09.30 – 10.00 AM
OPENING / BREAKFAST
10:00 – 10.15 AM
SVP / Head of Telekom Security
10:15 – 10.35 AM
DIGITIZATION AS GROWTH ENGINE
Director of Digital Division & Telecom Security, T-Systems
10.35 – 11:05 AM
Ambassador Wolfgang Ischinger
11.05 – 11:35 AM
NEWS MAGENTA SECURITY PORTFOLIO
SVP / Head of Telekom Security
11.35 – 12.00 AM
SUCESSSTORY: SECURITY FOR EVERYONE
President & COO Symantec
12.00 – 12.20 AM
BEHIND THE CURTAIN
Internal Security & Cyber Defense, T-Systems
12.20 – 12.50 AM
SECURITY IN THE ERA OF EXPONENTIAL TECHNOLOGY
President Check Point
12.50 – 02:00 PM
02:00 – 04.00 PM
3 sessions each 35 minutes,
6 breakouts parallel
04.00 – 04.30 PM
04.30 – 05.00 PM
05.00 – 05.30 PM
CEO and Founder ZSCALER
05.30 – 06.00 PM
Executive Chairman CISCO Systems
06.00 – 06.30 PM
Chairman of the Board of Management, Deutsche Telekom AG
From 06.30 PM
GET TOGETHER / DINNER
09.00 – 09.20 AM
SVP / Head of Telekom Security
09.20 –09.40 AM
IT security expert, computer expert on TV and first Comedyhacker®
9.40 – 10.00 AM
Board Member of the Deutsche Telekom AG, responsible for Data Privacy, Legal Affairs and Compliance
10.00 – 10.20 AM
THE WORLD IS MOBILE, BUT IS YOUR SECURITY?
10.20 – 10.40 AM
INDUSTRIAL CONTROL SYSTEM SECURITY FOR IOT
SVP / Head of Telekom Security
10.40 – 11.00 PM
MD MMS Dresden, T-Systems
11.00 AM – 01:00 PM
3 sessions á 35 minutes,
6 breakouts parallel
01.00 – 02.00 PM
02.00 – 02.40 PM
Präsident Cyber Threat Alliance
02.40 – 03.10 PM
THE ROLE OF ORCHESTRATION IN INCIDENT RESPONSE
Vice President of Product Management, IBM Deutschland
03.10 – 03.40 PM
Chief Consumer Security Evangelist, McAfee
03.40 – 04.00 PM
SVP / Head of Telekom Security
END OF CONFERENCE / COFFEETIME
The lecture presents modern, integrated protection concepts that take into account both classical (on-premise) and modern cloud infrastructures. The fuel for the protection of a company is Security Intelligence - the knowledge of global threats in real time. In combination with Machine Learning and analysis of suspicious data, a powerful solution is developed, which also successfully sustain current threats like WannaCry.
@SymantecEMEA // @LK_Security
Current counter measures against malware, like traditional anti-virus solution, are not sufficient anymore to protect against unkown and ever changing threats. Especially the continuous wave of ransomware attacks have recently generated headlines in the press again and caused serious damage to enterprises and public institutions alike. Based on the recent example of a ransomware attack “WannaCry” we will present the latest solutions based on the SandBlast Technology from Check Point to protect yourself against unknown Malware effectively. During the presentation we will also present the jointly developed APT Protect Pro (Cloud) service for email from Telekom Security, which is based on the SandBlast technology which offers especially small- and medium sized businesses a simple and cost effective protection.
Today, companies must provide more access to devices and data than ever before. Ever-changing network designs, brought about by e.g. virtualization, software-defined networking, cloud computing or IoT, make the subject increasingly complex. Complexity cannot however be solved through the use of various complexly configurable security products. The best solution lies in simplicity. Security solutions that interact and integrate with each other and solutions that share the latest information on threats with one another and immediately actively protect themselves are the key to success in the ever-changing network. Fortinet's answer to this demand is the Fortinet Security Fabric.
