SX Security Exchange Conference 2025 | M.Tech Your Preferred i-security partner
SX Security Exchange Conference 2025 | M.Tech Your Preferred i-security partner
  • Home
  • About SX
  • Programme & Speakers
  • Organizer & Sponsors
  • Venue
  • Flashback
Register Now Register Now

Organizer & Sponsors

  • Singapore
  • Thailand
  • Vietnam (Hanoi)
  • Vietnam (Ho Chi Minh City)

The Organizer

M.Tech is a leading cyber security and network performance solutions provider. From providing integrated end-to-end cyber security to enhancing network infrastructure, M.Tech optimizes organizations’ operations and effectiveness.

Partnering with a strong network of established vendors, we have an unparalleled portfolio of best-of-breed products and solutions that meet every critical IT need – from cloud access security, advanced threat prevention and data-centric security to network system management, monitoring and optimization. We also have a specialized technical team providing a host of comprehensive professional services and 24/7 technical service and support, ensuring your organization’s seamless operation.

At M.Tech, we constantly stay ahead in the ever-changing IT environment, to be the leading cyber security and network performance solutions provider.


www.mtechpro.com

Platinum Sponsors

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Platform Services for collaborative security operations and services.


www.checkpoint.com

Gold Sponsors

As a global leader in cybersecurity, Thales and Imperva help the most trusted brands in the world protect critical applications, data, identities, and software anywhere at scale. Through our innovative and integrated platforms, we help organizations increase visibility of risks, better defend against cyber threats, close compliance gaps, and deliver trusted digital services for billions of consumers every day.


www.imperva.com

Discusses the evolving cybersecurity landscape and the rise of AI-powered attacks.It emphasises the need for SOCs to adapt and leverage AI for defence, moving towards an autonomous SOC. The presentation outlines key security platform architecture requirements, including data collection, correlation and automated response.AI-powered queries and automated responses are highlighted as crucial for modern security operations. It also touches on the importance of adversarial exposure validation and adopting an attacker’s mindset.


www.sentinelone.com

With identity security as our sole focus and mission, and after years of research and development, we found a way to deliver end-to-end identity security—securing every dimension of identity. We can protect every type of identity, whether human or machine, on-premises or in the cloud. We extend identity protection everywhere, even to critical systems that were previously hard or impossible to defend, such as legacy systems, command-line tools, IT/OT infrastructure, and air-gapped networks.


www.silverfort.com
To complete visibility across the modern network (including on-premises data centers, campus, IoT, OT, identity, and cloud) and the ability to defend against attacks quickly are essential to keeping financial institutions operational. Modern network protection must deliver coverage, clarity, and control. To help with evaluating the right network protection solution, network security solution for all customer should consider.

www.vectra.ai

Silver Sponsors

While many enterprises are currently in the process of prototyping dozens of AI applications, concerns about data residency, security, and cost often emerge at some point in the proof of concept (POC) phase, slowing both production deployments and the ability to realize business value. And it makes sense, as it can be expensive developing AI apps, not to mention a very time-consuming process with significant security and compliance requirements. Customers in highly regulated industries such as healthcare, financial services, and government have looked to Citrix for over 35 years to address challenges like this. With this partnership, Citrix is once again the key platform to accelerate and drive business agility, now for AI.

By Citrix solutions will solves these challenges, allowing you to securely develop and deliver AI POCs and applications within your existing, secure infrastructure. Doing this minimizes the risk of proprietary information leaking out into public large language models (LLMs), and uses existing Infarstruture to significantly minimize costs.


Passwordless Authentication Unlocks Stronger, More Convenient Security Passwordless authentication is just what it sounds like: it verifies user identities without passwords or any other information that users need to memorize. Passwordless enables authentication with less burdensome, more secure methods—such as one-time passwords (OTPs), passkeys, app-based options (like push to approve), and biometrics. Passwordless authentication is also critical in building organizations’ anti-phishing capabilities, because it reduces the use of password-based credentials that bad actors can compromise to carry out phishing attacks.

www.rsa.com

Tanium is the world’s first converged endpoint management solution: a single platform that can identify where all your data is, patch every device you own in seconds, implement critical security control tools and do it all within a single pane of glass. A single platform that provides real-time data and has real-time impact. We make IT scale: gone are the days of siloed teams referencing different datasets.

Tanium protects against attacks by orchestrating all activities within a single platform that’s fast, reliable and inherently integrated. Combining the reach of IT Operations, Security, Risk and Compliance Management into one location breaks the cycle of unreliable tools, broken processes and incomplete outcomes across siloed teams – enabling the ability to obtain business insights quickly, reduce time to incident resolution, and lower IT cost and complexity.

Tanium is converging tools across the IT operations, risk and compliance and security functions to bring teams together: one platform that provides visibility, control and remediation in IT decision-making. That’s the power of certainty.


www.tanium.com

In the age of SASE and Cloud it is more challenging for the security team to manage network security policies. Security administrator finds that users and application can be anywhere in the network so how should they gain better visibility into their network so that they can effectively reduce their attach surface? How can the security administrator balance security and business agility so that they can bring connectivity to their users in a quick and secure manner? We are going to discuss how Tufin can help address the challenges faced by security administrator in today’s challenging network environment that cover on-prem, cloud and SASE. And look at Tufin’s AI tool that can help automate tasks that can help in designing and implementing security policies.


www.tufin.com
© 2025 M.Tech Products Pte.Ltd. All rights reserved.
  • Singapore – sgmarcom@mtechpro.com
  • Thailand – thmarcom@mtechpro.com
  • Vietnam – vnmarcom@mtechpro.com
  • Home
  • About SX
  • Programme & Speakers
  • Organizer & Sponsors
  • Venue
  • Flashback
  • Home
  • About SX
  • Programme & Speakers
  • Organizer & Sponsors
  • Venue
  • Flashback