Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Two9:15 am - 9:45 am
At CSPi we are committed to helping our customers meet some of computing’s most demanding performance, availability and security challenges.
Today’s security teams receive a great deal of real-time information and intrusion alerts, generated from their security equipment and tools; yet, the volumes of data make it make it nearly impossible for incident response teams to validate a data breach. With our Myricom nVoy Series solution we offer our customers a new approach to cyber threat identification and investigation – a rapid breach response solution that identifies alerts associated with a specific asset and provides an extraction of the entire set of conversations associated with that breach.This detailed data is crucial in performing timely and accurate analysis needed to comply with data-privacy regulations such as GDPR, PCI DSS, HIPPA, SOX, and 48 different U.S. state laws related to PII.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
For over a decade and thousands of terabytes uploaded, Nordic Backup has never a lost a single byte of customer data. We’ve restored thousands of computers and millions of files, getting businesses back up and running and individuals back to normal.
More than anything else, we believe that says who we are.
Session Four10:45 am - 11:15 am
PacketViper is deception technology which solves important cybersecurity problems for our clients and produces practical, real-world results, including dynamic network defense, relief of security related operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper produces relevant intelligence that is automatically applied and supports real-time policy enforcement. Our customers are in both the public and private sectors and cover multiple industries.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:45 pm
Keynote Details Coming Soon
Break12:45 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
About SSH Communications Security
SSH.com delivers some of the most advanced security and access management software technology in the world. Our industry-leading solutions and expertise are used by Fortune 500 companies and federal agencies. The Secure Shell protocol that we invented in 1995 is vital to how people and machines access valuable resources and data every day. We’ve been safeguarding the data economy ever since.
Session Seven1:30 pm - 2:00 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Eight2:15 pm - 2:45 pm
It all started when our founders, working for one of the most successful network security companies at that time, were frequently asked by customers how they should implement the same type of security in the cloud. This prompted the realization that the best security technologies for malware detection, data classification, encryption, user management, access control, and so much more already existed. Unfortunately, customers had no way to connect it to their SaaS applications in a unified way, with just a single click.
With that vision in mind, Avanan cloudified the security tools of the industry’s leading vendors and built a platform that could connect these tools to the most widely used enterprise SaaS applications. With everything virtualized, installing these tools on any SaaS is as easy as installing an app on a phone. By simply choosing the security tools from the Avanan security app store, customers can implement multiple security solutions across any or all of their SaaS applications.