Ava’s vision is to help organizations monitor, understand, and act on threats across both cyber and physical domains. The company offers insider threat detection cybersecurity solutions and security solutions to protect people, assets, and data. Security professionals leverage embedded machine learning to recognize and investigate patterns and respond quickly.
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable intelligence from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IoA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates 1 trillion security events a week from across the globe to immediately prevent and detect threats.
There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
The trick is to take people out of the equation as much as possible, says Fortinet's Doros Hadjizenonos.
Citrix’s Andre Combrinck shared tips on how to protect from botnet attacks, at ITWeb's Security Summit.
Just how dependable is enterprise VPN technology? It depends on who you ask.
Under the theme of ‘hacking the virus’, young coders at this year’s ITWeb Security Summit Hackathon got to grips with the challenges presented by the pandemic.
Cloud brings its own security challenges, but you have to start somewhere, says CrowdStrike's Yassin Watlal.
Government intelligence agencies are shielded from retaliation and prosecution to a certain extent, as attribution is difficult.
Securing an organisations starts with securing its people, says Ran Pugach of Ava Security.
One big mistake organisations often make when it comes to incident response is that they act too quickly, or too rashly.
If an organisation’s customers are not able to buy online, 24 hours a day, they are already buying from its competitors, warns Custodiet’s Steve Jump.
How you deal with a staff member who clicks a phishing link is a key part of your security posture.
PwC’s Yvette du Toit presents at ITWeb Security Summit 2020.
A well-funded Information Regulator will go a long way to giving the POPI Act its powers, says attorney and Information Regulator member Sizwe Snail ka Mtuze.
An information security expert tells the ITWeb Security Summit 2020 that African countries are lagging in enacting data protection laws.
In the aftermath of a security incident, there is a very fine line between not communicating enough and communicating too much.
George Beebe, CFTNI director, says cyber specialists can learn from mistakes made by experts in other fields.
You need a solution that’s been redefined for the cloud era, says CrowdStrike’s Roland Daccache.
If your board doesn’t understand security, tell them it’s about the business.
There's a need to unify the physical and cyber domains, says Tormod Ree, CEO of Ava Security.
We may be seeing what’s easy to believe, and missing some of what is really significant in terms of what happened.
A thousand delegates have registered to attend the virtual ITWeb Security Summit 2020, starting tomorrow until 28 August.
IT performance, user experience, application experience and information security must coexist, says Francois van Deventer, Citrix.
Cyber security leaders must reinvent themselves, says MD of Altron Security.
Despite hefty investments in cyber security tools, organisations are still being breached.
Pandemic impacts IT security management and broader market, says SensePost's Dominic White.
The fourth annual Security Summit hackathon is set to take place next week.
Don't let a security breach become a catastrophe, urges Oren Dvoskin ahead of Security Summit.
Humans do work-arounds when security gets in the way of them doing their jobs or enjoying their lives.
Cyber security director at SNG Grant Thornton will share vulnerability management lessons at the upcoming #ITWebSS2020.
DFIR Labs' Veronica Schmitt will share what not to do when it comes to IR at the upcoming ITWeb Security Summit.
ITWeb's Security Summit, which is taking place from 25 to 28 August as a virtual event, will address the cyber threats faced by retailers.
Security must works side by side with business and IT, says Standard Bank’s Robin Barnwell.
Enterprises are missing out on opportunity to strengthen security and improve user experience, says independent advisor Kris Budnik ahead of Security Summit 2020.
ITWeb's Security Summit will arm those responsible for IT and cyber security in the public sector with info on the latest threats and what to do about them.
The majority of cyber security investments were not designed to support a WFH type of operating model, says CrowdStrike ahead of Security Summit 2020.
ITWeb's Security Summit, taking place from 25 to 28 August as a virtual event, will have a strong focus on cyber security in the financial services sector.
Ahead of ITWeb's Security Summit, a specialist warns of risks that are often neglected.
Organisations need to focus on reducing the attack surface of their endpoints, says Panda Security.
