Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm5605 Blazer ParkwayDublin, OH 43017614-791-1000
Check-in and opening introductions
Session One8:45 am - 9:15 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Two9:15 am - 9:45 am
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”
Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:
Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk
Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
Session Three10:15 am - 10:45 am
Because we lead with rapid innovation, we are often imitated by the competition. Our radically simple Software Defined architecture affords customers a real choice of “good, better, and best” network deployment and management.
IT professionals can say “yes” to more use cases and satisfy the ever-increasing end user demand because of the innovation of our SD-LAN foundational technology with a roadmap of firsts in SD-WAN, SD-ANALYTICS, SD-OPERATION, and SD-IoT capabilities.
To use Aerohive is to love Aerohive, which is why an exponentially greater percentage of our customers recommend us over the competition.
Session Four10:45 am - 11:15 am
In a time of an ever increasing digitalization and rising complexity in professionally used endpoints, the performance of IT departments becomes crucial for companies and organizations. That turns IT administrators into key players in a business’s success. At baramundi, we have a deep understanding of their needs. That’s why we want to provide them with an efficient, secure, future-proof and integrated software solution that optimizes IT management processes and facilitates their work.
The baramundi team is deeply passionate about developing and establishing pioneering technologies that help our customers to do a better job. We see ourselves not only as a leading innovator in the field of endpoint management, but also – first and foremost – as an upright and reliable partner to our clients.
baramundi software AG was founded in 2000 in Augsburg/Germany. The name baramundi is derived from Spanish and means “for the world”. For us it means: understanding the worlds of our customers.
Session Five11:45 am - 12:15 pm
It all started when our founders, working for one of the most successful network security companies at that time, were frequently asked by customers how they should implement the same type of security in the cloud. This prompted the realization that the best security technologies for malware detection, data classification, encryption, user management, access control, and so much more already existed. Unfortunately, customers had no way to connect it to their SaaS applications in a unified way, with just a single click.
With that vision in mind, Avanan cloudified the security tools of the industry’s leading vendors and built a platform that could connect these tools to the most widely used enterprise SaaS applications. With everything virtualized, installing these tools on any SaaS is as easy as installing an app on a phone. By simply choosing the security tools from the Avanan security app store, customers can implement multiple security solutions across any or all of their SaaS applications.
Session Six12:30 pm - 1:00 pm
About Big Switch Networks
Big Switch Networks was founded in 2010, with roots in the original Stanford research team that invented software-defined networking (SDN), and the company is widely considered one of the original pioneers of the technology. In 2013 the company made available its first commercial product, Big Monitoring Fabric™ for network visibility and security and in 2014 the company released Big Cloud Fabric™, a data center switching fabric that brings the simplicity of public cloud to on-prem data center networks. SDN has matured into several well-defined use cases, including Service Provider NFV, Data Center networking, Container networking and next-generation network packet broker monitoring for pervasive visibility and analytics.
Data center networking and network monitoring are Big Switch’s core product areas and include open API’s that facilitate integration at a systems level with industry leading platforms, including: Red Hat OpenStack, Red Hat OpenShift, Kubernetes, Mesosphere, VMware NSX, VMware VSAN, Nutanix HCI, Dell EMC ScaleIo, as well as Microsoft Azure, AWS VPC, and Google Cloud Computing.
Session Seven1:00 pm - 1:30 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
Session Eight1:45 pm - 2:15 pm
ICSynergy is a leading integrator of successful IAM and database security solutions – the result of dedicated and experienced practice leaders, many of whom were key members of enterprise IT departments. Our success can be directly attributed to our consultants coming directly from corporate settings within clients’ industries, therefore having end-user experience with specific business challenges and an unmatched ability to understand even the most complex IT architectures. Our combined experience enables ICSynergy to closely align its IAM solutions with both the business and technology priorities of its customers.
About One Identity
You’ve got a job to do. And that job involves helping your organization achieve its mission and deliver on its promises securely and efficiently. At One Identity, our job — our mission — is to help you succeed in yours. That’s why we offer a comprehensive family of identity and access management (IAM) solutions designed to solve today’s challenges, and address tomorrow’s as they arise. We help you get identity and access management right.
So how do we do that?
We believe that security is much more than the practice of denial and restriction. That’s why One Identity’s design and integration philosophy is that our solutions must add agility and efficiency to an organization – regardless of size or market – as well as secure its digital assets.
One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation. Let us help you get IAM right.
Session Nine2:15 pm - 2:45 pm
IT teams have always faced performance vs. cost decisions: do we increase cost to get the performance we want, or do we sacrifice performance to save money? With Quorum, you can get both performance and cost savings. Our “HA Anywhere” architecture gives our customers performance and value, and it’s our vision for how Cloud HA and DR should be.
At the core of “HA Anywhere” is Quorum onQ: A fully encrypted, fast and easy high availability solution. Putting customer’s privacy and security first, onQ is built to provide the most secure, best performing backup and recovery in the industry.