Whats on at Infosecurity Europe 2013
Tuesday 23rd April
Opening Keynote: The UK Cyber Security Strategy: Opportunities and challenges for the Cyber Security Sector
10:00 – 10:25 Chloe Smith, Minister for Political and Constitutional Reform, Cabinet Office will give the opening keynote on UK Cyber Security Strategy and the opportunities and challenges for the Cyber Security Sector.
11:15-12:15 Andrew Rose, Principal analyst at Forrester Research will lead a panel looking at risk and how to foster a risk-based approach to information security along with Amar Singh, CISO for News International; Michael Paisley, Head of operational risk at Santander, Serge Baudot, Head of Information Security & Business Continuity at EasyJet and Bob Mann, Chief Security Officer at OFGEM.
The 2012 Cyber Security Breaches Survey Official Launch
14:00 – 14:45 Chris Potter, Partner at PricewaterhouseCoopers will be hold the launch the results of the 2013 Cyber Security Breaches Survey Official, on Tuesday 23rd April at 13:45, which will take a look at the scale and cost security breaches to the UK in the last year.
Wednesday 24th April
10:00- 11:00 Shlomo Kramer, President and CEO of Imperva (founder checkpoint) and Mykko Hypponen, Chief Research Officer at F-Secure will join the Infosecurity Europe Hall of Fame for 2013, in recognition as thought leaders and their long term contribution to information security.
Panel discussion: Battling Cybercrime: Attack techniques, motivations and threats and how to defend against them
14:30 – 15:30 Adrian Price, Head of Information Security at the Ministry of Defence, Arnie Bates, Head of Information Security at Scotia Gas Networks, DS Charlie McMurdie, Head of Police Central e-Crime Unit at the Metropolitan Police and Scott Cruse, Legal Attache of the FBI will look at who is the cybercriminal and gain insight into the motivations of the cyber criminal.
Thursday 25th April
10:00 -11:00 Dave Clemente from Chatham House will chair the panel on the challenges around security national infrastructure and provide insight into how to implement an effective cyber security strategy with John Milne, Head of Resilience at the Bank of England, Mark Jones, CISO of BAA and Peter Gibbons, CISO at Network Rail.
Please note all Press Conferences take place in the Press Briefing Room next to the Press Office on the first floor. Each day you are invited to attend the Press Lunch at 1pm in the Press Office.
EXHIBITOR NEWS AND PRODUCT LAUNCHES
(ISC)² UK Ltd [P91] – (ISC)2® has added a new domain – Supply Chain and Software Acquisition – to its globally recognised Certified Secure Software Lifecycle Professional (CSSLP) credential exam, to address the growing threats arising from widening security gaps in the software supply chain. Application vulnerability is the top security concern of infosecurity professionals, (ISC)2 research finds.
3M (UK) Plc [E92] – 3M privacy filters and protection films provide instant on-screen security for mobile professionals.
3M will be showcasing its latest range of privacy filters and protection films for mobile devices, including tablets, smartphones and laptops. A recent Ponemon study revealed employees are 50 per cent less productive when their visual privacy is at risk. See how 3M privacy solutions can help safeguard your organisations information and productivity.
Spokesperson: Rob Green, Marketing Executive, 3M Speciality Display & Projection Division
Accellion, Inc. [E42] – Accellion Leapfrogs Competition with Industry’s First Enterprise-Grade Mobile Productivity Suite to Securely Create, Edit, Sync and Share Microsoft Files on Mobile Devices
Accellion’s Mobile Productivity Suite is an integrated solution within the Accellion Mobile App that allows users to securely create, edit, view, and collaborate on Microsoft® files all within Accellion’s secure container on iOS devices. This eliminates enterprise data leak risks from employees opening, editing and sharing documents using unapproved consumer apps. The Accellion Mobile App also supports secure sharing of photos from a mobile device’s camera-roll or library. This is a critical capability for field workers in many industries who take photos but are at risk for overlooking security and compliance requirements for storing and sharing images.
Accellion Receives Highest Rating in Leading Analyst Firm’s Enterprise File Synchronization and Sharing MarketScope Report
Accellion has received a “Strong Positive” rating in Gartner’s MarketScope: “Enterprise File Synchronization and Sharing” based on evaluation of its Accellion Secure Mobile File sharing solutions. Evaluation criteria included: Overall Viability, Product/Service, Sales Execution/Pricing, Customer Experience, Market Strategy, Offering (Product) Strategy and Innovation.
