exhibitors.gisec.ae Open in urlscan Pro
35.154.23.244  Public Scan

Submitted URL: https://u29446657.ct.sendgrid.net/ls/click?upn=u001.qzs8DdJF6nlg8j0gDS59qzsWJ5IptC5YIUpjLb2J6V7w0mhtrzYabWy4pCM4IgXdnPUZbIKKpoYPg7...
Effective URL: https://exhibitors.gisec.ae/gisec-global-2024/Exhibitor?elqTrackId=0B07FD074CC7AB86B35BF11DE193D96D&elqTrack=true
Submission: On April 16 via api from AE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

BOOK A STAND
REGISTER TO VISIT
Country All AfghanistanAland IslandsAlbaniaAlgeriaAmerican
SamoaAndorraAngolaAnguillaAntigua &
BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia
and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean
TerritoryBruneiBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape
VerdeCaribbean NetherlandsCayman IslandsCentral African RepublicChadChagos
IslandsChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongo,
Democratic Republic Of TheCongo, Republic of theCook IslandsCosta RicaCote
d'Ivoire (Ivory Coast)CroatiaCubaCuracaoCyprusCzech
RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl
SalvadorEquatorial GuineaEritreaEstoniaEswatiniEthiopiaFalkland IslandsFaroe
IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaFrench Southern
TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard
and McDonald IslandsHondurasHong Kong Special Administrative
RegionHungaryIcelandIndiaIndonesiaIranIraqIsle of
ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKenyaKiribatiKorea, Democratic
People's Republic ofKorea, Republic
OfKosovoKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacau
Special Administrative ZoneMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall
IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesiaMoldovaMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNetherlands
AntillesNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorth
MacedoniaNorthern Mariana
IslandsNorwayOmanOtherPakistanPalauPalestinePanamaPapua New
GuineaParaguayPeruPhilippinesPitcairn IslandsPolandPortugalPuerto
RicoQatarRepublic of IrelandReunionRomaniaRussian FederationRwandaSaint
BarthélemySaint HelenaSaint Kitts & NevisSaint LuciaSaint Martin (France)Saint
Martin (Netherlands)Saint Pierre & MiquelonSaint Vincent and GrenadinesSamoaSan
MarinoSao Tome and PríncipeSaudi ArabiaSenegalSerbiaSeychellesSierra
LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia
and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and
Jan Mayen IslandsSwedenSwitzerlandSyriaTaiwan
(R.O.C.)TajikistanTanzaniaThailandTimor-LesteTogoTokelauTongaTrinidad &
TobagoTunisiaTürkiyeTurkmenistanTurks and Caicos
IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited States Minor
Outlying IslandsUnited States of AmericaUruguayUzbekistanVanuatuVatican
CityVenezuelaVietnamVirgin Islands (British)Virgin Islands (U.S.)Wallis &
FutunaYemenZambiaZimbabwe
Business Continuity / Incident ResponseData DiscoveryData Loss (Leakage)
Prevention (DLP)Data MaskingData ProtectionData SecurityGDPR
ComplianceGovernance/Compliance ManagementPrivacy & GRCRisk ManagementSecurity
Incident Management and ResponseVulnerability ManagementAsset
ManagementAutomotive Cyber SecurityCyber PhysicalEmbedded SecurityEnterprise
BrowserIndustrial Security (ICS/SCADA Security)Internet of Things (IoT)
SecurityIOT/OT SECURITYPervasive Trust ServicesPrinting and Business
SolutionsCommunication Network SolutionsData-in-Motion/Transit (Network)
Encryption and VPNDDoS ProtectionFirewall Configuration and
ManagementFirewallsInfrastructure Network & SecurityInternet SecurityIntrusion
Prevention Systems (and Intrusion Detection Systems)IP TechnologyNAC (Network
Admission Contol)Network - Equipments, components and managementNetwork - Test &
Measurement equipmentsNetwork Access ControlNetwork Behavior Analysis and
Anomaly DetectionNetwork ComponentsNetwork Firewall (includes Next Generation
Firewalls)Network Monitoring and ForensicsNetwork SecuritySASESecure File
TransferSecure NetworkingSecurity Configuration ManagementSecurity Information
and Event Management (and Log Management)Security Operations Automation and
OrchestrationSSL and Digital Certificate Authority and ManagementThreat
Intelligence and Signature FeedsTransport Access ControlVOIP SolutionsWeb
Application FirewallWireless Intrusion Detection SystemAccess Management &
AuthenticationAuthentication (User Authentication, Biometric Authentication and
PKI)BiometricsBug Bounty PlatformCONSULTINGEducation & TrainingFraud
PreventionIDENTITYIdentity and Access ManagementIdentity Theft DetectionPassword
ManagerPenetration TestingSECOPS/SIEMServices
MDR/MSSPSoar/AutomationAnti-Malware, Anti-Spam & Anti-Virus and E-Mail
securityAPI/WAFApplication ControlApplication integration and
infrastructureApplication Security, Testing & ControlApplied
SecurityAppsec/ASTAutomationAutomation, BotsBehavior Analytics (User and
Entity)Big Data SecurityBrowser Security (Secure Virtual Browser and Remote
Browser)Cloud Sec (INFRA)Cloud SecurityCryptographyCyber Maneuver (Network
Masking)Cyber Threat HuntingData Analytics and AutomationDatabase
SecurityDeception-Based SecurityDigital Forensic Investigation and Computer
ForensicsEncryptionEndpoint Protection and Anti-virusEndpoint Threat Detection
and ResponseFile Content SecurityMalware Detection and AnalysisManaged Security
ServicesManaged ServicesMobile Data ProtectionMobile Device ManagementPatch
Configuration and ManagementPayment SecurityPlatform SecuritySoftware
SupplychainSpecialized Threat Analysis and ProtectionTrusted Computing, Cross
Domain Security and Multi Level SecurityWeb AppSec
Product Sectors

