Organizer & Sponsors
M.Tech is a leading cyber security and network performance solutions provider. From providing integrated end-to-end cyber security to enhancing network infrastructure, M.Tech optimizes organizations’ operations and effectiveness.
Partnering with a strong network of established vendors, we have an unparalleled portfolio of best-of-breed products and solutions that meet every critical IT need – from cloud access security, advanced threat prevention and data-centric security to network system management, monitoring and optimization. We also have a specialized technical team providing a host of comprehensive professional services and 24/7 technical service and support, ensuring your organization’s seamless operation.
At M.Tech, we constantly stay ahead in the ever-changing IT environment, to be the leading cyber security and network performance solutions provider.
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Symantec is uniquely qualified to address the most complex cybersecurity challenges in the world. We help assure that all of your data meets required compliance and regulatory requirements. We enable your remote workforce to securely access sensitive corporate applications and data from anywhere. We discover and block the newest generation of attacks targeting enterprises. And our products support every platform, from mobile devices to data center servers, and every deployment model, from on-premises, to the cloud, to multi-cloud. Most importantly, we ensure that your organization’s critical data and applications stay safe and secure no matter where they live.
The Symantec Enterprise Cloud powers all of these offerings, delivering shared capabilities including Data Protection, Threat Prevention, and our Global Intelligence Network, one of the largest civilian security intelligence networks in the world.
From endpoints, to networks, to e-mail, to the cloud, Symantec makes the world a safer place.
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.
With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks.
Tanium, the industry’s only provider of converged endpoint management (XEM), is the reference platform of choice for managing complex security and technology environments. Only Tanium protects every endpoint from cyber threats by integrating workflows across IT, Risk, Compliance, and Security into a single platform that delivers comprehensive visibility across devices, a unified set of controls, real-time remediation, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for seven consecutive years and ranks for the second consecutive year on the Fortune 100 Best Companies to Work For. In fact, more than half of the Fortune 100 and the U.S. Armed Forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere. That’s The Power of Certainty.
At Trend Micro, everything we do is about making the world a safer place for exchanging digital information.
We believe cyber risks are business risks, and we empower organizations with complete visibility of their digital assets to understand how well they are protected and where to prioritize their investments to lower their risk.
We secure the world by anticipating global changes in modern infrastructures, evolutions in threats, shifts in user behaviors, and advancement in application development. We help customers transform cybersecurity from siloed technologies to a unified security platform that accelerates cyber risk reduction and operationalizes Zero Trust strategy.
Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics and security through an advanced network operating stack.
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix’s security experts, along with an extensive partner ecosystem, accelerate technology innovation through machine learning and automation to empower over 40,000 business and government customers.
Vectra AI is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises. Vectra AI’s cloud-native platform and MDR services – powered by our patented Attack Signal Intelligence- provide security teams with unified threat visibility, context and control across public cloud, SaaS, identity and data center networks in a single SaaS console. Vectra AI-driven Attack Signal IntelligenceTM, empowers SOC analysts to rapidly prioritize, investigate and respond to the most urgent cyber-attacks in their hybrid cloud environment. Organizations worldwide rely on Vectra AI’s cloud-native platform and MDR services to see and stop attacks from becoming breaches.
Eclypsium is a US-based cybersecurity company that focuses on protecting firmware and hardware components in enterprise computing systems from cyber threats. The company was founded in 2017 by a group of cybersecurity experts with experience in firmware and hardware security, and it has since gained recognition for its innovative approach to securing these often-overlooked components.
Eclypsium’s Supply Chain Firmware Security Platform, provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises and government agencies from the deep implants and exploits that have become the vector of choice for modern adversaries.
Eclypsium is used by a wide range of organizations, including Fortune 1000 enterprises and federal agencies. Eclypsium was named a Gartner Cool Vendor in Security Operations and Threat Intelligence, a TAG Cyber Distinguished Vendor and one of the World’s 10 Most Innovative Security Companies by Fast Company.
Your virtual, autonomous SOC: get high-quality alert triage and respond faster to serious incidents with Intezer. Save budget by replacing costly outsourced services with Intezer’s automated solution to automatically resolve 85% of false positives and deeply investigate 94% of alerts. Get transparent analysis reports and verdicts your team can trust to keep your business secure.
Follow us at:
NetWitness provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibility combined with applied threat intelligence and user behavior analytics to detect, prioritize, investigate threats, and automate response. This empowers security analysts to be more efficient and stay ahead of business-impacting threats.
Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies.
Votiro is a Zero Trust Content Security company trusted by millions of users worldwide to deliver safe files between commercial and government organizations, their employees, and the customers that rely on them. The Votiro ZT Cloud solution is an open API that detects, disarms, and analyzes fully functional content at the speed of business – saving teams time, resources, and additional staffing requirements. Votiro eliminates file-borne threats targeting remote workers, email environments, content-rich apps, data lakes, supply chains, web downloads, B2C digital interactions, and more. Votiro is headquartered in Austin, TX, with offices in Australia, Israel, and Singapore. Votiro ZT Cloud is SOC 2 Type II compliant and certified by the international standard of Common Criteria for Information Technology Security Evaluation (ISO/IEC 15408).