The Internet has transformed humanity and businesses, both small and large, are now reliant on Internet services and connectivity for day-2-day business continuity. DDoS attacks represent the primary threat to the Internet services many business rely upon and over the last 18 months DDoS attacks have seen a step-change in their Scale, Complexity and Frequency. This session will talk through some of Arbor’s research into the DDoS threat landscape, looking at how attacks have changed. The weaponisation of IoT DDoS botnets will also be covered, along with best-practice defences that allow business to address the risks they face from today’s DDoS attacks.
Join us for an intriguing discussion on mobile security in your organisation, including:
Six months on from the commercial launch of the Magenta drone shield, it is time for the product managers and a partner of Deutsche Telekom to take stock. How has the market responded to the Deutsche Telekom solution? What are the customers' current requirements and how are they being implemented? What are the latest developments and trends, etc.? The presentation will conclude with an invitation to a practical test at a property where interested customers can try out the drone shield for themselves.
It’s no longer a secret that companies need to protect their data – we don’t need another presentation on that. But whether an IT security solution is actually made for the people it is meant to protect is an entirely different issue. After all, security strategies often fail because the products employed are too complicated or extremely disruptive to customers while they are working. For the past 12 years, EgoSecure has listened to its customers very closely and developed a product its customers call a “nice solution”. If you’d like to know how “nice” a security software can be and how you can benefit from it, come to this talk.
Security teams often don’t detect threats when they first penetrate the system and aren’t aware there is a danger at all. They lack the transparency needed to quickly detect and stem an attack, giving the malware the short time it needs to reach its target and inflict damage. Cisco AMP is different. Because point-in-time detection and blocking methods are not effective 100% of the time, the AMP system continuously analyzes files and data traffic even after they are first identified. AMP monitors, analyzes and records all file activity and all communication on end devices, mobile devices and in networks to quickly identify hidden threats that present suspicious or harmful behavior. At the first sign of a problem, AMP notifies the security team and provides detailed information about the threat behavior so the team can answer important security questions:
With this information, the security teams can quickly comprehend what has happened and take appropriate action with the mitigation and removal functions in AMP. With just a few clicks in the user-friendly, browser-based AMP management console, administrators can contain malware by permanently blocking the file from running on any other device. Because Cisco AMP also knows where the file has run, it can remove it from its saved location and place it under quarantine for all users. If malware penetrates, security teams no longer need to create a new image of entire systems to remove the malware. That process takes time, money and resources, and disrupts the operation of critical company functions. With AMP, removing malware can be compared to a surgical procedure. It causes no further harm to the IT systems and prevents the impairment of business processes.
Topics that will interest you:
Cyber-attacks are on the rise, both in frequency and severity. Therefore, KPMG offers the Cyber Security Maturity Assessment on its digital distribution and consulting platform, called ATLAS. ATLAS empowers clients to measure their cyber security and maturity level within their organization.
The Cyber Security Maturity Assessment forms part of our business assessments. Essentially, it contains online questionnaires developed by KPMG professionals. In order to gain a comprehensive picture of risk, this assessment gathers information from every relevant angle. Upon completion, it offers well-defined recommendations and provides a professional benchmark for competitor comparison. KPMG ATLAS today makes for better business tomorrow.
“Versiegelte Cloud” - file sharing and online team collaboration meeting security requirements even of healthcare and legal professionals.
Against the still surprisingly widespread opinion of many users “my data is not critical/not sensitive” every entrepreneur is well-advised to protect his business-critical data. This concerns especially the data processing in external datacenters in terms of cloud computing or hosting/outsourcing as well as the handling of sensitive data within own systems. In our presentation, we take a closer look on “Versiegelte Cloud” as a comfortable and highly secure solution for cross-company collaboration – data exchange, project- and data rooms.
What’s next after Digital transformation? Learn how Juniper Networks Software-Defined Security Network (SDSN) vision enables organizations to secure, defend and protect their entire infrastructure whilst embracing innovation.
