exhibitors.gisec.ae
Open in
urlscan Pro
15.206.107.235
Public Scan
Submitted URL: https://appict.dwtcmarketing.com/e/er?utm_campaign=24032024_GISEC2024_Visprom8_inspireDarkStage_Arabic&utm_medium=email&utm_sourc...
Effective URL: https://exhibitors.gisec.ae/gisec-global-2024/Exhibitor?utm_campaign=24032024_GISEC2024_Visprom8_inspireDarkStage_Arabic&utm...
Submission: On March 24 via api from OM — Scanned from DE
Effective URL: https://exhibitors.gisec.ae/gisec-global-2024/Exhibitor?utm_campaign=24032024_GISEC2024_Visprom8_inspireDarkStage_Arabic&utm...
Submission: On March 24 via api from OM — Scanned from DE
Form analysis
0 forms found in the DOMText Content
BOOK A STAND REGISTER TO VISIT Country All AfghanistanAland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntigua & BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBruneiBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCaribbean NetherlandsCayman IslandsCentral African RepublicChadChagos IslandsChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongo, Democratic Republic Of TheCongo, Republic of theCook IslandsCosta RicaCote d'Ivoire (Ivory Coast)CroatiaCubaCuracaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEswatiniEthiopiaFalkland IslandsFaroe IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard and McDonald IslandsHondurasHong Kong Special Administrative RegionHungaryIcelandIndiaIndonesiaIranIraqIsle of ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKenyaKiribatiKorea, Democratic People's Republic ofKorea, Republic OfKosovoKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacau Special Administrative ZoneMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesiaMoldovaMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNetherlands AntillesNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorth MacedoniaNorthern Mariana IslandsNorwayOmanOtherPakistanPalauPalestinePanamaPapua New GuineaParaguayPeruPhilippinesPitcairn IslandsPolandPortugalPuerto RicoQatarRepublic of IrelandReunionRomaniaRussian FederationRwandaSaint BarthélemySaint HelenaSaint Kitts & NevisSaint LuciaSaint Martin (France)Saint Martin (Netherlands)Saint Pierre & MiquelonSaint Vincent and GrenadinesSamoaSan MarinoSao Tome and PríncipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and Jan Mayen IslandsSwedenSwitzerlandSyriaTaiwan (R.O.C.)TajikistanTanzaniaThailandTimor-LesteTogoTokelauTongaTrinidad & TobagoTunisiaTürkiyeTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited States Minor Outlying IslandsUnited States of AmericaUruguayUzbekistanVanuatuVatican CityVenezuelaVietnamVirgin Islands (British)Virgin Islands (U.S.)Wallis & FutunaYemenZambiaZimbabwe Business Continuity / Incident ResponseData DiscoveryData Loss (Leakage) Prevention (DLP)Data MaskingData ProtectionData SecurityGDPR ComplianceGovernance/Compliance ManagementPrivacy & GRCRisk ManagementSecurity Incident Management and ResponseVulnerability ManagementAsset ManagementAutomotive Cyber SecurityCyber PhysicalEmbedded SecurityEnterprise BrowserIndustrial Security (ICS/SCADA Security)Internet of Things (IoT) SecurityIOT/OT SECURITYPervasive Trust ServicesPrinting and Business SolutionsCommunication Network SolutionsData-in-Motion/Transit (Network) Encryption and VPNDDoS ProtectionFirewall Configuration and ManagementFirewallsInfrastructure Network & SecurityInternet SecurityIntrusion Prevention Systems (and Intrusion Detection Systems)IP TechnologyNAC (Network Admission Contol)Network - Equipments, components and managementNetwork - Test & Measurement equipmentsNetwork Access ControlNetwork Behavior Analysis and Anomaly DetectionNetwork ComponentsNetwork Firewall (includes Next Generation Firewalls)Network Monitoring and ForensicsNetwork SecuritySASESecure File TransferSecure NetworkingSecurity Configuration ManagementSecurity Information and Event Management (and Log Management)Security Operations Automation and OrchestrationSSL and Digital Certificate Authority and ManagementThreat Intelligence and Signature FeedsTransport Access ControlVOIP SolutionsWeb Application FirewallWireless Intrusion Detection SystemAccess Management & AuthenticationAuthentication (User Authentication, Biometric Authentication and PKI)BiometricsBug Bounty PlatformCONSULTINGEducation & TrainingFraud PreventionIDENTITYIdentity and Access ManagementIdentity Theft DetectionPassword ManagerPenetration TestingSECOPS/SIEMServices MDR/MSSPSoar/AutomationAnti-Malware, Anti-Spam & Anti-Virus and E-Mail securityAPI/WAFApplication ControlApplication integration and infrastructureApplication Security, Testing & ControlApplied SecurityAppsec/ASTAutomationAutomation, BotsBehavior Analytics (User and Entity)Big Data SecurityBrowser Security (Secure Virtual Browser and Remote Browser)Cloud Sec (INFRA)Cloud SecurityCryptographyCyber Maneuver (Network Masking)Cyber Threat HuntingData Analytics and AutomationDatabase SecurityDeception-Based SecurityDigital Forensic Investigation and Computer ForensicsEncryptionEndpoint Protection and Anti-virusEndpoint Threat Detection and ResponseFile Content SecurityMalware Detection and AnalysisManaged Security ServicesManaged ServicesMobile Data ProtectionMobile Device ManagementPatch Configuration and ManagementPayment SecurityPlatform SecuritySoftware SupplychainSpecialized Threat Analysis and ProtectionTrusted Computing, Cross Domain Security and Multi Level SecurityWeb AppSec Product Sectors Data Risk & ComplianceBusiness Continuity / Incident ResponseData DiscoveryData Loss (Leakage) Prevention (DLP)Data MaskingData ProtectionData SecurityGDPR ComplianceGovernance/Compliance ManagementPrivacy & GRCRisk ManagementSecurity Incident Management and ResponseVulnerability ManagementHardwareAsset ManagementAutomotive Cyber SecurityCyber PhysicalEmbedded SecurityEnterprise BrowserIndustrial Security (ICS/SCADA Security)Internet of Things (IoT) SecurityIOT/OT SECURITYPervasive Trust ServicesPrinting and Business SolutionsNetworkCommunication Network SolutionsData-in-Motion/Transit (Network) Encryption and VPNDDoS ProtectionFirewall Configuration and ManagementFirewallsInfrastructure Network & SecurityInternet SecurityIntrusion Prevention Systems (and Intrusion Detection Systems)IP TechnologyNAC (Network Admission Contol)Network - Equipments, components and managementNetwork - Test & Measurement equipmentsNetwork Access ControlNetwork Behavior Analysis and Anomaly DetectionNetwork ComponentsNetwork Firewall (includes Next Generation Firewalls)Network Monitoring and ForensicsNetwork SecuritySASESecure File TransferSecure NetworkingSecurity Configuration ManagementSecurity Information and Event Management (and Log Management)Security Operations Automation and OrchestrationSSL and Digital Certificate Authority and ManagementThreat Intelligence and Signature FeedsTransport Access ControlVOIP SolutionsWeb Application FirewallWireless Intrusion Detection SystemPeopleAccess Management & AuthenticationAuthentication (User Authentication, Biometric Authentication and PKI)BiometricsBug Bounty PlatformCONSULTINGEducation & TrainingFraud PreventionIDENTITYIdentity and Access ManagementIdentity Theft DetectionPassword ManagerPenetration TestingSECOPS/SIEMServices MDR/MSSPSoar/AutomationSoftwareAnti-Malware, Anti-Spam & Anti-Virus and E-Mail securityAPI/WAFApplication ControlApplication integration and infrastructureApplication Security, Testing & ControlApplied SecurityAppsec/ASTAutomationAutomation, BotsBehavior Analytics (User and Entity)Big Data SecurityBrowser Security (Secure Virtual Browser and Remote Browser)Cloud Sec (INFRA)Cloud SecurityCryptographyCyber Maneuver (Network Masking)Cyber Threat HuntingData Analytics and AutomationDatabase SecurityDeception-Based SecurityDigital Forensic Investigation and Computer ForensicsEncryptionEndpoint Protection and Anti-virusEndpoint Threat Detection and ResponseFile Content SecurityMalware Detection and AnalysisManaged Security ServicesManaged ServicesMobile Data ProtectionMobile Device ManagementPatch Configuration and ManagementPayment SecurityPlatform SecuritySoftware SupplychainSpecialized Threat Analysis and ProtectionTrusted Computing, Cross Domain Security and Multi Level SecurityWeb AppSec Start-Up Exhibitors All ABCDEFGHIJKLMNOPQRSTUVWXYZ 360 CYBERTRUST Stand No- P20, Hall 8 Italy