Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm2 Galleria Pkwy SEAtlanta, GA 30339770-955-8000
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 am
Because we lead with rapid innovation, we are often imitated by the competition. Our radically simple Software Defined architecture affords customers a real choice of “good, better, and best” network deployment and management.
IT professionals can say “yes” to more use cases and satisfy the ever-increasing end user demand because of the innovation of our SD-LAN foundational technology with a roadmap of firsts in SD-WAN, SD-ANALYTICS, SD-OPERATION, and SD-IoT capabilities.
To use Aerohive is to love Aerohive, which is why an exponentially greater percentage of our customers recommend us over the competition.
Session Three10:15 am - 10:45 am
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
Session Four10:45 am - 11:15 am
IT teams have always faced performance vs. cost decisions: do we increase cost to get the performance we want, or do we sacrifice performance to save money? With Quorum, you can get both performance and cost savings. Our “HA Anywhere” architecture gives our customers performance and value, and it’s our vision for how Cloud HA and DR should be.
At the core of “HA Anywhere” is Quorum onQ: A fully encrypted, fast and easy high availability solution. Putting customer’s privacy and security first, onQ is built to provide the most secure, best performing backup and recovery in the industry.
Session Six1:00 pm - 1:30 pm
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Seven1:30 pm - 2:00 pm
About SSL Store
The SSL Store™ was founded in 2009 and is owned by the Internet security firm Rapid Web Services, LLC. Our headquarters is located in sunny St. Petersburg, Florida, and we have additional offices in The Netherlands and India…where there are 50+ people working on website security solutions just for you! As the world’s foremost provider of SSL security certificates, The SSL Store™ is one of the largest Platinum Partners of the world’s leading Certification Authorities (CAs), including Symantec, GeoTrust, Thawte, RapidSSL, Certum and Comodo.
Session Eight2:15 pm - 2:45 pm
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions. Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia.
Session Nine3:00 pm - 3:30 pm
At Cybraics, we believe that cyber-crime is the greatest threat in modern history. Every day hackers, terrorists, and nation states are looking for new ways to infiltrate and attack corporations around the world. And every day, they are finding ways around our defenses, costing corporations and consumers billions of dollars. The problem is the current security paradigm is flawed; it is based on companies learning from events that have already happened. This leads to a rate of learning that is far less than that of our adversaries. It forces us into a reactive position, rather than a proactive posture, and that leads to the well-known adage that criminals are always “one step ahead.” We believe that it is time to finally remove the “edge” our attackers have over us and to find a new approach to thwart their attacks. In order to fight our adversaries, we must increase our rate of learning. We must learn from them in a proactive way. We must learn from their actions, not their outcomes.
Session Ten3:30 pm - 4:00 pm
About Checkpoint Technologies
Checkpoint Technologies, Inc. provides expert services and best-of-breed software solutions with a focus in Quality Assurance and software testing. We enable organizations to deliver higher-quality applications to market faster. Checkpoint Technologies is Software Quality. Assured.
Checkpoint Technologies has unparalleled expertise in Quality Assurance and Software Testing. That is our passion. We specialize in functional, performance, mobile application, and application security testing. We provide services such as staff augmentation, consulting, training, and customized mentoring. Our vast knowledge in methodologies and best practices ensure our clients maximize the value of IT on their business.