The European Union's General Data Protection Regulation (GDPR) takes effect in May of 2018. The introduction of this Europe-wide harmonized regulations governing the protection of personal data by the processor of the same affects companies across the globe and requires a planned and structured approach that reaches beyond individual departments. In this session we will provide a brief introduction to the regulation, offer a method for planning and prioritizing initiatives to address the requirements, and show the concrete added value of security monitoring (SIEM) solutions for implementing GDPR requirements.
Using concrete examples, we show you how Thycotic solutions protect you from cyberattacks, and support in meeting your compliance requirements.
Blockchain can be understood as mutually used database technology in which the sender and recipient of a transaction are securely and directly connected with each other. The most widely known application of blockchain technology is the global digital currency Bitcoin. Yet in other areas as well, blockchain technology provides revolutionized and improved solutions.
In industrial production, blockchain technology makes it possible to create an autonomous production line and guarantee the trackability of the production steps. Blockchain enables dynamic networking, simpler automation, and security. Products exist as virtual "digital twins", and in the future will be able to initiate production on their own.
This technology is also revolutionary for the internet of things, because in the future many billions of different devices will be interacting on a network as equal partners. Blockchain makes it possible to connect these partners without needing a central server and to issue digital identities in a decentralized process.
What is special about this type of technology? What criteria need to be met for a good blockchain solution? Why are T-Systems and DATEV presenting together when it comes to this innovative topic? You will find the answers to these questions and many more in our breakout "Blockchain for Medium-sized Enterprises".
This session will take a closer look at today’s connected world, the Consumer’s perception and stance towards security within his/her digital lifestyle and investigates how security has evolved until now and will evolve in the days to come.
In this presentation, Korbinian Lehner explains the benefits offered by the Microsoft Cloud Deutschland, for which Deutsche Telekom as the data trustee provides an extra level of data protection. With the help of a live demo, the presentation impressively demonstrates a wide range of use cases, showing, for example, the most effective way of combating Trojan attacks.
Security and threat information tools have made tremendous progress in preventing highly sophisticated and new threats. However, at many companies, these individual solutions work isolated from one another and generate thousands of alerts every day for the entire infrastructure, which then result in an immense manual effort and expense to implement the necessary measures.
New challenges call for a new approach to security...
The lack of security experts and increasingly complex attacks call for a new way of thinking for companies to keep a step ahead of the growing threat scenario. Security products from different manufacturers need to be able to learn from one another and be capable of sharing information among each other in near real-time. And they must be able to do this on a uniform and secured, yet open platform.
During this breakout session, you will see examples of how endpoint and network security products, products developed in-house and open source products can share security-relevant information and thereby continuously improve their performance.
It’s a fact:
Powerful individual solutions cannot provide adequate protection from highly sophisticated, targeted attacks – companies need devices and security solutions that consistently learn from each other and can take automated, joint action.
What is the first thing that comes to mind when you think of the cloud? Just as nearly 83 percent of all companies in Germany probably the topic „security“ (study "Cloud Security 2016", Computerwoche). But 65% of German companies already use the cloud - either with storage, software or computing ("Cloud Monitor 2017", Bitkom Research and KPMG). And the share of cloud users will continue to grow in the future. The protection of sensitive data is particularly important. eperi – a German company that has been on the market for 14 years now – is considered a pioneer in encryption. The eperi solutions basis, developed together with the Federal Office for Security in Information Technology (BSI), do not constitute encryption silos, but support all systems, whether databases, file storage or SaaS. Furthermore, it is also not a problem to encrypt self-developed applications, so called Custom Apps, with eperi. And best of all: Since it is a proxy-based solution, no complex intervention in the IT infrastructure is necessary. The processes in the company remain unchanged. The user does not realize that the eperi gateway is used.
maincubes meets every expectation that customers have of an ISO 27001-certified colocation provider with a state-of-the-art TÜV Level 3-approved data center. But we take things a big step further by offering a holistic approach to security. If your goal is zero outage, then platforms, processes and personnel all have to deliver more than the current market standard, and our newest data center has been constructed to do just that. We are utilizing our face to the market in combination with the technology and services available today in order to establish a core of security with the right partners and help our colocation customers to access secure cloud services. As a result, ecosystems and marketplaces are being created with security that is integrated from the word go – instead of being tacked on as an additional service later on. As a German company under German ownership, maincubes is an important partner for the country's SMEs, especially when it comes to data privacy and security.
