure messaging solutions, helping organisations of all sizes manage sensitive information securely and in compliance with legislation and standards, in some of the most demanding messaging environments in the world. The SAFEmail® secure messaging solution extends out-of-the-box Microsoft Outlook and Microsoft Exchange messaging functionality in High and Medium grade messaging environments to enable Homeland Security organisations and military forces to monitor emails, enforce security policies and exchange information in complete security. Our Classifier product range extends the capabilities of Microsoft products and other solutions to allow users to apply relevant visual & metadata labels to messages and documents in order to enforce information assurance policies, raise user awareness of security policies and orchestrate multiple security technologies, such as DLP and Rights Management. Our customers range from corporates, including global Pharmaceutical, Manufacturing, Financial and Professional Services businesses, to Government, Defence & Intelligence organisations.Visit Website
Patented Network Sentry solution by Bradford Networks enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals. Through its SmartEdge Platform, Network Sentry seamlessly integrates with the leading Advanced Threat Detection solutions to correlate high-fidelity security alerts with a threat’s foothold. This unique correlation bridges the silos of security, network, and endpoint information to enable confident, automated threat containment before it has an adverse impact on the business.Visit Website
BT Security is building on 70 years’ experience of helping organisations around the globe and across all sectors get ahead of the threat curve and reduce the uncertainty and complexity of security. We provide an end-to-end capability to help organisations enjoy higher levels of security at a time when security budgets are not keeping pace with the threat landscape.
The sophistication of our security operations means that we think about the assets, the people, and the processes, and combine these with both network and security intelligence to help our customers stay ahead of the security risks. BT Security protects both BT and its customers. These customers are advised by a global team of 2,000 security practitioners and professional services consultants. To find out more about BT Security, visit www.bt.com/security.Visit Website
Bulwark Technologies LLC is the leading provider for IT Security and Information Communications & Technology (ICT) products in the Middle East & North Africa (MENA) region. Headquartered in Dubai, Bulwark serves the entire region with innovations from 15 technology vendors and works with more than 250 partners, with the aim of bringing the best in technology to the Middle East. Customers from various sectors including Banking, Finance, Government, Manufacturing, Hospitality, Medical, Education, Petroleum and more rely on solutions provided by Bulwark for securing and managing their IT infrastructure. Bulwark has won numerous industry awards for leadership in IT sales and support.
At GISEC 2016, we will be boosting our all-round IT security products and services offerings by showcasing an array of internationally renowned technologies for all segments of the industry, spanning identity and vulnerability management, two-factor authentication amongst other security technologies. In a bid to build a strong, integrated security infrastructure in the region, we will be catering to the strong demand in the security distribution market.Visit Website
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attackers every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organization can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to disrupt, defend and unite.Visit Website
Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry’s most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco’s threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack.
For more information visit: cisco.com/go/securityVisit Website
CloudFlare, Inc. (www.cloudflare.com / @cloudflare) makes any Internet application lightning fast, protects them from attacks, ensures they are always online, and makes it simple to add web apps with a single click. Regardless of size or platform, CloudFlare supercharges Internet applications with no need to add hardware, install software, or change a line of code. The CloudFlare community gets stronger as it grows: every new site makes the network smarter. More than 5 percent of global Internet requests flow through CloudFlare’s network; every month more than 2 billion people experience a faster, safer, better Internet. CloudFlare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world’s 50 most innovative companies by Fast Company. CloudFlare has offices in San Francisco, Champagne, IL, Washington, DC, London, and Singapore.Visit Website
CodeSealer ApS is an international, privately held company with head office in Copenhagen, Denmark – your partner in Web Session Protection.
The company was founded by Martin Boesgaard, a well known name within the IT security industry. Today, the company is owned by a group of investors, such as Seed Capital and Vaekstfonden.
The company provides two products, WSF and Bootloader. The Bootloader is presently being used within solutions countrywide, in Denmark and Norway, by more than 12 million customers daily. References can be obtained upon request.
CodeSealer ApS holds technology patents within key markets and offers a unique solution to your security needs.Visit Website
ComGuard, established in 2002, is a prominent Value added Distributor in the Information Technology & Security space. The company is headquartered in Dubai, UAE and is the flagship division of the Spectrum Group, which is engaged in IT networking and security training, managed services, niche hospitality solutions, network consultancy and Broadline distribution, amongst others. ComGuard has invested in its inherent strength in infrastructure, technical skills and customer support to create a niche for itself in the value added distribution space. The biggest strength for ComGuard is the skill sets, which has made it one of the fastest growing VADs in the region. Industry recognition and awards have come ComGuard’s way for its discerning ability to provide value addition to product offerings while effectively helping customers to make most out of them. Backed by a strong vision and sustained growth, ComGuard’s distribution reach covers 14 countries across the Middle East and APAC with a roster of more than 1,000 partners. As a value added distributor ComGuard represents a diverse range of world-class vendors in the IT Security and Big Data / IoT domain.Visit Website
Established in 1999, Credence Security, previously ARM, the regions speciality distribution company, specializes in IT security, Forensics and Incident Response. Working closely with leading IT security vendors including AccessData, Fidelis CyberSecurity, eSentire and Digital Guardian, Credence Security delivers Cyber and IT Security technologies and solutions that protect organisations against advanced persistent threats, malicious adversaries and internal malpractice. A subsidiary of the UC Group, Credence Security Is headquartered in Dubai, UAE and serves enterprises across the Middle East, Africa and India through a network of over 70 resellers throughout the territory.Visit Website
CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world’s leading companies — including 40% of the Fortune 100 companies — to protect their highest-value information assets, infrastructure and applications.Visit Website
Cybercom is a Nordic IT consulting company focusing on Connectivity, assisting leading companies to capture business opportunities of the connected world. Cybercom’s business domains span the entire Connectivity ecosystem.
Cybercom’s secure connectivity services equips clients to manage risks. Establishing risk governance mechanisms, securing technology in harmony with business objectives, providing assurance on risks in present IS/IT environments.
Our services are grouped in three practices:
DarkMatter is a company that is transforming the cyber security landscape by providing a complete range of state-of-the-art services and solutions to government and commercial clients.
Staffed by global experts and headquartered in Abu Dhabi, UAE, DarkMatter provides peace of mind through consulting and project implementations that are scalable to clients of any size and that address any domain of cyber security threat or risk. As a trusted partner to governments and critical infrastructure entities, the firm also works with leading global companies operating in the field of electronic and cyber security.
