|
|
|
Fidelis Cybersecurity to Demonstrate End-to-End Attack Lifecycle Defense Capabilities and Solutions at GISEC 2016
Published Mar 20, 2016
|
Fidelis Cybersecurity, the leading provider of products and services for detecting and stopping advanced cyberattacks, today announced their participation in the Gulf Information Security Expo & Conference (GISEC), to be held at the Dubai World Trade Center, March 29-31.
Attendees are invited to Hall 7, Stand B-144 to learn how advanced products and incident response services from Fidelis Cybersecurity reduce the time to detect and resolve incidents, prevent data theft and stop attackers at every stage in the attack lifecycle.
In addition to exhibiting at GISEC, Jim Jaeger, a former director of intelligence with the U.S. Air Force (USAF) Atlantic Command, will host a session on forensic analysis of cyberattacks. He will share insights into how enterprises can identify the root cause of cyberattacks and put in place solutions and processes to counteract threats and mitigate future attacks. The session will be held on Wednesday, March 30 from 3:10pm – 3:40 pm in Sheikh Rashid Hall.
“Cybercriminals are targeting the Middle East, and the mass adoption of e-services, from banking and insurance to government, adds another layer of complexity and introduces potential security issues. Organizations must be able to quickly operationalize intelligence across their infrastructure so they can identify and remove attackers no matter where they hide on the network and endpoints,” says Fidelis Cybersecurity Chief Cyber Strategist, Jim Jaeger.
Fidelis Network™ analyses network traffic at multi-gigabit speeds in real-time. It detects the tools and tactics of advanced attackers – including advanced malware, exploits, command and control activity, and data theft techniques – that can often get past traditional network security systems, such as firewalls and intrusion prevention systems. Fidelis Endpoint™ allows an organization to initiate an investigation and respond to a threat, no matter where it is in the corporate environment – network, endpoint or mobile device – across all ports and protocols, without depending on third-party proxies.
Posted by
VMD - [Virtual Marketing Department]
|
|
|