This presentation will describe the next evolution in finding and preventing successful cyber-attacks. Leveraging big data we can enable an entirely new generation of Action Item engines to find attacks before they can succeed, leveraging the collection and prevention power of our network security, endpoint security, SaaS/Cloud security, as well as our visibility into IOT.
“Assume breach” is one of the guiding principles in in the defense against cybercrime. It expresses the fact that the protection of the perimeter with firewalls and virus scanners only is inadequate and further security measures must be taken to protect against data theft and manipulation. Cloud approaches are often perceived as more uncertain than on-premise approaches. But is that really the case? The speech will reveal common myths and explain how you can successfully prevent attackers from taking over your network and protect your valuable data – regardless of the infrastructure that you currently have in place or that you are planning to introduce in the future.
Sometimes your network is full of surprises: Your corporate network offers access to valuable and sensitive information. Information that must never fall into the wrong hands. It only takes one vulnerable host to infect an entire network.. Can you be sure there aren’t any hidden “surprises” threatening your most precious data assets? No stealthy malware, back doors, data leaks or other security vulnerabilities? The security check report from the Telekom Security consulting team, jointly developed with Check Point Software, will help organizations to uncover security risks they are usually not aware of. During the presentation we will share best-practice, based on thousands of reports per year and share experiences on what security risk have been and how uncovered. Security Reports helped to uncover unknown risks in 99% of the cases.
We know since 1994: Quantum computers will make todays Public-Key-Cryprography insecure. But Public-Key-Cryptography is an important foundadtion of cybersecurity and privacy. The talk will show how serious the problem is and how we can deal with it.
The ransomware WannaCry has recently attracted a lot of attention because very many systems were affected, including critical ones, such as health care. Even if there ended up being a lot of overreacting, WannaCry did highlight a few important aspects. One was that critical gaps often remain open for far too long, and not only cybercriminals, but also state agents, have an interest on taking advantage of such weaknesses for their own purposes. Also, many companies are still not good enough in terms of their cyber attack defense, and in IT security generally. Martin Kuppinger will investigate these aspects and show how you can address these challenges in a concrete way - whether as a small or medium-sized enterprise, for example by working with MSSPs (managed security service providers).
Security by Design and best practice for Ethernet Encryption and Secure Browsing.
Rohde & Schwarz Cybersecurty is a long-standing Telekom Security Partner and provides two reliable solutions made in Germany as part of the Magenta Security Portfolio, which protect Wide Area Networks (WANs) and Endpoints from Cyberattacks. Marius Münstermann will present technical background and real world best practice on how to securly encrypt EthernetConnect Lines with SITLineETH without hampering the performance as well as how to implement a 2-browser-strategy which keeps out ransomware and other threats from the Internet while providing all necessary tools on the intranet and without impacting on the user's browsing behaviour.
In order to reduce the impact of cyber attacks, organisations need to improve their time to detect and respond to security incidents. Security Orchestration & Automation technology reduces the current burden on Security Operations teams and allows them to focus on critical threats to the business. This session will explore these new technologies and the role they can play in in the next generation Security Operations Centre (SOC).
Starting from May 2018 the new data privacy regulation takes effect in Europe. How to comply to regulatory stipulations and at the same time to participate in new chances.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the world's largest pure-play security provider, offers industry-leading solutions and protects customers from malware and other kinds of cyber attacks with unrivaled detection rates. Check Point provides a complete security architecture, secures companies from the network through to mobile devices, thereby offering comprehensive and intuitive security management. The dynamic Software Blade Architecture from Checkpoint represents a secure, flexible and simple solution that can be precisely customized according to a company's security requirements or environment. Check Point protects more than 100,000 companies of all sizes throughout the world. – WELCOME TO THE FUTURE OF CYBER SECURITY.