Agile and innovative, DarkMatter takes a comprehensive end-to-end approach to helping its clients navigate the complex and ever-evolving world of threat and risk mitigation strategies, tools, policies and systems. Solutions include strategic advisory, security consulting, security products and services, and recovery.Visit Website
Darktrace is a world leader in Enterprise Immune System technology for cyber security.
Using new machine learning techniques based on the biological principles of the human immune system, Darktrace addresses the challenge of detecting previously unidentified cyber threats, irrespective of their origin.
Named ‘Best Security Company of the Year’ 2016, Darktrace is capable of identifying new, emerging threats within computer networks in real time. This unique capability is delivered by Darktrace’s cyber intelligence software platform, which leverages advanced mathematical models to establish an evolving understanding of every device, user and network and stay ahead of developing APTs, insider attacks and other live threat scenarios.Visit Website
Dell Security solutions help you protect critical data and systems efficiently and effectively, consistently comply with regulations without impacting business agility, and enable end users and the enterprise to move faster and do more. Dell eliminates proprietary islands of information that create risky security gaps, secures the enterprise from endpoint to datacenter to cloud without the burdensome complexity of administration, enables the enterprise to more efficiently meet its IT compliance and auditing requirement, and does not impede end-user productivity. Dell Security offers Network Security, Mobile & Endpoint Security, Identity Access Management, Email Security, Security Services.Visit Website
Conventional approaches to endpoint security simply don’t work. They leave us vulnerable and under constant administrative pressure. We believe it is easier to protect the handful of applications running on your endpoint than to try to defend against every new virus or malware attack.
Features and Capabilities
Verifies the integrity of executing code throughout the runtime lifecycle
Detects attempted execution of foreign and injected software
Any attempt to execute malicious code is prevented before it starts
DTS Solution is an innovative information and network security consulting company that works on next generation security solutions and delivers on professional services excellence at all stages of a project lifecycle. The success story of DTS is defined by the customer base and the successful execution of highly critical projects in a relatively short period of time since inception.
The security solutions and services provided by DTS are unmatched and cover a complete security 360 degrees approach to meet all information and network security challenges of an enterprise. DTS provides complete turnkey security solutions to counter modern day security challenges and threats. DTS Solution has gained the region’s trusted security advisor status delivering the most complex and innovative IT security solutions spanning Next Generation Network Security, Data Security and Encryption, SCADA/ICS Security, Enterprise Mobile Security, NAC and SIEM 2.0 Solutions to name a few. DTS Solution Offensive Security Division is the best in class with Penetration Testing, Vulnerability Assessment Social Engineering, Mobile Application Penetration Testing and Incident and Malware Analysis – to put it simply we are security geeks.
For more info, please visit: http://www.dts-solution.com/Visit Website
eLearnSecurity – A Leading Innovator in the Field of Practical, Hands-on IT Security Training.
Based in Santa Clara (USA), Pisa (Italy) and Dubai (UAE), eLearnSecurity is a leading provider of IT security and penetration testing courses for IT professionals. eLearnSecurity’s mission is to advance the career of IT security professionals by providing affordable and comprehensive education. All eLearnSecurity courses utilize engaging eLearning and the most effective mix of theory, practice and methodology in IT security – all with real-world lessons that students can immediately apply to build relevant skills and keep their organization’s data and systems safe.
eLearnSecurity’s 8 different IT Security certifications include the prestigious eCPPT (eLearnSecurity Certified Professional Penetration Tester) and eWPT (eLearnSecurity Web Application Penetration Tester) certifications.Visit Website
Resellers see EMT Distribution as the distributor of choice for selected solutions sold and supported throughout the Asia Pacific, Europe, Middle East and Africa region. The company owned by EMT Holding a European holding company is a channel company with over 15 years of experience in IT Product distribution and with offices in Adelaide, Hong Kong, Singapore, UAE, Austria, UK and the Philippines. EMT Distribution is well positioned to provide pre-and post-sales support with our team of experienced product specialists.Visit Website
One of the world’s leading developers of cross-platform Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) solutions.
We specialize in preventing data loss and data theft.
1 Million End users around the globe use our solutions to protect key data.
CoSoSys’ mission is to enable businesses and end users around the world to take full advantage of the performance benefits of mobility, portability and communications solutions, without compromising security. To achieve this, we develop solutions that prevent data loss on the ever-increasing number of devices, endpoints and mobile devices accessing and storing sensitive data.Visit Website
Eon IT is an information security company with an exclusive skill set in information security professional services, solution deployment and training. Our information Security services revolves around to extensively evaluate your information security standing to minimize risk. We work hard to make sure that your infrastructure is tightly secured and there is no chance for any unauthorized entry. We examines you infrastructure for any weakness that could be used to disrupt the confidentiality, availability or integrity of the network, thereby allowing the organizations to address each weakness. Our adaptive security approach ensure the alignment with Business objective to maximize the return on any information security investment. Our dedicated team of information security evaluates the health of your IT infrastructure and help you remediating the areas which can be exploited to take away your most important data. We are a one-stop-shop with comprehensive and integrated Information Security resources including: Experienced consult-ants; Risk management expertise; Technical information security expertise; Tools & Trainers.Visit Website
eSentire® is a proven industry leader, keeping mid-size organizations safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. eSentire combines people, process and technology to deliver an unmatched, premium level service that detects, remediates and communicates sophisticated cyber threats in real-time, 24/7. Protecting more than $2.5 trillion in Assets under Management (AuM), eSentire is the award-winning choice for security decision-makers in mid-size enterprise. eSentire has received multiple accolades for exceptional service, which includes HFM (Hedge Fund Manager) Service Provider awards (2013, 2014, 2015). In 2015 eSentire was named to Deloitte’s Technology Fast 50 TM and Fast 500TM and included in the list of “Cool Vendors” in the Cool Vendors in Cloud Security Services, 2015 report by Gartner, Inc. For more information visit www.esentire.com and follow @esentireVisit Website
Etisalat is the UAE’s leading telecommunications operator and one of the largest corporations in the GCC. As well as establishing several “firsts” over the past four decades of operations, Etisalat UAE has deployed many innovative mobile and fixed technologies in the country. Headquartered in Abu Dhabi, UAE, Etisalat serves over 10.2 million customers. Etisalat currently has the widest coverage of 3G and 4G mobile technologies in the UAE. The company has an extensive network of 680 international roaming partners. Etisalat is strategically transforming into a fully integrated telecom operator and ICT solutions provider. Etisalat UAE has brought smarter services into every aspect of its offering to support the UAE’s goal to create smarter cities through digitization.Visit Website
Exclusive Networks is the Middle East’s award winning specialist Value Added Distributors focused on security and virtualization. We offer the Middle East Resellers an excellent opportunity to capitalize on their growing customer bases by providing End-to-End IT security solutions, while assisting them in the full lifecycle of the project. With focus on pure Value-Added Distribution (VAD), Exclusive Network Distributors have the global knowledge and local experience to deliver an unparalleled level of service, support, logistics and competitive pricing to the Middle East IT marketplace. Exclusive Networks Group is the only VAD offering this consistency of service and execution across Europe, the Middle East and Africa. With offices, stock holding, marketing and engineering resource in over 20 countries, Exclusive Networks Group drastically decreases the cost and burden of serving the pan-European market, while significantly increasing the speed of returns from it.Visit Website
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends.Visit Website
Fidelis Cybersecurity protects the world’s most sensitive data by equipping organisations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and and Endpoint Platform, customers can get one step ahead of any attacker before a major breach hits.
