Sponsors & Exhibitors Profile

  • EclecticIQ
    Company Profile

    EclecticIQ enables intelligence-powered cybersecurity for government organizations and commercial enterprises. We develop analyst-centric products and services that align our clients’ cybersecurity focus with their threat reality. The result is intelligence-led security, improved detection and prevention, and cost-efficient security investments.

    Our solutions are built specifically for analysts across all intelligenceled security practices such as threat investigation, and threat hunting, as well as incident response efforts. And we tightly integrated our solutions with our customers’ IT security controls and systems.

    EclecticIQ operates globally with offices in Europe, United Kingdom, and North-America, and via certified value-add partners.

  • EQ Information Technologies, Inc.
    Company Profile

    We know that nowadays the technology and your business operations are inseparably intertwined. To effectively resolve your work-related pains, EQIT introduces a broad range of solutions and technologies: Finika, a data management platform for IoT, NetSecure, to do your End-Point Management and Intranet Access Control, Sysnesis, big data Traffic capturing up to 100G, as well as Uila, the innovated Hybrid Cloud Management. We cover your technology needs so you can run your business operations well.

  • Exabeam


    Company Profile

    Exabeam is the Smarter SIEM™ company. We empower enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarter. Security organizations no longer have to live with excessive logging fees, missed distributed attacks and unknown threats, or manual investigations and remediation. With the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident response, both on-premises or in the cloud. Exabeam Smart Timelines™, sequences of user and device behavior created using machine learning, further reduce the time and specialization required to detect attacker tactics, techniques and procedures.