For more than fifteen years, the leading network operators in the service provider, cloud and enterprise setting have relied on solutions from Arbor Networks, particularly when it comes to the visibility and security of their data traffic, enhanced detection of treats and DDoS mitigation. The combination of market leading technologies, comprehensive research in the field of security, intuitive workflows and extensive visualization tools enables Arbor Networks to understand attack activities and take the necessary actions. Recognize the risks and protect your company with Arbor Networks.
Cisco (NASDAQ: CSCO) is a global IT provider that helps enterprises leverage future business opportunities today. Unmatched possibilities are created by networking people, processes, data and things. Enterprises are able to optimize processes, use resources more efficiently and gain a competitive edge. Today some 15 billion things are connected through the Internet – and that is just one percent of what can actually be achieved. Cisco estimates that the business potential which enterprises worldwide can tap into by using technology innovations for the Internet of Everything will be 14.4 billion U.S. dollars by the year 2022. Cisco develops and markets products based on the IP protocol for applications in Core Networking, Video and Collaboration, Access (wired and mobile), Security, Unified Data Center and Services. The company focuses on the enterprise market segment (large corporations, SMEs, public administration) and the service provider segment. Cisco relies on more than 2,200 certified partners to promote its indirect sales in Germany. Cisco announced the launch of the "Deutschland Digital" initiative in March 2016. Within the scope of this initiative, Cisco will invest an additional 500 million U.S. dollars by the year 2019 to boost digitization in Germany. The main focal points of the initiative are innovation, cyber security and education.
With EgoSecure Data Protection, the German security specialist EgoSecure in Ettlingen has been the innovation leader in the field of comprehensive data protection solutions for more than ten years. As the first provider in the world to do so, EgoSecure combines the transparency of data streams on devices and the defensive functions in one product. In doing so, the “Insight” module gathers facts about the data protection-related situation in the network and presents it in the form of graphics and detailed tables so it can meet the information requirements of both management and administrators. “Insight” thereby ensures that protective measures are set up on the basis of facts rather than arbitrarily.
The protective measures in EgoSecure Data Protection follow the C.A.F.E. management principle: The principle provides for all protective functions to be assigned to the overarching security concepts of Control, Audit, Filter and Encryption.
The “IntellAct” module also offers the ability to automate data protection. If deviations to standard values or other anomalies are detected, protective functions can be automatically triggered according to a previously defined set of rules. This minimizes the effort required by the IT departments for data protection while also enhancing the level of security, since response times for the defensive measures can be dramatically shortened.
All functions are linked by an intuitive management console, a database, and an installation and administration concept. This guarantees quick installation and simple administration. User training courses are not generally needed since most of the protective functions take place in the background.
EgoSecure maintains worldwide sales and technology partnerships and protects more than 2,100 international companies of all sizes from many different industries. EgoSecure is especially sought after for data protection in critical infrastructures. The product portfolio offers effective and efficient solutions for today's current market issues such as EUGDPR, industrial espionage, compliance, cloud security and industry 4.0.
Unternehmensdarstellung Fortinet From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure.
We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.
Our flagship enterprise firewall platform, FortiGate, is available in a wide range of sizes and form factors to fit any environment, and provides a broad array of next generation security and networking functions. Complementary products can be deployed with a FortiGate to enable a simplified, end-to-end security infrastructure covering:
Our market position and solution effectiveness have been widely validated by industry analysts, independent testing labs, business organizations, and media outlets worldwide. We are proud to count the majority of Fortune 500 companies among our satisfied customers.
Fortinet is headquartered in Sunnyvale, California, with offices around the globe. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong management team with deep experience in networking and security.
Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.
Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm. The world’s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as AirWatch, Ingram Micro, Microsoft, and MobileIron. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.