The MarketScope notes that “enterprise file synchronization and sharing (EFSS) offerings enable productivity and collaboration for mobile workers who use multiple devices, such as smartphones and media tablets, in addition to PCs. Organizations must deploy EFSS services to secure enterprise information assets. Failure to provide these capabilities will subject organizations to information leakage threats caused by users who move data through uncontrolled personal cloud services.”
AccelOps, Inc. [J79] – AccelOps has expanded its compliance reporting capabilities to include Good Practice Guide 13 (GPG13) requirements. This enables government departments and agencies to comply with the 12 Protective Monitoring Controls established by the UK Cabinet Office as part of the Security Policy Framework designed to reduce risk and secure confidential data.
ActivIdentity [D80] – The way in which organisations create, use and manage secure identities is changing – from mobile access control to NFC-enabled smartphones, identity management in the cloud and users’ desire for ‘frictionless’ security experiences. HID Global will be demonstrating the impact and influence these trends, and others, have on today’s security landscape.
Acumin Consulting Ltd. [B86] – Acumin are an Information Security and Information Risk Management recruitment organisation providing Permanent, Contract and Executive Search services to End Users, IT Security Vendors and Consultancies. Acumin are founders of the Risk and Network Threat Forum and the RANT Conference.
Agileise Ltd [B51] – Agileise Ltd will be showcasing CorreLog SIEM solutions, Total Device Endpoint Security and Data Loss Prevention products. CorreLog provides full function SIEM, logfile management and PCI DSS Compliance plus more with prices starting at £5K. Total Device solutions integrate tightly with Windows, Email, social media and hardware for complete security.
AhnLab [E20] – AhnLab – the biggest IT security company that you’ve never heard of.
AhnLab – the biggest IT security company that you’ve never heard with over 800 staff, will be using Infosecurity as their launch pad into the UK and EMEA. They are the biggest IT security company in South Korea, specialising in preventing APTs/anti-virus and anti malware detection. The company invests very heavily into security research and development, boasting a very large malware forensics team, and, as if that’s not enough, their founder recently ran for President of South Korea.
AhnLab have a number of products in the virus and spyware field and the AhnLab Security Emergency Response Center (ASEC) is a world-class emergency response organization composed of malicious code analysts and security experts. They monitor and respond to emergencies 24/7, protecting customers safely from malicious codes and security threats spreading around the world.
At the show the company will be carrying out live hacking demos on its stand, revealing the sophisticated techniques today’s hackers are utilising to engineer advanced malware so that it avoids detection by security appliance and will be giving away free Dummies guide to APTS.
AirWatch [H90] – AirWatch is the leader in enterprise-grade Mobile Device, Application and Content Management solutions designed to simplify mobility. AirWatch’s multi-tenant and highly scalable mobile security solution enables businesses to manage any device, anywhere in the world. AirWatch securely integrates personal devices in the enterprise, separating and securing corporate resources.
Algosec [D51] – AlgoSec (D51), the market leader for Network Security Policy Management, is showcasing the latest version of its Security Management Suite, featuring AlgoSec BusinessFlow as an integral component, delivering innovative, application-centric security policy management. The company is also presenting the findings of its State of Network Security 2013 survey.
Alienvault [K68] – AlienVault will be demonstrating its Virtual Appliance of the AV-USM, AlienVault have decided to provide a virtual appliance to their customers in order to address an underserved segment of the market – the mid-market. AlienVault wanted to make sure it could provide for these smaller companies and ensure they are also protected from attacks and hence have launched the virtual appliance, making it more affordable and accessible to these mid-market companies. Barmak Meftah, President & CEO of AlienVault will be at Infosecurity to discuss how the mid-market is underserved by security and Jaime Blasco – Head of Labs will also be available for interviews – he’s their vulnerability rock star – well worth meeting for an understanding on what’s actually happening at grass roots level.
APM Group [E94] – Certification for information assurance professionals – come and take our sample test on stand E94 and see if you’ve got what it takes to become a CESG certified InfoSec professional.
Also discussing our new ISO 27001 certification scheme. Improve your credentials and get certified.