Data Risk & ComplianceBusiness Continuity / Incident ResponseData DiscoveryData
Loss (Leakage) Prevention (DLP)Data MaskingData ProtectionData SecurityGDPR
ComplianceGovernance/Compliance ManagementPrivacy & GRCRisk ManagementSecurity
Incident Management and ResponseVulnerability ManagementHardwareAsset
ManagementAutomotive Cyber SecurityCyber PhysicalEmbedded SecurityEnterprise
BrowserIndustrial Security (ICS/SCADA Security)Internet of Things (IoT)
SecurityIOT/OT SECURITYPervasive Trust ServicesPrinting and Business
SolutionsNetworkCommunication Network SolutionsData-in-Motion/Transit (Network)
Encryption and VPNDDoS ProtectionFirewall Configuration and
ManagementFirewallsInfrastructure Network & SecurityInternet SecurityIntrusion
Prevention Systems (and Intrusion Detection Systems)IP TechnologyNAC (Network
Admission Contol)Network - Equipments, components and managementNetwork - Test &
Measurement equipmentsNetwork Access ControlNetwork Behavior Analysis and
Anomaly DetectionNetwork ComponentsNetwork Firewall (includes Next Generation
Firewalls)Network Monitoring and ForensicsNetwork SecuritySASESecure File
TransferSecure NetworkingSecurity Configuration ManagementSecurity Information
and Event Management (and Log Management)Security Operations Automation and
OrchestrationSSL and Digital Certificate Authority and ManagementThreat
Intelligence and Signature FeedsTransport Access ControlVOIP SolutionsWeb
Application FirewallWireless Intrusion Detection SystemPeopleAccess Management &
AuthenticationAuthentication (User Authentication, Biometric Authentication and
PKI)BiometricsBug Bounty PlatformCONSULTINGEducation & TrainingFraud
PreventionIDENTITYIdentity and Access ManagementIdentity Theft DetectionPassword
ManagerPenetration TestingSECOPS/SIEMServices
MDR/MSSPSoar/AutomationSoftwareAnti-Malware, Anti-Spam & Anti-Virus and E-Mail
securityAPI/WAFApplication ControlApplication integration and
infrastructureApplication Security, Testing & ControlApplied
SecurityAppsec/ASTAutomationAutomation, BotsBehavior Analytics (User and
Entity)Big Data SecurityBrowser Security (Secure Virtual Browser and Remote
Browser)Cloud Sec (INFRA)Cloud SecurityCryptographyCyber Maneuver (Network
Masking)Cyber Threat HuntingData Analytics and AutomationDatabase
SecurityDeception-Based SecurityDigital Forensic Investigation and Computer
ForensicsEncryptionEndpoint Protection and Anti-virusEndpoint Threat Detection
and ResponseFile Content SecurityMalware Detection and AnalysisManaged Security
ServicesManaged ServicesMobile Data ProtectionMobile Device ManagementPatch
Configuration and ManagementPayment SecurityPlatform SecuritySoftware
SupplychainSpecialized Threat Analysis and ProtectionTrusted Computing, Cross
Domain Security and Multi Level SecurityWeb AppSec
Start-Up Exhibitors

All ABCDEFGHIJKLMNOPQRSTUVWXYZ

12M TECH

Stand No- C30-14, Hall 7

Türkiye

12M has been providing services and developing products on open-source
ecosystem, customized and tightened operating systems and information systems.