Palo Alto Networks is a next-generation security enterprise and is leading the industry into a new era of cyber security. The company ensures that tens of thousands of businesses worldwide can trust and rely on digital solutions in the future by preventing cyber attacks. Innovative security platforms offer protection against known and unknown threats in order to support the provisioning of applications, users and content. Palo Alto Networks offers solutions that enable customers to protect and efficiently develop their business enterprises. More information is available at www.paloaltonetworks.com.
Zscaler™ enables organizations to securely transform from the old world of IT, which focused on securing the internal network, to the world of cloud and mobility, where the Internet is the new corporate network. Zscaler delivers the inbound and outbound gateway stacks as a service, providing secure access to the Internet and applications in the data center or cloud. Each day, the Zscaler cloud processes more than 30 billion requests, blocking 125 million threats for 5,000 organizations in 185 countries, and the ThreatLabZ research team provides continuous protection from new and evolving threats. Visit www.zscaler.com.
Statement from Jay Chaudhry, CEO and founder, Zscaler
The Internet is the new corporate network
Digital transformation is a powerful business enabler that is compelling business leaders to fundamentally change their technology ecosystems. However, such a transformation significantly impacts security, network traffic flows, applications, user experience, and cost, which is why it is top-of-mind in C-suites and the boardroom.
Digital transformation requires a new approach to security
The cloud has changed everything. Applications are in the cloud, data is stored in the cloud, and users are accessing these resources from everywhere, making the internal network barely distinguishable from the external network. The security infrastructure built to protect the internal network no longer works when the people and assets that used to be on that network have gone.
We have to treat the Internet as the corporate network and apply security and access controls accordingly. And as we rethink this network, we must focus on some core best practices:
Only when the industry begins to rethink the network and re-evaluate best practices will adequate security be in place to protect corporate assets and the ultimate health and longevity of businesses worldwide.
Zimperium®, the global leader in enterprise mobile threat defense (MTD), offers real-time, on-device protection against both known and previously unknown threats, enabling detection and remediation of attacks on all three mobile threat vectors - Device, Network and Applications. Zimperium’s patented z9™ detection engine uses machine learning to power zIPS™, mobile on-device Intrusion Prevention System app, and zIAP™, an embedded, In-App Protection SDK that delivers self-protecting iOS and Android apps.
Leaders across the mobile ecosystem partner with Zimperium, including mobile operators (Airtel, Deutsche Telekom, SmarTone, SoftBank and Telstra), device manufacturers (Samsung, SIRIN, TriGem), and leading enterprise mobility management (EMM) providers (AirWatch, MobileIron, BlackBerry, Citrix and SAP). Headquartered in San Francisco, Zimperium is backed by Sierra Ventures, Samsung, Telstra, Warburg Pincus and SoftBank. Learn more at www.zimperium.com or our official blog at https://blog.zimperium.com.
maincubes one GmbH is a German data center company headquartered in Frankfurt, Germany. maincubes represents a new generation of data center operation characterised by substantially greater performance and cost-effectiveness than has been commonly available. maincubes reduces space and operating costs at the same time as providing a higher level of operational reliability, legal certainty and technical security. maincubes also guarantees maximum energy efficiency through a pioneering room design in combination with innovative technology. In addition to cost-effectiveness, security and efficiency, maincubes also ensures sustainable and ecologically compatible operation through a new, cutting-edge design. More information on: www.maincubes.com.
McAfee is one of the world's leading independent cyber security providers. Inspired by a spirit of close collaboration, McAfee develops solutions that result in a secure world for business customers and consumers. McAfee helps enterprises and organizations safeguard their IT environments intelligently and comprehensively with solutions that are compatible with products from other manufacturers. The goal is to better identify threats, eliminate weaknesses and launch defensive measures. McAfee offers consumers protection for all of the devices needed for their digital lifestyle – both at home and on the road. By collaborating with other security experts, McAfee plays a leading role in the market overall when it comes to stopping cyber criminals. More information is available at www.mcafee.com.
