Features - Page 13

Emile Abou Saleh, Senior Regional Leader META, Proofpoint.

Data does not lose itself, people lose data

Data doesn’t lose itself. People lose data, and organisations are increasingly adopting data loss prevention strategies to manage that risk. Unfortunately, legacy products fall far short in actually preventing, detecting, and investigating data loss
3 years ago
Emad Fahmy, Systems Engineering Manager Middle East, NETSCOUT.

Connected world complicated due to visibility gaps

The connected world has become more complicated due to digital transformations, cloud migration, and the hybrid workforce, and visibility gaps have hampered problem resolution. NETSCOUT Visibility Without Borders provides visibility across hybrid
3 years ago
Gordon Love, Vice President EMEA Emerging Region, Mandiant.

Effective security is based on expertise and intelligence

Mandiant helps CISOs protect their organisations against advanced and emerging threats including supply chain vulnerabilities. Mandiant’s managed detection and response, MDR service defends businesses across endpoint, network, cloud, email and operational technology
3 years ago
Raja Ukil, SVP APAC, Middle East Sales and Strategic Partnerships, ColorTokens.

Designed to be cloud-scale and cloud-delivered

ColorTokens’ Xacces enables secure access for remote employees, third parties, and contractors from distributed locations as they connect with their cloud or datacentre-based applications without exposing the application or workload to the
3 years ago
Saket Modi, Co-Founder and CEO, Safe Security.

What is your Breach Likelihood Score?

SAFE is a SaaS cybersecurity and cyber risk quantification platform. It uses a Supervised Machine Learning engine to give an output in the form of a Breach Likelihood Score between 0-5 and
3 years ago
1 11 12 13 14 15 59

Categories