To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyberVisit Website
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 4,000 customers across 67 countries, including more than 650 of the Forbes Global 2000.Visit Website
FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies and risk. Using the FireMon Security Intelligence Platform, today’s enterprise organizations, government agencies and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands.
For more information, visit http://www.firemon.comVisit Website
Fireware is a specialised information security solution provider based in EMEA. We strive to deliver the highest-quality service to the business and its people providing efficient, reliable and secure networks accompanied by our people-to-people post-sales support services. Fireware partners with the world leading vendors who are carefully chosen based on their technology advancement, financial stability and strong support channel. We implement our own methodology, ADAM, a proven mechanism for securing networks and optimising information security across all business verticals.
For more information visit our solutions page: www.fireware.comVisit Website
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.Visit Website
Forebrook offers a range of information security, governance, IT systems and infrastructure related services. We conduct IT infrastructure assessments, security and risk assessments, vulnerability assessments and penetration tests. We design and implement information security programmes, review and develop information security architectures, security policies, business continuity strategies and disaster recovery plans. We assist organisations in preparing for certification audits such as ISO27001:2013, PCI-DSS, ISO 20000; we conduct compliance reviews for international and regional standards including ADSIC 2.0 and Dubai (ISR). We are KHDA-approved training institute and we specialise in information security and governance trainings offering both certification trainings and short-courses.Visit Website
Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and a market leader in Network Security (FW/NGFW/UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100.Visit Website
Founded in 1990, GBM is the region’s number one provider of IT solutions, leveraging industry-leading technologies and service capabilities to drive real business results for customers.
We have nurtured partnerships with the world’s leading technology companies and invested in a talented, skilled workforce who implements innovative solutions that cater to customer’s specific, complex and diverse business needs. With on-the-ground, readily available expertise, GBM provides round-the-clock support to customers across the region.
Drawing on a 25-year heritage in the region, GBM has an established presence in every country in which it operates, bringing strong understanding of local needs, coupled with access to international expertise and technologies.Visit Website
Gemalto delivers easy to use technologies and services to businesses and governments, authenticating identities and protecting data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients in more than 180 countries to deliver secure digital services for billions of individuals and things. Gemalto’s unique experience in digital security generates value for businesses and governments by protecting identities and data wherever they are.Visit Website
Global Security Network (GSN) is a UAE based, French-owned company, with more than 16 years of experience in delivering high-end IT Security projects in the Middle East. GSN focuses on delivering specialized IT Security solutions to customers like Internal Security, Military, Law Enforcement, Critical Infrastructure and Oil & Gas in the Middle East.Visit Website
Based in Newport Beach, California, GTB Technologies mission is to properly secure sensitive content for organizations by bringing a broad set of influential innovations to the market. GTB’s solutions are focused on eliminating the most advanced cyber-attacks and threats: those coming from the inside. GTB DLP proactively secures sensitive data against cyber threats before attacks intensify and do severe damage. Based in Newport Beach, California, GTB Technologies mission is to properly secure sensitive content for organizations by bringing a broad set of influential innovations to the market. GTB’s solutions are focused on eliminating the most advanced cyber-attacks and threats: those coming from the inside. GTB DLP proactively secures sensitive data against cyber threats before attacks intensify and do severe damage. GTB DLP is growing a brand in Cybersecurity.Visit Website
At Guidance Software, we exist to turn chaos and the unknown into order and the known—so that companies and their customers can go about their daily lives knowing their information is safe and secure. Makers of EnCase®, the gold standard in digital investigations and endpoint data security, Guidance provides the world’s only 360-degree visibility across a suite of mission-critical applications that are deployed on an estimated 25 million endpoints and works with leading enterprise technologies from Cisco, Intel, Box, Dropbox, Blue Coat Systems, and LogRhythm. Our solutions are used by more than 70 of the Fortune 100 and agencies worldwide.Visit Website
Gulf IT Network is IT hardware and software distribution company in Middle East which is established in response to a clear market need for specialized, technical-service oriented distribution and channel support for contemporary IT products. The unique approach of Gulf IT Network is to facilitate new companies to enter into Middle East IT market and enables Gulf IT Network and its vendor partners to capitalize on all IT distribution opportunities in the market.Visit Website
HEAT Software is a leading provider of Cloud Service Management and Unified Endpoint Management software solutions for organizations of all sizes. With its suite of applications, HEAT Software is the only company in the world that provides, from a single platform, Service Management and Unified Endpoint Management software on-premise and in the cloud. HEAT manages millions of service interactions and millions of endpoints every day for thousands of leading organizations across IT, HR, Facilities, Finance, Customer Service and other enterprise functions. Its customers deliver world-class service while maximizing operational efficiencies with reduced cost and complexity.Visit Website
Help AG is a leading cyber security services and solutions provider in the Middle East, founded in Germany in 1995 and has been present in the Middle East since 2004. A winner of multiple media and government awards, recognized as one of the Top 100 SME businesses by Dubai’s Department of Economic Development (DED).
Help AG is solely focused on Information Security and provides Strategic Consulting, Security Analysis Services and Technology Services to a broad range of customers in the Middle East. These are backed by Help AG’s support services division which is a locally based 24/7 operation.