Jo Stewart-Rattray, a security expert from Australia, will deliver a keynote at ITWeb’s Security Summit 2020.
Any secret protected by traditional asymmetric ciphers will no longer be protected.
Cyber security is still viewed as something the IT department needs to take care of instead of an enterprise risk.
Too often, information is confused with actual intelligence, says DFIRLABS.
Harish Sekar of ManageEngine/Zoho will discuss the role of SIEM in the POPI Act at the ITWeb Security Summit 2020.
Dr Kenneth Geers warns of politically-motivated attack on critical national infrastructure.
AI as a means of both attack and defence will be the biggest security trend in 2020.
With many South Africans working from home due to the COVID-19 pandemic, cyber security has never been more important.
It's time to implement multi-factor authentication, urges Telkom's Steve Jump.
The cyber security event will be held as a virtual summit from 25-28 August.
Expect more deep social engineering, warns BioCatch co-founder Uri Rivner, who will be speaking at Security Summit 2020.
15th annual Security Summit takes place in June, in Johannesburg and Cape Town, and and is themed ‘Increasing your cyber agility to build secure ecosystems’.
Several top international keynote speakers will speak at the summit, from 23 to 25 June next year.
Ava’s vision is to help organizations monitor, understand, and act on threats across both cyber and physical domains. The company offers insider threat detection cybersecurity solutions and security solutions to protect people, assets, and data. Security professionals leverage embedded machine learning to recognize and investigate patterns and respond quickly.
Please visit www.ava.uk
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable intelligence from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IoA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates 1 trillion security events a week from across the globe to immediately prevent and detect threats.
There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
Visit: www.crowdstrike.com
Axiz
Our commitment to our stakeholders is to be the best and most successful distributor in our region. We strive towards this goal by being the most valued channel for our partners and by contributing to the growth and profitability of our shareholders, staff, vendors, channel partners and their customers.
www.axiz.com
Citrix
Citrix (NASDAQ:CTXS) is powering a better way to work with unified workspace, networking, and analytics solutions that help organizations unlock innovation, engage customers, and boost productivity, without sacrificing security. With Citrix, users get a seamless work experience and IT has a unified platform to secure, manage, and monitor diverse technologies in complex cloud environments. Citrix solutions are in use by more than 400,000 organizations including 99 percent of the Fortune 100 and 98 percent of the Fortune 500.
Learn more at www.citrix.com
Microsoft South Africa’s mission is to empower every person and organisation on the planet to achieve more. The breadth and depth of our mission unlocks unprecedented opportunity as technology transforms every industry and has the power to make a difference in the lives of everyone. Our mission is grounded in both the world in which we live and the future we strive to create and speaks to our new worldview which is rooted in the intelligent edge and intelligent cloud. The intelligent edge is the interface between the cloud and the real world. It is the layer of mobile devices we use to access the data in the cloud, speeding up the processing power of the internet of things, helping this new world to react faster to changing conditions, and become more efficient. Our Business applications, Applications and Infrastructure, and Data and Artificial Intelligence (AI) solutions, are designed to help accomplish effective digital transformation, by empowering employees, engaging customers, optimising operations and transforming products. Through gaming, Modern Life, and Modern Workplace we are driving quality engagement to create empowered experiences.
Please visit www.microsoft.com/en-za
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioural patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.
See more at: www.cybereason.com.
Hosi Technologies
Established in 2010, Hosi Technologies is an Information Security Solutions Company, a trusted partner of Cofense in Africa. We provide amongst other services Cyber Security Awareness and Phishing Solutions.
cofence.hosi.tech/cat
Cofense
Cofense®, the leading provider of intelligent phishing defence solutions worldwide, is uniting humanity against phishing. The Cofense suite of products combines timely attack intelligence on phishing threats that have evaded perimeter controls and were reported by employees, with best-in-class security operations technologies to stop attacks faster and stay ahead of breaches. Cofense customers include Global 1000 organizations in defence, energy, financial services, healthcare and manufacturing sectors that understand how changing user behaviour will improve security, aid incident response and reduce the risk of compromise.