 * Network
 * Hardware
 * Software
 * Data Risk & Compliance
 * People
 * Business Continuity / Incident Response
 * Data Discovery
 * Data Loss (Leakage) Prevention (DLP)
 * Data Masking
 * Data Protection

Read More
VIEW PROFILE


3CORESEC

Stand No- F32, Hall 3

Portugal

3CORESec specialises in the development of tools, techniques and platforms for
adversary detection.

 * Network
 * Software
 * People
 * Firewalls
 * Infrastructure Network & Security
 * Internet Security
 * Intrusion Prevention Systems (and Intrusion Detection Systems)
 * Network Security
 * SECOPS/SIEM
 * Services MDR/MSSP

Read More
VIEW PROFILE


A SOLUTIONS LLC

Stand No- SP142, Hall 2

United Arab Emirates

A company that focus on cybersecurity solutions, OSINT & Online Reputation
Management.

 * Network
 * Software
 * Data Risk & Compliance
 * Data Security
 * Data Protection
 * Data Loss (Leakage) Prevention (DLP)
 * Governance/Compliance Management
 * Privacy & GRC
 * Risk Management
 * Security Incident Management and Response

Read More
VIEW PROFILE


ACTIVEBYTES INNOVATIONS LLC

Stand No- SP154-SP155-SP169-SP172, Hall 3

United Arab Emirates

ActiveBytes Innovations offers an unbeatable security portfolio to protect
customers across endpoints, infrastructure, applications, & in the cloud.

 * Data Risk & Compliance
 * Data Security
 * Governance/Compliance Management
 * Privacy & GRC

VIEW PROFILE


ACUTIV

Stand No- SP136, Hall 3

United Arab Emirates

Join ACUTIV on the forefront of cybersecurity, where innovation meets
protection, and together, let's secure a digital future.

 * Network
 * Hardware
 * Software
 * Data Risk & Compliance
 * People
 * Data Loss (Leakage) Prevention (DLP)
 * Data Security
 * Privacy & GRC
 * Trusted Computing, Cross Domain Security and Multi Level Security
 * Vulnerability Management

Read More
VIEW PROFILE


AEGISTER S.P.A.

Stand No- SP12, Hall 3

Italy

Aegister S.p.A. is an academic spinoff, it develops and markets integrated
cybersecurity solutions for small and medium-sized enterprises.

 * Network
 * Software
 * Data Risk & Compliance
 * People
 * Governance/Compliance Management
 * Risk Management
 * Vulnerability Management
 * Intrusion Prevention Systems (and Intrusion Detection Systems)
 * IP Technology
 * Network Firewall (includes Next Generation Firewalls)

Read More
VIEW PROFILE


AEROSEA EXHIBITIONS SDN BHD

Stand No- E45, Hall 3

Malaysia

CyberDSA aspires to be the leading event, serving key stakeholders who are
protecting national, public and business interests in cyberspace.


VIEW PROFILE


AI EDGELABS

Stand No- G20, Hall 4

United States of America

AI EdgeLabs delivers the next generation of cybersecurity, focused solely on the
Edge and connected IoT environments.

 * Network
 * Hardware
 * Software
 * Data Risk & Compliance
 * People
 * Data Protection
 * Data Security
 * Privacy & GRC
 * Security Incident Management and Response
 * Embedded Security

Read More
VIEW PROFILE


AISHIELD - POWERED BY BOSCH

Stand No- P54, Hall 6

India

AIShield: a Bosch startup and a Gartner-recognized leader pioneering AI Security
with over 45 patents, ensuring AI systems are secure globally.

 * Network
 * Software
 * Data Risk & Compliance
 * People
 * Data Loss (Leakage) Prevention (DLP)
 * Data Security
 * Governance/Compliance Management
 * Privacy & GRC
 * Risk Management
 * Security Incident Management and Response

Read More
VIEW PROFILE


AKAMAI TECHNOLOGIES LIMITED (DUBAI BRANCH)

Stand No- B94, Hall 8

United Arab Emirates

Akamai powers and protects life online. Leading companies worldwide choose
Akamai to build, deliver, and secure their digital experiences.

 * Network
 * Hardware
 * Software
 * Data Risk & Compliance
 * People
 * Business Continuity / Incident Response
 * Data Loss (Leakage) Prevention (DLP)
 * Data Protection
 * Data Security
 * Risk Management

Read More
VIEW PROFILE



© Copyright 2024   |  
Privacy Policy   |  
Terms & Conditions
Online Exhibitor Listing by Xporience   |   https://www.xporience.com/
×