The company has differentiated itself by establishing and maintaining a level of technical expertise that is unrivalled in the region. As the region’s trusted security advisor, Help AG has spearheaded the establishment of the UAE’s Information Security Awareness Committee and plays an ongoing role in raising awareness about the latest trends in the Middle East security market. It does so by conducting its quarterly Security Spotlight Forum event, CIO roundtable events and actively contributing to a broad spectrum of media stories related to IT security.Visit Website
Innovative Solutions (IS) is an ISO 27001 certified information security company based in Riyadh, KSA. Since 2003, IS has enabled its enterprise clients in Telecommunications, Finance, Defense, Government, Education and IT services industries to align their security needs with business objectives, manage risk, comply with regulations and build trust in their e-services. Through its integrated approach to Information Security, IS combines Information Security solutions, services and products to provide its clients a comprehensive and actionable security program. IS has a track record of delivering high quality services to its clients by leveraging on its accumulated expertise through its certified consultants and professionals with their extensive and diversified Info Sec experience.Visit Website
Ipswitch helps solve complex IT problems with simple solutions. The company’s software is trusted by millions of people worldwide to transfer files between systems, business partners and customers; and to monitor networks, applications and servers. Ipswitch was founded in 1991 and is based in Lexington, Massachusetts with offices throughout the U.S., Europe and Asia.
Ipswitch and WhatsUp Gold are registered trademarks of Ipswitch, Inc. in the U.S. and other countries.
ISPIN was founded in 1999 in Switzerland and holds multiple offices in the Europe & Middle East region, including our internal laboratory. The company currently employs 45 security consultants and is consistently experiencing solid growth year after year. We are Information and IT Security Architects. This has given us the highest reputation in our home market in Europe. We understand our customer needs and implement the needed solution with very high project management skills. Especially for the Middle East not only the solution is important also the exact implementation so that the solution works and runs on the customer site. We are experts in this. We are creating IT Master Plans to develop the future of companies. We are responsible in terms of Project Management that this plan will be implemented. Once the work is done, we are assessing it, means that all installations have to be proper installed according to the plan. Even World Class companies like EMC, IBM and others trust our professional services.
More details are on the webpage www.ispin.aeVisit Website
iStorage Limited is a leading British developer and manufacturer of secure portable data storage and encryption products, in Flash, Hard Drive, and Solid State Drive formats, that are available in capacities ranging from 4GB to 6TB. By combining the power of strong, easy to use, authentication and hardware data encryption we provide the highest level of protection available against theft or loss of confidential data.
The iStorage products are accredited across the range, include FIPS 197, FIPS 140-2 Level 2, FIPS 140-2 Level 3, IP57, CESG, CCTM.Visit Website
Ixia provides testing, visibility and security solutions, strengthening applications across physical and virtual networks for enterprises and governments, service providers and network equipment manufacturers. Ixia helps customers manage the unpredictable world of IT and protects them against security threats through actionable insight into the performance, stability and security of their applications and networks. Ixia enables organizations to deliver a seamless, reliable and secure experience to their customers. Whether it is testing a product, validating the integrity of a security infrastructure. Organizations worldwide rely on Ixia’s solutions to verify their designs, optimize their performance and ensure protection.Visit Website
At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.
Every day, Juniper Networks is helping our customers build the best networks on the planet. Every innovation we envision, every technology we create is informed by our desire to help solve our customers’ toughest challenges so they can compete and thrive today and into the future.
Visit www.juniper.net to know more.Visit Website
Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.Visit Website
We are one of the world’s fastest-growing cybersecurity companies and the largest one that is privately-owned. With a holding registered in the United Kingdom, we operate in 200 countries and territories and have 37 offices in 32 countries. Almost 3,300 highly-qualified specialists work for Kaspersky Lab.
We are a global company, with a global vision and a focus on international markets. Our annual revenues now exceed $700 million ($711 million unaudited revenue in 2014).
Our independence allows us to be more agile; to think differently and act faster. We are forever innovating, delivering protection that’s effective, usable and accessible. We pride ourselves on developing world-leading security that keeps us – and every one of our 400 million users protected by our technologies and 270,000 corporate clients – one step ahead of potential threats
Lancope enhances Cisco’s Security Everywhere strategy, enabling the network to become a security sensor, delivering continuous visibility, and accelerating incident response across the extended enterprise. Lancope provides deep understanding of network traffic, continuously monitoring and analyzing network flows to establish a security baseline, detect anomalous threats, and enable rapid containment.Visit Website
Linoma Software provides innovative technologies for protecting sensitive data and automating data movement. They have a diverse install base of a huge network of customers around the world including Fortune 500 companies, non-profit organizations and government entities. The organization is partnered with major software providers including IBM, Microsoft, Oracle, Red Hat and Novell. The products are certified to work on most operating systems including Windows, Linux, and IBM i and UNIX.GoAnywhere MFT is a managed file transfer solution which streamlines the exchange of data between your systems, employees, customers and trading partners. It supports all of the popular protocols and encryption standards including SFTP, SCP, FTPS, FTP, Open PGP, HTTPS, AS2 and ZIP with AES encryption. It is a comprehensive solution that will manage all of your organization’s file transfer needs through a single interface.Visit Website
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence. LogRhythm is consistently recognized as a market leader. The company has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for three consecutive years, named a “Champion” in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report and ranked Best-in-Class (No. 1) in DCIG’s 2014-15 SIEM Appliance Buyer’s Guide. In addition, LogRhythm has received Frost & Sullivan’s SIEM Global Market Penetration Leadership Award and been named a Top Workplace by the Denver Post.Visit Website
LookingGlass Cyber SolutionsTM is a threat intelligence-driven security company that provides the most comprehensive threat intelligence portfolio in the industry. Our information, expertise and capabilities help protect brand, ensure compliance, proactively identify information leaks and abuse, manage the overall deluge of threat data, and proactively operationalize threat intelligence into the IT security infrastructure.
