Monday,25 November, 2024

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

Fidelis Cybersecurity to Demonstrate End-to-End Attack Lifecycle Defense Capabilities and Solutions at GISEC 2016

Published Mar 20, 2016

Fidelis Cybersecurity, the leading provider of products and services for detecting and stopping advanced cyberattacks, today announced their participation in the Gulf Information Security Expo & Conference (GISEC), to be held at the Dubai World Trade Center, March 29-31.

Attendees are invited to Hall 7, Stand B-144 to learn how advanced products and incident response services from Fidelis Cybersecurity reduce the time to detect and resolve incidents, prevent data theft and stop attackers at every stage in the attack lifecycle.

In addition to exhibiting at GISEC, Jim Jaeger, a former director of intelligence with the U.S. Air Force (USAF) Atlantic Command, will host a session on forensic analysis of cyberattacks. He will share insights into how enterprises can identify the root cause of cyberattacks and put in place solutions and processes to counteract threats and mitigate future attacks. The session will be held on Wednesday, March 30 from 3:10pm – 3:40 pm in Sheikh Rashid Hall.

“Cybercriminals are targeting the Middle East, and the mass adoption of e-services, from banking and insurance to government, adds another layer of complexity and introduces potential security issues. Organizations must be able to quickly operationalize intelligence across their infrastructure so they can identify and remove attackers no matter where they hide on the network and endpoints,” says Fidelis Cybersecurity Chief Cyber Strategist, Jim Jaeger.

Fidelis Network™ analyses network traffic at multi-gigabit speeds in real-time. It detects the tools and tactics of advanced attackers – including advanced malware, exploits, command and control activity, and data theft techniques – that can often get past traditional network security systems, such as firewalls and intrusion prevention systems. Fidelis Endpoint™ allows an organization to initiate an investigation and respond to a threat, no matter where it is in the corporate environment – network, endpoint or mobile device – across all ports and protocols, without depending on third-party proxies.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks