EXHIBITOR DETAILS

EXHIBITOR DETAILS

AppiXoft

Through our high-end User Workspace Management solution Scense, AppiXoft delivers dynamic applications in a personalized workspace to many thousands of satisfied users worldwide. By applying a virtual separation between the user, desktop and underlying operating system, we transform any complex distributed desktop environment into an easy to manage and transparent infrastructure.
As Scense provides substantial flexibility and freedom to both regular and occasional IT users and, at the same time, allows IT administrators to stay fully in control, the solution ultimately results in happy faces on both sides.

 

AGARI
Founded by thought leaders of Cisco’s IronPort solutions, our mission is to build new internet scale data driven security solutions that eliminate email as a channel for cyber attacks and enable businesses and consumers to interact safely. Agari is trusted by leading Fortune 1000 companies, including 6 of the top 10 banks and 5 of the world’s leading social media networks, as well as Government Agencies, to protect their organizations, partners, customers and citizens from advanced email phishing attacks. Headquartered in Silicon Valley, Agari is backed by Alloy Ventures, First Round Capital, Greylock Partners, Norwest Venture Partners and ScaleVP.
ALTARO

Altaro VM Backup

Simple. Affordable. Usable:

Altaro’s Virtual Backup Solutions have been specifically engineered for small to medium businesses and Cloud dependent businesses’, so customers don’t end paying for functionality never used and complexity that makes it hard to use. They have emerged in the UK  & Ireland as one of the most popular Cloud backup software solutions with their VM Backup quietly and reliably doing what it says it will do – yet at a third of the cost of others.

Try it yourself before you recommend –  "we’ll have you up and running seamless Virtual Backups in less than 15 minutes."

BULLWALL
Rather than just another run-of-the-mill Endpoint solution, BullWall is dedicated to stopping Ransomware attacks before they stop your organisation. When you get hit by Ransomware, RANSOMCARE will hit back. Unlike many Endpoint security solutions, BullWall protects your Security Defence Systems providing inside firewall protection. Our team consists of former members of Denmark’s elite cybercrime and fraud detection unit, boasting over 60 years of experience in both domestic and international intelligence. The BullWall team has the knowledge, dedication and passion to make the cyber world a safer place for customers within the private sector and state- and local government level.
BITDEFENDER

A solution for every need Whether you need protection for a single device, a smart home, your small business, hybrid infrastructure or Enterprise datacenter, we have the product that delivers the best security, unparalleled performance and incredible ease of use.With a worldwide network of 500 million machines, Bitdefender has the largest security delivery infrastructure on the globe. Performing 11 billion security queries per day, Bitdefender detects, anticipates and takes action to neutralize even the newest dangers anywhere in the world in as little as 3 seconds. Innovation has earned us the trust of families and corporations from over 150 countries and has won us a wealth of awards.

CA

Build customer confidence with great user experiences—while keeping valuable data secure.
CA Technologies Security solutions help balance trust, access and security to protect your business across platforms, devices and apps enabling you to quickly identify and mitigate risks as well as enabling great customer experiences with authentication and access technologies that continue to advance to adapt to the changing needs of the consumer and the business.  

  • CA Privileged Access Manager and CA Threat Analytics for PAM
    Prevent breaches and protect data across all access points
  • CA Advanced Authentication
    Mitigate threats and stimulate growth with Advanced Authentication solutions from CA Technologies
  • CA Identity Service
    Accelerate and secure Cloud adoption across your hybrid enterprise
  • CA Identity Suite
    Simplify identity management and access governance across the enterprise

 

Combat breaches and protect critical corporate and customer data
Whether obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common threat of most data breaches. Find out how to secure, manage and govern privileged accounts with CA Privileged Access Management:

  • Protect your organisation against data breaches while improving access
  • Reduce the impact of insider threats, monitor, record and audit all activity with immediate playback
  • Satisfy regulatory compliance and audit requirements with 360-degree access controls across all environments
  • Mitigate future attacks by using advanced behaviour analytics
CENSORNET
CensorNet is the only vendor to provide Email Security, Web Security. Cloud Application Security and MFA on one platform. Purchase one, two, three or all four products and manage them all through one intuitive dashboard saving your team time and money.
CLEARCRYPT

