IDC’s Security Roadshow examines global and regional trends related to security and provides actionable advice and best practices for organizations in an era of digital transformation. This year’s series investigates the threats to our key systems, data, and networks, and the steps that organizations need to take to secure them. We will not only look at investing in security solutions, but also at people and processes, employees and business partners, and strategic thinking.
Key Themes of IDC IT Security Roadshow 2016
Key Themes of IDC IT Security and Datacenter Transformation Roadshow 2016
Good mixture of well-known stuff and new information.
Radka Poláková, Data Expert, Česká správa sociálního zabezpečení
Well-organized education in the field of security.
Lukáš Vrána, Senior Information & Data Security Specialist, T-Mobile
Excellent organization and execution of the conference.
Dmitry Biryukov, Head of Department of IT security, SMP Bank
Organized by the cool and modern.
Nikolai Artamonov, Head of MIS, NPK MSC
Always a pleasure to attend your events.
Vladimir Peregontsev, Head of Security Department, Finuniversitet
An excellent review of the current state of IT security and perspectives in the field.
Mikhail Zotov, Head of IB, CB Unifin
A very positive impression; I learned a lot of new and important information. I hope there will be more such conferences!
Renat Abdirasilov, Head of IT Department, RTS Decaux
Actually, affordable, professionally!
Vladimir Pogrebitskiy, Senior Consultant, Border Service NSC RK
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
Palo Alto Networks™ is the network security company. Its innovative platform enables enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its next-generation firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 10,000 customers in over 100 countries. For more information, visit www.paloaltonetworks.com.
Fortinet (NASDAQ: FTNT) protects the most valuable assets of some of the largest enterprise, service provider and government organizations across the globe. The company's fast, secure and global cyber security solutions provide broad, high-performance protection against dynamic security threats while simplifying the IT infrastructure. They are strengthened by the industry's highest level of threat research, intelligence and analytics. Unlike pure-play network security providers, Fortinet can solve organizations' most important security challenges, whether in networked, application or mobile environments - be it virtualized/cloud or physical. More than 210,000 customers worldwide, including some of the largest and most complex organizations, trust Fortinet to protect their brands. Learn more at http://www.fortinet.com, the Fortinet Blog or FortiGuard Labs.
Safetech Innovations is the only dedicated Cybersecurity company on Romanian market which offers a complete range of security services and combined with being a value-added security solutions implementer and integrator, and also the operator of an accredited CERT, which operates 24/7. Also, Safetech is the first company in Central Europe and one of four in the world certified company HID Global as "Certified Implementation Partner" and the only company working exclusively in information security from Romania, accredited by Check Point as Check Point's Certified Collaborative Support provider (CCSP). http://safetech.ro
In partnership with cosponsor:
Darktrace is one of the world’s fastest-growing cyber threat defense companies and the leader in Enterprise Immune System technology. Darktrace detects previously unknown threats in real time using advanced machine learning and mathematics developed at the University of Cambridge to analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance in sectors including energy and utilities, financial services, telecommunications, healthcare, manufacturing, retail and transportation. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and Washington D.C., with offices in London, Milan, New York, Paris, San Francisco, and Singapore.
As the largest Cyber-Security company in the world, with the breadth of our solutions covering everything from the smallest connected light-bulb to the biggest computer or cloud-service and with the depth of our intelligence and insight gained from running one of the largest civilian threat networks in the world only Symantec is positioned today to help businesses reduce risk, speed up remediation, retain staff and grow their business confidently.
APDETIC is a non-profit, independent professional organization, comprising the most important communications and information technology equipment manufacturing and trading companies in Romania. Set up in 2003 by 11 founders, the asociation now counts 34 members.
APDETIC represents the interests of the IT&C equipment producers and distributors, being an authorized and representative dialogue partner of the Government and the Parliament.
Club IT&C, the monthly publication of TAG MEDIA, is the leading source of information about Romanian IT&C market, covering current issues and emerging trends while providing insights into innovative products, services and best practices.
As a Business and Technology media product (print magazine & online), Market Watch (www.marketwatch.ro) acts as an interface between Research, Higher Education and IT&C, on one side, and real economy and the labor market, on the other. Its main goal is to supply Romanian companies and their managers with relevant information and solutions for reaching economic efficiency through technology, continuous education and good business practices, as main vectors for any sustainable business to get added value.
Starting as a Cloud dedicated online magazine mapped on a WordPress blog template cloud mania is becoming a more complex knowledge entity, much more than a simple blog… After 3 years, cloud mania is acting like a knowledge engine based on social-technology platform, a new social-media formula with the main purpose to bring the most valuable information from the Clouds and to transfer it to business and professional tech communities. It is not all about Cloud benefits. It is about changing imperatives, Cloud alternatives, migration risk and unprofessional adoption faults. And is not about Cloud: it is about all improper considered as disruptive technologies: Big data, Analytics, Mobile Computing, Fog Computing, Internet of Things, and Machine-2-Machine…