We provide advanced cybersecurity products and services to protect your organization from threats while meeting Compliance requirements. * Network * Software * Data Risk & Compliance * People * Business Continuity / Incident Response * Data Loss (Leakage) Prevention (DLP) * Data Protection * Data Security * GDPR Compliance * Governance/Compliance Management Read More VIEW PROFILE 3CORESEC Stand No- F32, Hall 3 Portugal 3CORESec specialises in the development of tools, techniques and platforms for adversary detection. * Network * Software * People * Firewalls * Infrastructure Network & Security * Internet Security * Intrusion Prevention Systems (and Intrusion Detection Systems) * Network Security * SECOPS/SIEM * Services MDR/MSSP Read More VIEW PROFILE A SOFTWARE PUBLISHER Stand No- D87, Hall 6 Israel Where Identity Protection Has Never Gone Before On-prem, cloud, humans or machines, and everything in between * Data Risk & Compliance * People * Trusted Computing, Cross Domain Security and Multi Level Security * Authentication (User Authentication, Biometric Authentication and PKI) * IDENTITY * Identity and Access Management * Password Manager VIEW PROFILE A SOLUTIONS LLC Stand No- SP142, Hall 2 United Arab Emirates A company that focus on cybersecurity solutions, OSINT & Online Reputation Management. * Network * Software * Data Risk & Compliance * Data Security * Data Protection * Data Loss (Leakage) Prevention (DLP) * Governance/Compliance Management * Privacy & GRC * Risk Management * Security Incident Management and Response Read More VIEW PROFILE ACTIVEBYTES INNOVATIONS LLC Stand No- SP154-SP155-SP169-SP172, Hall 2 United Arab Emirates ActiveBytes Innovations offers an unbeatable security portfolio to protect customers across endpoints, infrastructure, applications, & in the cloud. * Data Risk & Compliance * Data Security * Governance/Compliance Management * Privacy & GRC VIEW PROFILE ACUTIV Stand No- SP136, Hall 2 United Arab Emirates Join ACUTIV on the forefront of cybersecurity, where innovation meets protection, and together, let's secure a digital future. * Network * Hardware * Software * Data Risk & Compliance * People * Data Loss (Leakage) Prevention (DLP) * Data Security * Privacy & GRC * Trusted Computing, Cross Domain Security and Multi Level Security * Vulnerability Management Read More VIEW PROFILE AEGISTER S.P.A. Stand No- SP12, Hall 3 Italy Aegister S.p.A. is an academic spinoff, it develops and markets integrated cybersecurity solutions for small and medium-sized enterprises. * Network * Software * Data Risk & Compliance * People * Governance/Compliance Management * Risk Management * Vulnerability Management * Intrusion Prevention Systems (and Intrusion Detection Systems) * IP Technology * Network Firewall (includes Next Generation Firewalls) Read More VIEW PROFILE AI EDGELABS Stand No- G20, Hall 4 United States of America AI EdgeLabs delivers the next generation of cybersecurity, focused solely on the Edge and connected IoT environments. * Network * Hardware * Software * Data Risk & Compliance * People * Data Protection * Data Security * Privacy & GRC * Security Incident Management and Response * Embedded Security Read More VIEW PROFILE AISHIELD - POWERED BY BOSCH Stand No- P54, Hall 6 India AIShield: a Bosch startup and a Gartner-recognized leader pioneering AI Security with over 45 patents, ensuring AI systems are secure globally. * Network * Software * Data Risk & Compliance * People * Data Loss (Leakage) Prevention (DLP) * Data Security * Governance/Compliance Management * Privacy & GRC * Risk Management * Security Incident Management and Response Read More VIEW PROFILE AKAMAI TECHNOLOGIES LIMITED (DUBAI BRANCH) Stand No- B94, Hall 8 United Arab Emirates Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences. * Network * Hardware * Software * Data Risk & Compliance * People * Business Continuity / Incident Response * Data Loss (Leakage) Prevention (DLP) * Data Protection * Data Security * Risk Management Read More VIEW PROFILE © Copyright 2024 | Privacy Policy | Terms & Conditions Online Exhibitor Listing by Xporience | https://www.xporience.com/ ×