Application Security, Inc. [E40] – Application Security Inc (AppSecInc) is the leading provider of Enterprise Database Security Solutions. We proactively secure Enterprise Databases at over 1300 Organizations worldwide. By securing Data at its source, AppSecInc solutions enable Organizations to more confidently extend their business with customers, partners and suppliers.
Avecto Ltd [E80] – Visit Stand E80 to see how Privilege Guard ePO edition enables organisations achieve comprehensive and flexible security management directly from within McAfee ePO. Join our educational session on stand throughout the show to understand how least privilege is now a key component of the enterprise security strategy.
BeCrypt Ltd [G40] – Becrypt is launching DISK Protect Windows 8 for Tablet, significantly extending the range of touch-screen tablets that run Becrypt’s full disk encryption solution. The solution includes on-screen, touch friendly pre-boot authentication, enabling login/authentication before the operating system boots, avoiding the issue of authenticating after a machine is already compromised.
BeyondTrust [D10] – BeyondTrust is offering media & analysts the first opportunity to meet Marc Maiffret in his role as the company’s CTO. An famous ex-hacker and previous advisor to the US Government on national security, Marc will be discussing why IT Professionals need to think like hackers to better protect their organisations.
Bit9 [H42] – Bit9 continuously monitors and records all activity on servers and endpoints to detect and stop cyberthreats that evade traditional security defenses. A cloud-based software reputation service combined with policy-driven application control and whitelisting provide unmatched security that’s easy to implement and manage and delivers immediate results.
Blackberry [E30] – EVisit the BlackBerry stand (E30) for an exclusive pre-launch preview of the new BlackBerry Q10 smartphone at Infosecurity Europe.
The new BlackBerry Q10 smartphone is the first BlackBerry 10 device with a physical keyboard. Publicly available in the next few weeks, get first-hand experience of our new flagship device on our stand with a chance to win one each day.
We’ll also be showcasing the business and security benefits of BlackBerry 10 – the completely re-engineered, re-invented, and re-designed mobile computing platform – and BlackBerry Enterprise Service 10, our enterprise mobility management solution which offers device management, security and app management for BlackBerry, IOS and Android devices all from one single console.
Blancco UK [N73] – Blancco, the global leader in data erasure and computer reuse solutions, has a product portfolio for erasing data from all IT assets including mobile devices. Visit Stand N66 to get a copy of our latest mobile white paper and find out about our Blancco Mobile product at Infosecurity Europe 2013.
Blue Coat Systems [D45] – Blue Coat Systems – provider of Web security and WAN optimisation solutions – will showcase its Mobile Device Security Service (MDS). This enables businesses to extend the boundaries of the security perimeter to iOS devices, which otherwise would be unprotected against Web-based threats and inadvertent data loss from unmanaged mobile browser applications.
Bromium UK Ltd [N98] – Better get ready, Bromium is re-inventing enterprise endpoint security with vSentry, which combines patented micro-virtualization software with hardware-enforced isolation to protect end users from 100% of all known and unknown malware attacks (validated by independent tests from NSS Labs). Visit K79 to see a demo.
Checkmarx [D53] – A week prior to the InfoSecurity Conference, we will be launching a dedicated website that will optimize the InfoSec experience with real time info on best talks and cool relevant news from speakers, vendors and press.
Due to its great success at the RSA2013, we decided to launch it even at the InfoSec Europe.
CheckSec Ltd. [O86] – Exhibiting for the first time at InfoSec, CheckSec, will be demonstrating Canopy, which allows users to easily manage security assessments, generate reports and gain insight from their security data.
CheckSec will also be making an announcement about an exciting partnership deal. Details available from Dave Ryan, email@example.com, +44 (0) 203 2827142.
CipherCloud [P80] – In response to increased cloud adoption across Europe, CipherCloud, the leader in cloud information protection, will be showcasing its open platform with comprehensive security controls including military grade encryption, tokenization, data loss prevention, malware protection, and activity monitoring that enable organisations to securely adopt cloud applications by eliminating the risks to data privacy, residency, security, and regulatory compliance. CipherCloud will be at Infosecurity 2013, stand P80.
Cloud Industry Forum  – If your CSP is not CIF certified, there is only one question to ask: Why Not?
