SX Security Exchange Conference 2025 | M.Tech Your Preferred i-security partner
SX Security Exchange Conference 2025 | M.Tech Your Preferred i-security partner
  • Home
  • About SX
  • Programme & Speakers
  • Organizer & Sponsors
  • Venue
  • Flashback
Register Now Register Now

Vectra AI

Sponsor Category: Gold Sponsors

Vectra AI

To complete visibility across the modern network (including on-premises data centers, campus, IoT, OT, identity, and cloud) and the ability to defend against attacks quickly are essential to keeping financial institutions operational. Modern network protection must deliver coverage, clarity, and control. To help with evaluating the right network protection solution, network security solution for all customer should consider.

Imperva, a Thales Company

As a global leader in cybersecurity, Thales and Imperva help the most trusted brands in the world protect critical applications, data, identities, and software anywhere at scale. Through our innovative and integrated platforms, we help organizations increase visibility of risks, better defend against cyber threats, close compliance gaps, and deliver trusted digital services for billions of consumers every day.

SentinelOne

Discusses the evolving cybersecurity landscape and the rise of AI-powered attacks.It emphasises the need for SOCs to adapt and leverage AI for defence, moving towards an autonomous SOC. The presentation outlines key security platform architecture requirements, including data collection, correlation and automated response.AI-powered queries and automated responses are highlighted as crucial for modern security operations. It also touches on the importance of adversarial exposure validation and adopting an attacker’s mindset.

Silverfort

With identity security as our sole focus and mission, and after years of research and development, we found a way to deliver end-to-end identity security—securing every dimension of identity. We can protect every type of identity, whether human or machine, on-premises or in the cloud. We extend identity protection everywhere, even to critical systems that were previously hard or impossible to defend, such as legacy systems, command-line tools, IT/OT infrastructure, and air-gapped networks.

© 2025 M.Tech Products Pte.Ltd. All rights reserved.
  • Singapore – sgmarcom@mtechpro.com
  • Thailand – thmarcom@mtechpro.com
  • Vietnam – vnmarcom@mtechpro.com
  • Home
  • About SX
  • Programme & Speakers
  • Organizer & Sponsors
  • Venue
  • Flashback
  • Home
  • About SX
  • Programme & Speakers
  • Organizer & Sponsors
  • Venue
  • Flashback