Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Two9:15 am - 9:45 am
At CSPi we are committed to helping our customers meet some of computing’s most demanding performance, availability and security challenges.
Today’s security teams receive a great deal of real-time information and intrusion alerts, generated from their security equipment and tools; yet, the volumes of data make it make it nearly impossible for incident response teams to validate a data breach. With our Myricom nVoy Series solution we offer our customers a new approach to cyber threat identification and investigation – a rapid breach response solution that identifies alerts associated with a specific asset and provides an extraction of the entire set of conversations associated with that breach.This detailed data is crucial in performing timely and accurate analysis needed to comply with data-privacy regulations such as GDPR, PCI DSS, HIPPA, SOX, and 48 different U.S. state laws related to PII.
Session Three10:15 am - 10:45 am
For over a decade and thousands of terabytes uploaded, Nordic Backup has never a lost a single byte of customer data. We’ve restored thousands of computers and millions of files, getting businesses back up and running and individuals back to normal.
More than anything else, we believe that says who we are.
Session Four10:45 am - 11:15 am
PacketViper is deception technology which solves important cybersecurity problems for our clients and produces practical, real-world results, including dynamic network defense, relief of security related operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper produces relevant intelligence that is automatically applied and supports real-time policy enforcement. Our customers are in both the public and private sectors and cover multiple industries.
About SSH Communications Security
SSH.com delivers some of the most advanced security and access management software technology in the world. Our industry-leading solutions and expertise are used by Fortune 500 companies and federal agencies. The Secure Shell protocol that we invented in 1995 is vital to how people and machines access valuable resources and data every day. We’ve been safeguarding the data economy ever since.