For additional information, please visit www.cofense.com
Splunk Inc. turns data into doing with the Data-to-Everything Platform. Splunk technology is designed to investigate, monitor, analyze and act on data at any scale.
Please visit www.splunk.com
South African listed Allied Electronics Corporation Limited (Altron) is invested in telecommunications and information technology, offering ICT services in the areas of cybersecurity, software security solutions, business process outsourcing, skills development, secure transactional solutions, systems integration, cloud computing, managed services, IT infrastructure, electronic component distribution, fleet management, telematics, data analytics, converged and broadband communication services and networks, and the resale of Microsoft software.
The group’s primary focus is in providing innovative solutions in the fintech, healthtech, safety & security, and learning and development verticals that have a meaningful impact on society by addressing challenges facing communities in South Africa, the continent and beyond, while delivering shared value for all its stakeholders.
Founded in 1965, Altron has a direct presence in South Africa, the rest of Africa, the UK and Australia through its various businesses. In addition, the group’s strategic partnerships with leading international technology companies gives it access to leading technology capabilities and products from across the world, including Asia, Europe and North America. The majority of the groups revenue and headcount are derived from the local market in South Africa where the group is headquartered. The Altron group employs more than 8 500 employees globally.
Visit: www.altronsecurity.com
Cloudflare, Inc. (@cloudflare) is on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers more than 10 trillion requests per month, which is nearly 10 percent of all Internet requests worldwide. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world's 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in San Jose, CA, Austin, TX, Champaign, IL, New York, NY, Washington, D.C., London, Munich, Beijing, and Singapore.
Please visit www.cloudflare.com
About ManageEngine
ManageEngine is the enterprise IT management division of Zoho Corporation. 60 percent of the Fortune 500 - rely on our real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more.
www.manageengine.com
About ITR Technology
ITR Technology have been the sole distributers of ManageEngine software in South Africa for over 19 years. With certified support engineers, a dedicated sales team and a newly constructed ManageEngine training centre, ITR Technology values making a difference in the lives of South African IT professionals
Learn more at www.itrtech.africa
Maxtec
Maxtec was established in 1986 and has evolved its offering from the provision of PC storage solutions and reliable and accessible data storage, to that of a complete IT cyber security, services and solutions provider to technology users across the business spectrum. Maxtec is a distributors of market leading technologies that are trusted around the globe by major players in the IT Industry.
www.maxtec.co.za
Fortinet
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 450,000 customers trust Fortinet to protect their businesses.
Learn more at www.fortinet.com
Nclose is a leading Specialist Cyber Security Solutions Provider. We architect, deploy and manage security solutions aimed at protecting our clients' resources from damage caused by the ever growing number of threats present in the business place.
Please visit www.nclose.com
Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, threat detection & response services to organisations around the globe. Security assessment services and hacking trainings are delivered by the prominent specialist division, SensePost.
Please visit www.orangecyberdefense.com/
Panda Security is a European based security vendor with a global footprint. Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime and addressing advanced threats. The Adaptive Defense product family is an Endpoint Detection and Response (EDR) solution that addresses the changed threat landscape with a differentiated approach using machine learning and big data. The company is recognized by Gartner as Europe's sole EDR vendor. In 2006, Jeremy Matthews founded Panda's local office in Cape Town, opening the international vendor's first presence on the African continent.
Please visit www.pandasecurity.com/southafrica/intelligence-platform/
KnowBe4, the provider of the world’s most popular integrated new-school security awareness training and simulated phishing platform, is used by more than 20,000 organizations worldwide to manage the ongoing problem of social engineering. Founded by data and IT security expert Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by training users to be able to identify and report phishing attempts to avoid falling victim to ransomware attacks, CEO fraud, W-2 scams, and other social engineering tactics through a new-school approach to security awareness training.
Thousands of organizations trust KnowBe4 to mobilize their end-users as the last line of corporate IT defence. KnowBe4 provides an affordable, easy-to-use GRC tool that helps organizations cut down audit time and manage their compliance and risk projects faster than ever.