LookingGlass provides Dynamic Threat Defense by addressing structured threats and Indicators of Compromise, unstructured and open source (OSINT) risk data, internal network telemetry, physical threats, and mitigation options. This enables security teams to confidently prevent, detect, understand and resolve prioritized, relevant threats throughout every stage of the threat lifecycle in an effective and efficient way. The LookingGlass solution portfolio of threat intelligence services, machine readable threat intelligence, threat intelligence management with 140+ sources of threat data analyzed and transformed into threat intelligence, and network mitigation capabilities enable our intelligence-driven approach to be proactively leveraged by our clients unlike any other company in the industry.Visit Website
Malwarebytes protects consumers and businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware for Business, has a highly advanced heuristic detection engine that removed more than 5 billion malicious threats from computers worldwide in 2015. More than 70,000 SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices across Europe, and a global team of researchers and experts. Malwarebytes protects consumers and businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware for Business, has a highly advanced heuristic detection engine that removed more than 5 billion malicious threats from computers worldwide in 2015. More than 70,000 SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices across Europe, and a global team of researchers and experts. Malwarebytes reflects the operating philosophy of its founder and CEO Marcin Kleczynski: to create the best disinfection and protection solutions to combat the world’s most harmful Internet threats. Marcin was awarded the Technology Hero of the Year at the 2015 V3 awards and was also named as 2015 Forbes 30 Under 30 Rising Stars of Enterprise Technology list and the Silicon Valley Business Journal’s 40 Under 40 award, adding those to a 2014 Ernst & Young Entrepreneur of the Year Award.For more information, please visit us at www.malwarebytes.org.Visit Website
ManageEngine delivers the real-time IT management tools that empower IT teams to meet organizational needs for real-time services and support. Worldwide, established and emerging enterprises – including more than 60 percent of the Fortune 500 – rely on ManageEngine products to ensure the optimal performance of their critical IT infrastructure, including networks, servers, applications, desktops and more. ManageEngine is a division of Zoho Corporation with offices worldwide, including the United States, India, Singapore, Japan and China. For more information, please visit http://buzz.manageengine.com/; follow the company blog at http://blogs.manageengine.com/, on Facebook at http://www.facebook.com/ManageEngineand on Twitter @ManageEngine.Visit Website
MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises.
The company’s main focus is saving time and efforts of clients by providing full-cycle product development, offering dedicated project teams for long-term collaborations, making quality assurance an integral part of development, and regular product deliveries. Another major work principle embraced by MobiDev is flexibility: the company adjusts its activities to clients’ business processes, tools, and environments; enables transparency of actions and quick problem-solving; and establishes effective communication with other involved teams, if required.
MobileIron provides the secure foundation for companies around the world to transform into Mobile First organizations.
Secure corporate data, drive employee productivity, and enable business innovation in ways you never thought possible. Harness the power of mobile devices with the leading enterprise mobility management (EMM) platform from MobileIron. By providing a modern EMM solution that meets both user demands and IT security requirements, MobileIron enables today’s large enterprises to become truly Mobile First.Visit Website
Nanjgel Solutions is focused on delivering the best IT security for businesses. We lead the way in a different approach to Information security to protect you better, give you more visibility, make security innovations simple to deploy, that fit your security budget. Our approach allows you to simplify your network security infrastructure and to eliminate the need for a variety of stand-alone and bolt-on security devices. We provide next-generation information technology solutions that enable business to be conducted securely and privately on the Internet. Our security technologies are significantly ahead of the industry in intelligence, performance and ease of deployment—effectively detecting, analysing and preventing cyber and internal threats as they develop. Nanjgel Solutions has remained one-step ahead by providing best-of-breed products and solutions that are focused on providing tangible results for network management, productivity and information security solutions.Visit Website
NetIQ solutions, a Micro Focus brand, allow organizations to use integrated identity information to create and manage identities and control access to enterprise resources. Since decades, we provide a complete identity-driven security framework including Identity and Access Management, Single Sign-On (WebSSO or e-SSO), Access Governance, File Integrity Monitoring, SIEM, Multi-Factor Authentication and much more. All our products including the Emirates ID support module compose an easy to build, operate and maintain integrated solution stack.
Our solutions are able to detect and respond to, all potential threats quickly and decisively. By monitoring user activities, security events and critical systems, we provide actionable security intelligence to reduce the risk of data breach.
We also grant a holistic view of your IT environment and business services, enabling your company to integrate service, applications and systems management, improving performance and availability.
Getting affordable, high-performance disaster recovery through our specific disaster recovery PlateSpin solutions, assuring warm-backup recovery speeds similar to mirroring, but at low costs similar to tape backup.Visit Website
Netskope, the leading cloud access security broker (CASB), helps enterprises find, understand and secure sanctioned and unsanctioned cloud apps. Through contextual awareness and a multi-mode architecture, Netskope sees the cloud differently. This results in the deepest visibility and control, the most advanced threat protection and data loss prevention and an unmatched breadth of security policies and workflows. The world’s largest companies choose Netskope, the only CASB that ensures compliant use of cloud apps in real-time, whether accessed on the corporate network, remotely or from a mobile device. With Netskope, enterprises move fast, with confidence.Visit Website
Odyssey is a regional leader in the provision of cyber security solutions and services, helping organisations in effectively and efficiently managing information security risk. Odyssey’s flagship service-line is ClearSkies© SIEM, delivered through a home-grown platform which re-defines the SIEM industry by incorporating innovative features including BigData analytics and continuous threat intelligence feeds by Odyssey’s IthacaLabs©. Its flexible SECaaS SIEM services address the needs of organizations of different size and industry, and can be upgraded to Managed Security Protection & Outsourcing Services.
The company has offices in Cyprus, Greece, Serbia and Dubai and delivers its services through multiple strategically located security operation centers.Visit Website
Offensive Bits is an Emirati Information security company founded and managed by UAE nationals who are experts in the cyber security field. Offensive Bits is specialized in security consultancy services such as Penetration Testing, Security Code Review, and Ethical Hacking Hands-on training. Offensive Bit’s aim is to contribute to the national efforts in securing the Critical National Infrastructures and Government Entities. Consequently, Offensive Bits acquired trusted and competent talents, who are highly skilled in discovering Vulnerabilities and conducting Penetration Testing based on international standards and built in-house customized methodologies. Throughout the years, OffensiveBit’s consultants have executed many projects and achieved exceptional results, in which many Zero Days were discovered and many bugs were hunted. Our team is always up to date with the latest hacking techniques and they are actively updating our methodologies to cope with the new threats. Helping our clients to identify and overcome security gaps is what keeps us happy.Visit Website
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organisation’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organisations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Engie, Etihad Airways, Chiquita, LinkedIn, and Western Union, trust Okta to help their organisations work faster, boost revenue, and stay secure.Visit Website
As the leading experts in SAP and Oracle cyber-security, Onapsis enables security and audit teams to have visibility, confidence and control of advanced threats, cyber-risks and compliance gaps that exist within their enterprise applications.
Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, Deloitte, E&Y, IBM, KPMG and PwC.
Onapsis solutions include the Onapsis Security Platform, which is the most widely-used SAP-certified cyber-security solution in the market. Unlike generic security products, Onapsis’ context-aware solutions deliver an adaptive approach to security with preventative, detective and responsive controls combined with continuous monitoring for risks affecting critical business processes and data.Visit Website
Paladion is a specialized partner for information risk management to leading organizations across industries in Asia, US and Middle East.Paladion is rated as the largest ‘pure-play’ Information Risk Management partner in Asia and is also the only Gartner rated managed security provider in Middle East.
For over a decade, Paladion has been actively managing information risks for over 700 customers. Paladion provides complete spectrum of information risk management comprising of security assurance, compliance, governance, monitoring, security analytics and security management services to large and medium sized organizations. Paladion also offers a suite of Security Intelligence Products for global enterprises and Cloud Managed Security Services for mid-market organizations. Paladion’s offerings have been recognized and awarded by Gartner, Asian Banker, and Red Herring amongst others. Paladion is also actively involved in several information risk management research forums and has authored many books on the same.Visit Website
As the next-generation security company, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. We are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud.
Because these capabilities are natively built into our platform and designed to deliver highly automated preventative measures against cyberthreats, we ensure superior security to legacy point technologies such as stateful inspection firewalls, UTMs, or endpoint security products. With our platform, organizations can confidently pursue a digital-first strategy as they implement key technology initiatives within the cloud and increasingly mobile networks, while maintaining complete visibility and control, to protect their most valued data assets and critical control systems.
With a legacy spanning more than two decades, Paramount has been the pioneer of providing technology and services to secure the Information Assets of businesses across GCC. Founded in 1992, transformed in 1999 and re-invented in 2007, the company considers itself a “class in transition”.
We at Paramount provide four main types of services such as Consulting, Security Technology, Identity and Access Management and Managed Security Services.
The company is also a part of the region’s rarest breed of organizations which have been awarded ISO 27001:2013, ISO 9001:2008, ISO 22301 and ISO 20000 certifications. On top of that, Paramount has also won numerous accolades like Dubai Quality Appreciation Program, Mohammed bin Rashid Award for Business Excellence, Dubai Chamber’s Happiness in the Workplace Award while it is a regular winner of Dubai Chamber’s CSR Label and Dubai SME100 rankings.Visit Website
PGI offers the full range of cyber security services including threat intelligence; penetration testing and vulnerability assessment; ISO27001 and security management policies; network monitoring; forensics and cyber incident response.Its staff are from specialist British government, military and commercial backgrounds and accredited for CREST, CHECK, Tigerscheme PCI:DSS, and ISO27001. PGI’s Cyber Academy provides leadership training and specialist cyber training including CISSP and penetration testing courses for government agencies, law enforcement and commercial clients.Visit Website
Ping Identity is The Identity Security Company. Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 1,200 companies, including half of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. Visit pingidentity.com for more information.Visit Website
Proofpoint helps the most successful companies in the world protect and govern their most sensitive business data. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches. Proofpoint, positioned by Gartner in the Leaders Quadrant in their 2015 Magic Quadrant for Secure Email Gateways, and 2015 Magic Quadrant for Enterprise Information Archiving, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications—all of which are based on a common security-as-a-service platform.Visit Website
ProVise Management Consultancy offers IT Governance, Risk and Compliance (GRC) Advisory and Cyber Security services to Banks, Government, Telecom and Oil & Gas sector in the GCC sector.
Established in the UAE in 2011 to bridge the gap of “advise” to “realize” in IT GRC consulting now with GCC footprint.
The core team has 100+ years of cumulative consulting experience in the region.
The GCC team consists of are 27 consultants with 12 clients and year on year growth of average 80% last four years.
Our key clients includebanks, financial institutions, government, oil & gas and telecom clients in UAE, Oman, Bahrain, Kuwait.
Website: www.proviseconsulting.comVisit Website
Rapid7 is engineering better security with simple, innovative solutions for IT security’s most critical challenges. Our security data and analytics solutions collect, contextualize, correlate, and analyze the security data you need to dramatically reduce threat exposure and detect compromise in real-time. They speed investigations so you can halt threats and clean up systems fast. Plus, our analytics give you the specific information you need to systematically improve security processes within your organization. Unlike traditional vulnerability assessment or incident management, Rapid7’s comprehensive data collection, attacker intelligence and user-behavior analytics give you immediate insight into the security state of your assets and users from the endpoint to the cloud. We offer unmatched capabilities to spot intruders leveraging today’s #1 attack vector, compromised credentials. Our ability to help goes beyond our innovative technology. Rapid7 security experts can help you advance your security program, whether you need emergency breach response or to transform your security processes and better align investments to your organization’s risk and needs. Rapid7 is trusted by more than 5,100 organizations across 99 countries, including 37% of the Fortune 1000.Visit Website
RAS Infotech is a Value Added Distributor who works exclusively with selected manufacturers in IT Security Space. Our goal is to use simple systems and software products to help businesses solve their critical business problems. Every day we and our vendors help over 1500 clients to achieve greater efficiency and safety by using our Solutions and professional services such as implementation help and guidance. These solutions span the areas of Client Security, Web Security, Email Security, Information Security, Log Management, Identity Management, Patch Management, Software Management, Data Leakage Prevention and Monitoring Systems and Privilege Management.Visit Website
RedSeal provides a cybersecurity analytics solution to Global 2000 organizations that helps maximize their digital resilience. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, prioritizes needed actions, and provides critical information to quickly remediate issues. RedSeal’s security platform was designed to work with thousands of devices on complex networks. More than 200 Global 2000 corporations and government agencies worldwide use RedSeal to maximize their networks’ resilience. The company’s commercial customers span the finance, utilities, service provider, technology and retail sectors. RedSeal’s security platform is also used in many large US federal agencies, including the DoD, civilian and intelligence communities.Visit Website
Reload is the first private CERT (Computer Emergency Response Team) in the Gulf region and now a regional distributor for cloud security and big data solutions. Reload assists its partners and resellers to solve customers’ security pain points by incorporating the latest tests security technologies.
