Sponsors & Exhibitors Profile

  • EclecticIQ
    Company Profile

    EclecticIQ enables intelligence-powered cybersecurity for government organizations and commercial enterprises. We develop analyst-centric products and services that align our clients’ cybersecurity focus with their threat reality. The result is intelligence-led security, improved detection and prevention, and cost-efficient security investments.

    Our solutions are built specifically for analysts across all intelligenceled security practices such as threat investigation, and threat hunting, as well as incident response efforts. And we tightly integrated our solutions with our customers’ IT security controls and systems.

    EclecticIQ operates globally with offices in Europe, United Kingdom, and North-America, and via certified value-add partners.

  • Ensign InfoSecurity
    Company Profile

    Ensign InfoSecurity is the region’s largest pure-play cybersecurity provider. Backed by about 500 highly qualified professionals, Ensign equips enterprises and governments with world-class expertise and innovative technology to help secure their most valuable assets – data, intellectual property and brand image.

    In partnership with global names in cybersecurity—Claroty, IronNet, Sygnia and BlueVoyant—we offer end-to-end cyberattack protection across networks and geographies. Our alliances also give us access to cutting-edge technologies, information, training and competencies. Converging analytics, intelligence and high-end execution capabilities, we provide our clientele with state-of-the-art and trusted digital models, as well as products and services to help them conquer their digital future.

  • EQ Information Technologies, Inc.
    Company Profile

    We know that nowadays the technology and your business operations are inseparably intertwined. To effectively resolve your work-related pains, EQIT introduces a broad range of solutions and technologies: Finika, a data management platform for IoT, NetSecure, to do your End-Point Management and Intranet Access Control, Sysnesis, big data Traffic capturing up to 100G, as well as Uila, the innovated Hybrid Cloud Management. We cover your technology needs so you can run your business operations well.

  • eShard
    Website

    eshard.com/en

    Company Profile

    eShard is a leading specialist in embedded security technology focussed on cyber-threats and how to protect against them. We exist to empower professionals to manage their complex security challenges and their risks. Our experts and solutions enable our clients to examine and enhance the security of the next wave of connected devices.

    We are committed to developing powerful, usable and innovative tools that enable security professionals to master their challenges, helping them find solutions they need to prosper in their markets. As a result, our clients de-risk their businesses and are better prepared for facing future security challenges.

    At eShard, we continuously invest and innovate in the research of new attacks and tools to efficiently assess vulnerabilities. Therefore, we are proud that our flagship platform, esDynamic, is adopted by leading players, and that our automated mobile application scanning solution, esChecker, has been selected by a major payment scheme.

  • Exabeam
    Website

    www.exabeam.com

    Company Profile

    Exabeam is the Smarter SIEM™ company. We empower enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarter. Security organizations no longer have to live with excessive logging fees, missed distributed attacks and unknown threats, or manual investigations and remediation. With the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident response, both on-premises or in the cloud. Exabeam Smart Timelines™, sequences of user and device behavior created using machine learning, further reduce the time and specialization required to detect attacker tactics, techniques and procedures.