With the acquisition of Popcorn Training in 2018, KnowBe4 Africa continues to develop locally relevant content for African audiences.
Please visit popcorntraining.com
ZeroFOX, the global category leader in public attack surface protection, safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.
For more information visit: www.zerofox.com
Wolfpack provides specialist information and cyber threat consulting, training & awareness services to governments and organisations in Africa and pro bono incident support to victims of cyber attacks.
Please visit www.wolfpackrisk.com
ASG Africa operate in South Africa and MEA focused on solving Clients’ challenges as they experience an increase in attacks on Operational Technology (OT) and Industrial Control Systems (ICS) networks, through mutated ransomware and ICS specific attacks, targeting disruption of activities more so now than pure financial gains. Through leading-edge Content Disarm and Construct (CDR) technologies ASG Africa offers a cost-effective solution throughout the region. ASG Africa also offers cost-effective Secure Remote Access to Corporate Networks without the use of VPNs, on Azure and other platforms.
See more at: www.asg.africa.com.
Cyanre is the leading Digital Forensic and Incident Response firm in SA. Through our extensive digital forensic investigative experience in cyber-crimes, we have the skill and expertise to effectively manage any security incident. Our IR team of specialist, assist ICT teams in containing an incident, eradicating the treat, rebuilding the environment, improve security posture, conduct a deep-dive forensic analysis of the actions of the perpetrator while maintaining forensically sound data collection processes and chain of custody requirements. Our in-depth legal knowledge and expert witness services allow us to take an investigation from initial notification to prosecution.
Please visit www.cyanre.co.za
ExtraHop delivers unprecedented visibility, definitive insights, and immediate answers for security and IT professionals across the hybrid enterprise with cloud-native network detection and response, complete visibility, real-time detection, and intelligent response.
Please visit www.extrahop.com
Mobius
Mobius creates sustainable change in your organisation to enable you to govern and manage your information risk.
mobiusconsulting.co.za
Phinity Risk Solutions
Phinity Risk Solutions innovate, so that everyone can make more informed decisions. Our powerful suite of software solutions identifies, profiles, assesses, and reports operational risks so that you can visualise your risks and track each one through to remediation, on a single platform.
Learn more at www.phinityrisk.com
RSA delivers a unified, business-driven approach to managing digital risk—uniting stakeholders, integrating technologies and transforming risk into reward.
Please visit www.rsa.com
Seceon aiXDR™ combines network, identity, application, cloud, and endpoint visibility with behavioural ML algorithms and AI based dynamic threat models to surface only the alerts that matter.
Please visit www.seceon.com
Trend Micro is the global leader in enterprise data security and cybersecurity solutions for businesses, data centres, cloud environments and networks.
Please visit www.trendmicro.com
- LogPoint - Next Gen SIEM
- Acalvio - AI driven fluid deception technology
- Snare Log Agents – Dramatically reduce your SIEM EPS or Storage based costs
- Spirion - Sensitive Data Management
- MassComz – Multi channel critical event communication and cyber awareness.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus vehicula velit vel ante rhoncus, a lacinia libero ultrices. Mauris vel tristique odio, at luctus dui.
For more information visit: www.zenithsystems.co.za
The Institute of Information Technology Professionals South Africa (IITPSA) is South Africa’s industry body for IT professionals, and a SAQA recognised and IP3 accredited professional body.
Visit: www.iitpsa.org.za
Follow the ITWeb Events community to engage with your peers, read our editorial pieces and newsletters and more.
Follow our Twitter Group @ITWeb_Events and post your thoughts and opinion using the Twitter handle
#ITWebSS2020
RT @RachChinyoka: Ensure you not left exposed with regards to 3rd party risk #ITWebSS2020 https://t.co/jXuUCRhwc0
RT @jjza: The threat of worms on the mobile has not materialised (yet) but has happened on IoT #ITWebSS2020 https://t.co/OPNcrDIksk