MobileIron (NASDAQ: MOBL), the security backbone for digital enterprises, is the market leader when it comes to Enterprise Mobility Management and Mobile Security. It supports global businesses in becoming "mobile firsts" by recognizing that mobility is the most important IT platform for transforming business processes and boosting competitiveness. Mobile and cloud services are dramatically changing the way people work. MobileIron is a pioneer in reliably realizing new mobile processes that lead to business success.
In 2016, for the sixth year in succession, Gartner positioned MobileIron in the Leaders Quadrant of the "Magic Quadrant for Enterprise Mobility Management Suites." MobileIron enhanced its portfolio in October 2016 by launching the MobileIron Bridge solution – enabling the backup and management of classic mobile iOS, Android or Windows devices, as well as desktops and laptops based on Windows 10. Enterprises can save up to 80 percent in comparison to classic PC management tools. The MobileIron Access solution was also launched in 2016 for ensuring the backup and availability of cloud services by giving only trusted users and devices access to cloud services such as Office 365, Salesforce.com, etc. The MobileIron platform is available as a cloud and on-premise solution featuring high scalability. The solution is designed for business enterprises that must roll out and manage a large number of mobile devices.
MobileIron serves more than 14,500 customers, including UBER, Swiss RE, ProSieben Sat. 1, CLAAS, Munich Airport, Sky, Eurostar and other global players. In February 2017, MobileIron announced the formation of a division dedicated to IoT that will introduce a new product during the course of this year. More information is available at www.mobileiron.com.
Rohde & Schwarz Cybersecurity is an IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next generation firewalls and software for network analysis and endpoint security. As a result of the DenyAll acquisition, the portfolio now includes vulnerability scanners and firewalls for business-critical web applications. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, our trusted IT solutions are developed following the security-by-design approach. Around 450 people are employed at our current locations in Germany, France and Denmark.
CyberArk specializes in protection against advanced cyber attacks that utilize vulnerabilities in authorization assignments for privileged access to IT systems and can thereby strike at the heart of the business. Approximately one-third of the DAX 30 and twenty of the Euro Stoxx 50 companies use the solutions from CyberArk to protect their critical data, infrastructures and applications. The company is headquartered in Petach Tikvah, Israel, and Newton, Massachusetts, USA, and has offices worldwide. CyberArk is represented in Germany by an office location in Duesseldorf. Additional information is available at www.cyberark.de, on the company blog at www.cyberark.com/blog, on Twitter at @CyberArk, on Facebook at www.facebook.com/CyberArkand on Xing at www.xing.com/companies/cyberarksoftwaregmbh.
eperi GmbH is a leading provider of Cloud Data Protection (CDP) solutions with several hundred customers addressing data security, compliance and data control use cases for custom applications and leading SaaS applications such as Office 365, Salesforce, ServiceNow and others.
As enterprises face significant legal and regulatory data compliance and data control challenges such as Data Residency, GDPR, PCI/DSS or HiPPA when leveraging the cloud and SaaS platforms, the eperi CDP solutions are helping address these data compliance and data control challenges through a range of cost effective software data protection solutions for most leading SaaS platforms. The eperi CDP solutions are unique in offering the broadest and deepest supports for cloud SaaS, applications, databases and files and are designed with a powerful template concept to support hundreds of different cloud SaaS applications.
This allows enterprises to accelerate the adoption of cloud SaaS whilst addressing these data security, compliance and data control needs in a manner that is seamless to user experience of the SaaS and never compromises the key data protection and data security principles: always ensuring that only the enterprise is in full control of its sensitive data.
eperi CDP solutions are software based solutions that can be used as on-premise gateway solutions under the full control of the enterprise, or are available through MSSP (Managed Service Security Partners) such as IBM, T-Systems and others.
The eperi Gateways are configured as a CDP (cloud data protection) point solution or as part of an integrated CASB solution where more complex and seamless data protection and SaaS application functional preserving use cases are required by enterprises.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 5,600 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.