The growing amount of data stored on external drives to cater for the need to store and transfer files and large amounts of data means that storing this securely is no longer an option but is now mandatory. ClearCrypt is a range of 256 bit Encrypted Storage Devices designed to be robust, secure and cost effective. Privileged, confidential or sensitive data must be protected at all times from intentional or accidental loss and the ClearCrypt range of devices is designed to make this cost effective, flexible and easy to achieve. ClearCrypt offers industry leading encryption and a product range to suit all needs and requirements- A full range of capacities and technologies are available for all requirements- 10x faster than normal USB 2.0 drives- Encrypted USB 3.0 super speed with a transfer rate up to 5.0GB per second

COSOSYS

CoSoSys will be showcasing its award-winning Gartner-recognized Data Loss Prevention (DLP) solution, Endpoint Protector at Cyber Expo Ireland this year.  

Endpoint Protector is an advanced all-in-one DLP solution for Windows, macOS, and Linux as well as Thin Clients, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. With its modern intuitive interface and its smooth integration as Virtual or Hardware Appliance and AMI instance on Amazon Web Services(AWS), Endpoint Protector is easy to install and does not require advanced technical knowledge to run, making it the most accessible and user-friendly solution on the market.

It features five specialized modules that can be mixed and matched based on clients’ needs. Its content filtering capabilities for both data at rest and in motion, range from file type and predefined content to custom content filters based on dictionaries, regular expressions or data protection regulations such as GDPR, HIPPA etc. Remediation actions such as deletion or encryption can be taken based on results.  The movement of valuable data to unauthorized external individuals or applications is thus monitored through the exit points and Administrators are alerted in case of policy violation. All reports are centralized in the management console.

Cyglass
CyGlass is a leading provider of network centric, dark threat detection solutions that allow you to uncover, pinpoint, and respond to advanced cyber threats that have evaded traditional security controls.

Our mission is to provide your operations with a new level of intelligent enterprise cyber attack defense. With our asset oriented, risk-based approach to dark threat detection and mitigation, we are tirelessly dedicated to helping you focus your attention to those emerging attacks which pose the greatest risk to your business.

Data443
Data443 ClassiDocs™ takes the effort out of classifying your data by applying the same rules, technology, machine learning, and ongoing classification stewardship throughout the organization. This ensures always-accurate, continually relevant data security for your whole IT estate. ClassiDocs™ is purposefully user-centric to increase adoption and adherence with no training. Users always experience ease-of-use control with minimal interruptions and your-company-specific branding so they engage quickly and make fewer mistakes. Administration is also simple via an easy-to-understand, centralized control panel that delivers both preset and customizable analytics.
ENTRUST

Entrust Datacard is continuously committed to quality in every aspect of serving our customers. As part of our ongoing effort to ensure the highest level of quality, we’ve launched key initiatives to ensure that our products and services meet the most demanding standards in the industry.Customers from a wide range of markets deploy Entrust Datacard™ solutions to enable secure transactions, improve service levels, protect networks and create trusted environments where people can work, travel, learn and transact.Banks, retailers and other consumer marketers are looking for ways to
engage consumers, build their brands and expand market share.

ERICOM
Ericom Software is a global leader in securely connecting the unified workspace. Ericom empowers today’s connected workforce and the IT organizations that support them by securing and optimizing desktop, application, and web content delivery to any device, anywhere. Founded in 1993, Ericom provides enterprise-grade secure remote access, desktop virtualization (VDI), and web security solutions to organizations across all industries. With a focus on application delivery, cloud enablement, and secure browsing, Ericom advances secure connectivity—providing end users with a superior work experience and optimizing enterprise productivity.
Heimdal

The last years proved that information theft and financial data leakage are major international issues, which continue to create security challenges for organizations, as well as private individuals.

That's why our product has been developed: to address the real-world need for a solution against cyber-criminals actions and their malicious tools.