Reload consults in cyber intelligence and threats feeds, assists in responding to incidents and design mitigation processes. We helped many financial institutions and large corporations in securing their networks. We worked closely with retail, investment, and central banks in the region to achieve the highest security defenses.Visit Website
Resilient Systems (formerly Co3 Systems) is the leading Incident Response Platform provider, empowering organizations to thrive in the face of cyberattacks and business crises. Our collaborative platform arms incident response teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter. Headquartered in Massachusetts, USA, Resilient Systems’ customers are some of the world’s most trusted organizations.Visit Website
RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.
For more information, go to www.rsa.com
Seclore Rights Management enables organizations to control access to information wherever it goes, both within and outside of the organization’s boundaries. The ability to remotely control who can view, edit, copy, and distribute unstructured information empowers organizations to embrace mobility, Cloud, and external collaboration with confidence. The most integration-friendly solution, Seclore Rights Management extends and enhances the security of information detected and downloaded from EFSS, MFT, DLP, ECM, ERP systems and attached to Mail/ Messaging solutions through pre-built connectors. With nearly 4 million users across 420 companies in 29 countries and rapidly growing, Seclore is helping organizations achieve their security, privacy and compliance objectives. Seclore Rights Management is the most integration-friendly IRM system in the world.Visit Website
Flexera Software is the leading provider of next-generation software licensing, compliance, security and installation solutions for application producers and enterprises. Our next-generation software licensing, compliance and installation solutions are essential to ensure continuous licensing compliance, optimized software investments and to future-proof businesses against the risks and costs of constantly changing technology.Visit Website
Shifra is a value added distributor founded in 2007 out of Dubai Internet City with a partner network covering the Middle East region. Shifra provides expertise to enterprise customers around the Middle East in three main areas: Information Security, Identity Protection and Enterprise Mobility. The name Shifra originates from the word “Sifr”, the Arabic numeral zero which was later used to describe a cipher that then created a coded message, thus forming the basis of encryption as we know it today. Our portfolio includes products as follows: Gemalto, Proofpoint, Aerohive, Bradford Networks, Centrify, Hillstone Networks, Resilient Systems, Versasec, Cloud4Wi, Nexus, Voltage HP, Cloud Access, Corero, Vormetric, Evidian.Visit Website
Simeio Solutions, Inc. offers complete, end-to-end Identity and Access Management (IAM) services and solutions powered by the Simeio Identity Intelligence Center™ (IIC). A single-source for all your identity and access management needs, our offering spans plan to build to operate, with a la carte access to professional services (strategy and implementation), business-ready IAM cloud solutions, and expert managed services for on-going operational support. Simeio is headquartered in Atlanta, Georgia with offices around the world. Simeio provides services to numerous Fortune 1000 companies across all industries including financial services, high technology, health care, public utilities, education and more.
To learn more about Simeio Solutions visit http://www.simeiosolutions.com.Visit Website
SISA is a global payment security specialist having presence in 30 countries. Started in 2003, SISA provides payment security assurance services, training and products to over 1,000 customers across the globe. We are a QSA-C for the PCI SSC since 2007 and over the years we have built our expertise in Payments security space. We are an authorized assessor for various Payments Security Standards and are listed as a PCI QSA, PCI ASV, PA-QSA, P2PE-QSA, PCI PFI and VISA Approved PCI PIN Security Assessor. Operating out of Bahrain in GCC, we have worked with more than 100 leading organizations in Middle East & Africa on PCI DSS Compliance program. For more details visit: www.sisainfosec.comVisit Website
We arm security leaders with a powerful set of integrated security solutions that give unprecedented visibility of the attack surface and key Indicators of Exposure (IOEs) such as exploitable attack vectors, hot spots of vulnerabilities, network security misconfigurations and non-compliant firewalls. We help security professionals break down silos of information through integration with dozens of security solutions that enterprises are already using. By extracting actionable intelligence from data using modeling and simulation, Skybox gives security leaders the insight they need to quickly make decisions about how to best address threat exposures that put their organization at risk, increasing operational efficiency by as much as 90 percent. Our award-winning solutions are used by the world’s most security-conscious enterprises, government agencies and organizations for vulnerability management, threat intelligence management and security policy management. Many of our customers are on Forbes’ Global 2000 List, including six of the top 10 global banks and six of the 10 largest NATO member countries.Visit Website
Smokescreen’s IllusionBLACK is the industry’s most advanced decoy technology — bringing military deception principles to the digital battlefield. It offers unparalleled threat visibility and false-positive free detection across the kill chain, so companies can defeat targeted attacks long before business impact occurs. Smokescreen’s solutions are used in some of the most highly targeted environments globally.Visit Website
Since our founding in 1999, SolarWinds’ mission has been to provide purpose-built products that are designed to make IT professionals’ jobs easier. We offer value-driven products and tools that solve a broad range of IT management challenges – whether those challenges are related to networks, servers, applications, storage or virtualization.
We distinguish ourselves by refusing to accept the status quo established by most other enterprise software vendors. Face it: The vast majority of IT management tools today are difficult to use, expensive, and really do not address the realities of today’s real-world IT management challenges. Sadly, IT pros have resigned themselves to accept this as just another part of the job. But we do not think enterprise software has to be as complicated as its made out to be.
At SolarWinds, we are fanatical about putting our users first in everything we do. We strive every day to deliver powerful functionality that is easy to use with one of the fastest and longest lasting ROIs in the marketVisit Website
More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage and use, Sophos’ award-winning encryption, endpoint security, Web, email, mobile and network security solutions are backed by SophosLabs – a global network of threat intelligence centers. Sophos is headquartered in Oxford, UK, and is publicly traded on the London Stock Exchange under the symbol “SOPH.”Visit Website
Spectrami was incepted with the vision of bringing niche and specialized technologies and make it available to the customers in the MEA region. The objective was to deliver a seamless service level akin to leading vendors by building up an ecosystem in the region that adds value to the Customers, Resellers & Vendors. We service the entire eco-system with our local team of sales and technical resources present in UAE- Dubai & Abu Dhabi, Kuwait, Oman, Saudi Arabia and Qatar.Visit Website
Spire Solutions is the Middle East’s preferred value added distributor of information security solutions and services. Thanks to our handpicked technology partners, our channel partnerships and our own internal team of information security professionals, we can help your organization build and maintain a secure, compliant and more confident operation.