FireEye, Mandiant and M-Trends are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products or service names are or may be trademarks or service marks of their respective owners.
genua is a German company specializing in IT security. It has been securing networks and developing sophisticated security solutions since the company was founded in 1992. Our business activities range from securing sensitive interfaces in public authorities and industry to networking highly critical infrastructure, reliably encrypting data communication over the Internet, remote maintenance solutions and providing remote access for mobile users and home offices. Our solutions are developed and produced in Germany. Many companies and public authorities rely on solutions from genua to protect their IT. genua is a member of the Bundesdruckerei Group.
IBM Resilient’s mission is to help organizations thrive in the face of any cyberattack or business crisis. The industry’s leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, more intelligently, and more efficiently. The Resilient IRP is the industry’s only complete IR orchestration and automation platform, enabling teams to integrate and align people, processes, and technologies into a single incident response hub. With Resilient, security teams can have best-in-class response capabilities. IBM Resilient has more than 150 global customers, including 50 of the Fortune 500, and hundreds of partners globally. Learn more at www.resilientsystems.com.
German network manufacturer LANCOM Systems focuses on secure, reliable and sustainable infrastructure solutions for the B2B markets: The broad portfolio for cross-site networking and the central cloud-based network management system are developed and produced in Germany. Backdoor freedom is a key feature of the products. The quality label “IT Security Made in Germany” certifies trustworthiness and a high level of security.
Link11 is a European IT security vendor specializing in DDoS Protection, headquartered in Frankfurt, Germany with operations in the UK, US, Switzerland and Austria. The cloud-based DDoS Protection Platform from Link11 is entirely built using proprietary, patent pending technology. The state of the art platform uses Artificial Intelligence and enables Link11 to protect single websites as well as critical IP infrastructures from all types of DDoS attacks, which in turn gives customers the peace of mind to focus on their core business. Link11 protects some of Europe’s largest media, financial, e-commerce and online organizations. The company has already won numerous awards and continues to innovate to ensure that Link11 is always one step ahead of the game. The company’s strategic scrubbing centers in Frankfurt, Amsterdam, London, Zurich, Los Angeles, Miami and New York ensure resilience, performance and no single point of failure. Link11 has built a global network and continues to expand with locations in Asia and the Middle East in the near future.
For years, NetDescribe has been supplying critical information to those responsible for making agile decisions in the security and IT operations fields through the collection and analysis of machine data (IT events). Based on these machine data, NetDescribe provides an additional foundation for compliance traceability, which has to be guaranteed throughout all actions. Today, when IT is no longer an actor in digitisation but rather it's active designer, NetDescribe gets the maximum value out of these valuable data for the customers. In order to be able to collect and analyse all information, NetDescribe offers its own development, Event2Log, in addition to solutions by state-of-the-art technology providers such as Splunk. The highly scalable solutions offer dynamic monitoring for compliance and business processes as well as cloud applications in real time.
Riverbed, at more than $1 billion in annual revenue, is the leader in Application Performance Infrastructure, delivering the most complete platform for the hybrid enterprise to ensure applications perform as expected, data is always available when needed, and performance issues can be proactively detected and resolved before impacting business performance. Riverbed enables hybrid enterprises to transform application performance into a competitive advantage by maximizing employee productivity and leveraging IT to create new forms of operational agility. Riverbed’s 28,000+ customers include 97% of the Fortune 100 and 98% of the Forbes Global 100. Learn more at www.riverbed.com.
Thycotic, a global leader in IT security, is the fastest growing provider of Privilege Management solutions that protect an organization’s most valuable assets from cyber-attacks and insider threats. Thycotic secures privileged account access for more than 7,500 organizations worldwide, including Fortune 500 enterprises. Thycotic’s award winning Privilege Management Security solutions minimize privileged credential risk, limit user privileges, and control applications on endpoints and servers. Thycotic was founded in 1996 with corporate headquarters in Washington, D.C. and global offices in the U.K. and Australia. For more information, please visit www.thycotic.com.