Due to our focus, we are recognized in the online community as fighters against cyber criminals and their malicious actions. To find out more about the unique technology that we built to address the online criminals' methods, take a look into Why Thor.

Indegy
The Indegy team combines a unique mix of cyber-security expertise with hands-on industrial control knowledge. Our leadership team and the core of our R&D team consist of veterans of the IDF elite cyber security units. Together we bring decades of real-world experience spanning a wide range of industrial sectors and technologies. This is the foundation on which Indegy builds its innovative technologies and delivers cutting-edge solutions for industrial cyber security.
Jetico

Jetico provides Pure & Simple data protection software for all sensitive information throughout the lifecycle - encryption to securely store confidential data and wiping for secure deletion of data when no longer needed. We are the best solution to protect data at rest. Beyond unbreakable data protection, the best security works the way you do – naturally and transparently...Jetico products are used in over 100 countries by government and military agencies, national laboratories, industrial manufacturers, as well as various other enterprises and a wide global base of home and small business users. Founded in 1995, Jetico is privately held and headquartered in the Otaniemi Science Park in Espoo, Finland.

MACRIUM

Macrium Reflect provides comprehensive backup and DR solutions for home or business which are used worldwide to protect valuable data and operating systems. Using advanced disk imaging technology Macrium solutions provide fast reliable and easily recoverable images. With millions of users worldwide, Macrium is a trusted and reliable solution for all data protection needs.

NETFORT

NetFort LANGuardian is deep-packet inspection software that monitors network and user activity. LANGuardian’s generation and storage of network metadata, results in a massive data reduction while still retaining rich detail over long periods critical for multiple network security and operational use cases. NetFort provides network traffic and security monitoring software for virtual and physical networks. NetFort’s flagship product, LANGuardian, is unique in the marketplace thanks to its powerful deep-packet inspection technology that can be downloaded and deployed on standard physical or virtual hardware to provide comprehensive visibility in minutes. Headquartered in Galway, Ireland, NetFort was established in 2002. Its customers include domestic and international businesses throughout the UK, USA and EMEA, ranging from SMEs through to large enterprises with multiple locations. LANGuardian is used in a wide range of industry sectors including financial services, high technology, utilities, local and national government, automotive, healthcare, sport, and education.

Pixalert

Bio Observation Systems Limited (t/a PixAlert) has been protecting corporate reputation and brand integrity of financial, healthcare, pharma and public sector organisations since 1999 Risk & Governance Solutions through its innovative and advanced portfolio of critical data and image detection and protection software solutions. PixAlert deploy world-class scalable information audit solutions, tailored to suit specific client requirements. We work closely with our clients to understand their business challenges and provide the optimum information content security solution. The company currently has a client base of over 200 companies covering EMEA, AsiaPAC and the US territories. PixAlert is based in Dublin, Ireland and has sales offices in the UK, US, Australia and New Zealand. PixAlert helps organisations discover where sensitive data and inappropriate images reside across networks, protecting enterprise networks and safeguarding brand integrity and reputation through its market leading data discovery and illicit image detection and security products.

