Exhibitor Products

Loading
Network Control

Network Control

16 Sep 2024 Threatlocker
What Is Network Control (Network Access Control)? ThreatLocker® Network Control is a firewall for endpoints and servers that can be managed centrally. It provides complete control over network traffic …
Ringfencing™

Ringfencing™

16 Sep 2024 Threatlocker
What Is Application Containment (Ringfencing™)? Ringfencing™ controls what applications can do once they are running. Think of Ringfencing as a barrier and extra security measure that is actively cont …
Application Allowlisting

Application Allowlisting

16 Sep 2024 Threatlocker
Application Allowlisting, previously known as "Application Whitelisting," works by a simple rule: if it's not expressly permitted, it's not allowed. This robust form of access control prevents untrust …
Virtual CISO

Virtual CISO

09 Sep 2024 Defence Logic
Partnering directly with your team—regardless of size—your dedicated Virtual CISO (“ vCISO”) will craft tailored cyber security solutions that seamlessly align with your business strategy and risk tol …
Penetration Testing

Penetration Testing

09 Sep 2024 Defence Logic
At DefenceLogic.io, we specialise in identifying vulnerabilities before malicious actors do. Our expert team provides thorough penetration testing services to safeguard your assets and ensure your net …
Cyber As A Service

Cyber As A Service

09 Sep 2024 Defence Logic
Defence Logic’s Managed Cyber Security services ensure that your organisation identifies and mitigates cyber risks, understands its overall security posture and the effectiveness of systems and contro …
Cyber Services
IntaForensics consultants focus on current and impending cyber security risks, advising and supporting clients to ensure they understand the dangers and implications of a successful attack. In a world …
Cofense Phishing Concept
The Cofense phishing concept is comprised of two complementary solutions for employee SAT and phishing defense. Together, these solutions create a virtuous cycle of human-vetted intelligence at scale …
Cofense PDR
Rules-based and AI model-based SEGs miss dangerous AI-powered phishing attacks. The Cofense PDR platform gives you unique, diverse intelligence to see and rapidly remediate those SEG-miss threats.
272 Results