Spire Solutions’ fast growth is directly related to our dedicated team of experts and state of the art customer service. Today, as a well-established Information Security firm, we pride ourselves for our impressive portfolio of loyal clients who depend on us to work in a secure IT environment. Our valued clients know that they can rely on us to increase their productivity and deliver higher performance faster, more efficiently and at lower costs.Visit Website
Splunk Inc. (NASDAQ: SPLK) is the market-leading platform that powers Operational Intelligence. We pioneer innovative, disruptive solutions that make machine data accessible, usable and valuable to everyone. More than 10,000 customers in over 100 countries use Splunk software and cloud services to make business, government and education more efficient, secure and profitable.
Splunk® security solutions enable organizations to detect, respond and prevent threats by providing valuable context and visual insights to help you make faster and smarter security decisions. Splunk enables analytics-driven security. Join hundreds of thousands of passionate users by trying Splunk solutions for free: http://www.splunk.com/free-trialsVisit Website
StarLink is acclaimed as the largest and fastest growing “True” Value-Added IT Security Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 10 countries.
With its innovative Security Framework, StarLink is also recognized as a “Trusted Security Advisor” to over 1000 enterprises and government customers that use one or more of StarLink’s best-of-breed and market-leading technologies, sold through its Channel network of over 250 Partners.
The StarLink Solution Lifecycle helps Channel Partners differentiate offerings, and assists customers to identify key risks and define priorities for addressing IT Security gaps relating to compliance and next-generation threat protection.Visit Website
Stormshield, a fully-owned subsidiary of Airbus Defence and Space, is a global provider of innovative end-to-end security solutions for the protection of networks (Stormshield Network Security), Workstations (Stormshield Endpoint Security) and Data (Stormshield Data Security). These next-generation reliable solutions have the highest level of European certifications (EU RESTRICTED, NATO and ANSSI EAL4+) and guarantee the protection of strategic information. They are supplied worldwide by a partner network of distributors, integrators and operators in companies of all sizes, government agencies, and military organizationsVisit Website
Tatweer Solutions is a focused cyber security company headquartered in Dubai. Our portfolio covers the range of our enterprise security architecture. This security architecture ranges from endpoint and network security, which is the foundation of any strong security portfolio; Content Security and Identity Management; Data Protection and Application Security; and culminates Advanced Malware Defense and Risk & Compliance. We are confident in our security team’s ability to contribute to your organizational security posture, and we look forward to demonstration this to you at our booth in GISEC.Visit Website
From Aerospace, Space and Defence to Security and Transportation, Thales helps its customers to create a safer world by giving them the tools they need to perform critical tasks. Whenever a critical decision needs to be made, we are there. To help create a safer world, we serve five keys sectors :
• Ground Transportation
Our expertise allows our customers to find the right solutions for difficult problems in challenging environments. We are proud of the role we play in a world that is increasingly mobile, interconnected, interdependent and dangerous.
Together. Safer. Everywhere.Visit Website
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cyber security threats.
Tripwire discovers every asset on an organization’s network and delivers high-fidelity visibility and deep intelligence about these endpoints. When combined with business-context, this valuable information enables immediate detection of breach activity and identifies other changes that can impact security risk.Visit Website
ValueMentor is a Specialist Information Security Consulting company offering tailor made services to enhance an organization’s Information Security. Penetration Testing, Vulnerability Assessments, Mobile App Security, Ethical Hacking, NESA Compliance, ISO 27001 consulting and PCI QSA audits are some of the key services offered by ValueMentor.
Our Managed Security services include Log monitoring and SOC services. ValueMentor is vendor agnostic, we do not resell any software or hardware and will always recommend ONLY the best solution for the organization.
ValueMentor services can be grouped as Security Assessment Services, Information Security Consulting Services & Managed Security ServicesVisit Website
Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. As of June 30, 2015, Varonis had approximately 3,750 customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities, technology, consumer and retail, education and media & entertainment sectors.Visit Website
Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—keys and certificates—so they can’t be misused by bad guys in attacks. Venafi constantly assesses which keys and certificates are trusted, protects those that should be trusted, and fixes or blocks those that are not.Visit Website
VMware is a leader in cloud infrastructure and business mobility. Built on VMware’s industry-leading virtualization technology, our solutions deliver a brave new model of IT that is fluid, instant and more secure. Customers can innovate faster by rapidly developing, automatically delivering and more safely consuming any application. With 2014 revenues of $6 billion, VMware has more than 500,000 customers and 75,000 partners. The company is headquartered in Silicon Valley with offices throughout the world and can be found online at www.vmware.com.Visit Website
AirWatch by VMware is the leader in enterprise mobility management (EMM). With industry-leading identity, productivity and collaboration solutions, we enable end users with a seamless digital workspace. We empower IT with a future-proof mobility platform that provides flexibility to manage multiple use cases, unified management of endpoints, end-to-end security from devices to data center, and seamless integration across enterprise systems. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com. VMware is headquartered in Silicon Valley and can be found online at www.vmware.comVisit Website
WALLIX is a software company offering privileged access management solutions for large and medium sized enterprises, public organizations and cloud service providers, helping their many customers to protect their critical IT assets including data, servers, terminals and connected devices. Our offer, Wallix AdminBastion Suite (or WAB Suite), gives the most effective route to security and compliance by reducing its users’ biggest security risk – privileged access to IT – in the shortest possible time. WALLIX is a public company listed on Alternext, with a strong customer presence in EMEA. WALLIX has offices in Paris, New-York and London. Over 300 companies trust WALLIX to secure their IT systems.Visit Website
Westcon-Comstor (WestconGroup Inc.) is a value-added technology distributor of category-leading solutions in Security, Collaboration, Networking and Data Center. The company is transforming the technology supply chain through its global capabilities in Cloud, Global Deployment and Services. Westcon-Comstor has teams in 70 countries, combining expert technical and market knowledge with industry-leading partner enablement programs. Collaborating with its partners in a unique engagement model, Westcon-Comstor strives to provide an exceptional partner experience in delivering results together. The company goes to market under the Westcon and Comstor brands.Visit Website
ZSS Login is the world’s first geographical password solution. It utilise the remarkable human ability to remember places as a way to provide safe access, where users can select geographical locations as their very strong access credential to different systems.
Employees instead of writing difficult to remember, construct, and maintain conventional passwords, using this UK patented technology, they will just pick places on planet Earth which will generate extremely strong geographical passwords highly protective to enterprise assets.
Just imagine your geographical password to your email or social network is your summer home or the lake you have visited few years ago!
DOWNLOAD – ZSS Login – Flyer
PRODUCT LISTING – Access solutions, Authentication/verification, Email security, Identity management, Password protection/management, Internet securityVisit Website