NetSHIELD
NetSHIELD, Inc. is a global leader in next generation Network Access Control focused on agentless breach prevention technologies.  NetSHIELD’s dynamic discovery and blocking engine ensures only trusted, known  assets access corporate networks. Additionally, integrated threat intelligence is leveraged to provide zero-day malware / ransomware prevention and phishing attack quarantine.  An on-board vulnerability assessment engine makes NetSHIELD a comprehensive and compelling offering. The solutian framework is purposely designed for administrative simplicity and is deployed via a command center which allows administrators to manage thousands of assets and remote sites.
SECURITY SCORECARD
SecurityScorecard was founded in 2013 by two former security leaders, Dr. Aleksandr Yampolskiy and Sam Kassoumeh, who were, respectively, the CISO and Head of Security and Compliance at a large e-commerce retailer, Gilt Groupe. Dr. Yampolskiy, who has a PhD in cryptography, was also the CTO of BlogTalkRadio/Cinchcast and has held lead technology and security roles at Goldman Sachs, Oracle, and Microsoft. Mr. Kassoumeh also lead Global Security at Federal-Mogul and has over ten years of cybersecurity experience.
SOLARWINDS
SolarWinds® MSP delivers comprehensive, scalable IT service management solutions to empower MSPs of every size and scale worldwide to create highly efficient and profitable businesses that drive a measurable competitive advantage. SolarWinds MSP represents a powerful trifecta, bringing together SolarWinds, SolarWinds N-able, and LOGICnow. Before the creation of SolarWinds MSP, LOGICnow, and SolarWinds N-able provided outstanding software—Remote Monitoring and Management, Backup and Disaster Recovery, Remote Control, Help Desk, Mail, and Risk Intelligence—all aimed at helping MSPs make the most of their business potential. The two companies served their clients in complementary ways. One served small and mid-sized MSPs beautifully, while the other was perfect for mid-sized and large MSPs. Noticing how well the two companies fit together, the smart people at SolarWinds, a leading provider of products designed to make IT professionals’ lives easier, brought the two together to form SolarWinds MSP. The result? A scalable, end-to-end IT service management platform built for MSPs of all sizes—from the one-person shops all the way to 100+ employee powerhouses.
SOPHOS

IT security products have become as complex as the networks they’re trying to secure. At Sophos we know that the solution to complexity is not more complexity. We tackle security challenges with clarity and confidence, knowing that simple security is better security. Our products allow you to secure every end point of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices. What’s more, securing these devices is made possible through products that fit your precise needs. We ensure your network’s security by providing the one thing no one else can: Simplicity. Our support staff is independently audited and approved by SCP (Service Capability & Performance Support Standard). Our follow-the-sun support operations (UK, U.S., Australia) provide 24/7 English-only support. Additional support offices in Germany, France, Spain, Italy, Japan and the Philippines means you can also speak to a support technician who speaks your language.

TENFOLD
The main ambition of our software company tenfold is to discover and provide simpler ways for businesses to meet the growing demands of permission management. With our innovative software solution, “tenfold“, we have successfully revolutionized the way IT users and IT permissions are dealt with – never before has it been so easy to control and automate all important processes involved in the life-cycles of IT users, while always keeping an up-to-date, company-wide overview of who has what permissions. Together with our partners, we support medium-sized and major companies from different industries. More than 300 notable businesses have adopted tenfold as their choice of user and permission management tool so far.
TRUSTWAVE

Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, we enable businesses to transform the way they manage their information security and compliance programs.

We deliver automated, sustainable and cost-effective data protection, risk management and threat intelligence to our customers—what we call SMART SECURITY ON DEMAND.

With more than three million enrollees, our TrustKeeper® platform is available in the cloud. We also offer industry-leading managed security services, award-winning technology products, as well as consulting, systems integration and other professional services. Many of our solutions are available across multiple delivery mechanisms, giving our customers flexibility as they design and implement their security infrastructure.

WATCHGUARD

We operate in an industry where speed and money are generally companies' biggest motivators, but unlike others, we have built a business based upon relationships. Of course we believe that the security of your network is of utmost importance and your ability to protect your machines is dependent on being able to make a fully informed decision on which hardware is most suitable for your scenario.

This ethos continues into our relationships with suppliers and distributors.  We benefit from great support from these companies because of this, and those relationships enable us to provide a higher level of service to our customers than many others can achieve and we thank them for this. We also believe it is important that, from our place of privilege, we support those who are less fortunate than ourselves and we do this through the consistent support of charities, both local and international, and by regularly backing international appeals.

Veracode

With its powerful combination of automation, process and speed, CA Veracode seamlessly integrates application security into the software lifecycle, effectively eliminating vulnerabilities during the lowest-cost point in the development/deployment chain, and blocking threats while in production. This comprehensive solution is managed through one centralized platform and stems from a powerful combination of best-in-class technology and top-notch security experts who offer remediation coaching and guidance on processes.

Top