The CIF Code of Practice provides a simple solution to enable end users to make informed and rational decisions about their migration partner.
Find out more on APM Group’s stand E94
Comodo [O83] – Comodo is Creating Trust Online through innovative software and services to protect and authenticate websites and content for Home & Home Office users, E-Commerce/Internet Merchants, Small to Medium Businesses, Large Enterprises, Institutions and Governments. Please be sure to stop by stand 083 in the new exhibitors section where we will be performing live demos for the release of ESM 3.0 and CCM 4.0.
Continuity Shop [D31] – Continuity Shop are delighted to be exhibiting at InfoSec 2013. As the leading providers of Business Continuity Training we took the decision in 2011 to develop an Information Security portfolio of training courses. Our BCS Certificate in Information Security has a 100% pass rate, 90% with Distinction.
CTWO Products AB [M95] – CTWO Products is a leading manufacturer of manageable secure flash solutions. SafeXs, CTWO’s flagship product is a feature rich hardware encrypted secure USB flash drive that is developed and produced in Sweden and deployed to organisations globally. CTWO will be demonstrating the latest version of SafeXs along with BlockMaster’s SafeConsole.
Cyber-Ark Software (UK) Limited [E50] – Cyber-Ark, the leader in Privileged Account Security & Compliance, will be available to discuss the changing security landscape and how privileged accounts are becoming the vector of choice for cyber-attackers. On-stand demos will showcase how Cyber-Ark’s solutions enable enterprises to defend against this growing threat.
Cyberarms Limited  – During this year’s InfoSecurity event, Cyberarms will present version 2.1 of its Intrusion Detection and Defense System (IDDS) for Windows Servers. The software protects Windows Servers 2008/2012 against brute force and dictionary attacks on the service level. Currently protected services are Remote Desktop, Outlook Web Access, SharePoint, Microsoft CRM, FTP and SMTP. Using IDDS, companies can protect internal systems as well as hosted servers (cloud hosting).
Cyberarms is an independent software vendor located in Germany, member of TeleTrust (“IT Security made in Germany”) and Microsoft Silver partner. For more information, please visit http://cyberarms.net
Cyberoam [F86] – Cyberoam is a leading global provider of network security solutions offering comprehensive security for networks of the future. Cyberoam’s Identity-based UTM appliances integrate multiple security features, over a single platform. Cyberoam is accredited with prestigious global standards and certifications like CheckMark UTM Level 5 Certification, ICSA Labs, IPv6 Gold logo
Deep-Secure Ltd. [B52] – Deep-Secure are choosing Infosec 2013 to launch a little red box that will give users unparalleled security protection from known and unknown forms of cyber attack. The Deep-Secure XML Guard uses a new technique called TransShipment, which extracts business data from email and sends it on its way in a safe and trusted format. The big plus for this new Guard is that customers no longer need to worry about signature updates and Zero Day attacks – when using the Guard they will become a thing of the past.
Want to see it in action? Stand B52 is where it’s at.
DESlock ltd [H40] – Whether you need to protect CD’s in the post or the memory stick in your pocket, email or whole hard drive, DESlock+ lets you encrypt your data wherever it is.
Visit us on Stand H40 to hear about our new ESET partnership and see our IoS version of DESlock+.
Digital Assurance [L60] – The security of Critical Infrastructure systems has predominantly focused upon IP networks in the past. Little consideration has been given to the ease with which these systems can be compromised wirelessly. Digital Assurance will look at how SDR equipment can be used to execute such an attack.
Domeny.pl sp. z o.o. [D32] – SSLGURU has launched a global service offering the widest choice of SSL certificates in the world – SSLGURU.com. It offers almost 120 SSL certificates of the global market. SSLGURU.com allows to check offer, e.g.: Symantec, Thawte, Comodo, GeoTrust. Last year has started offering the Reseller Partner Programme and robust API.
ECSC [G80] – EXCLUSIVE: Critically acclaimed author Ian Mann will launch his latest book, Hacking the Human II: The Adventures of a Social Engineer at Infosec – Stand G80. The much anticipated second book will be available exclusively to Infosec attendees for a special price of £15 (RRP £20).
Egress Software Technologies Ltd [E71] – Introducing the first CPA Foundation Grade Certified Email Encryption Product
Coming early 2013, Egress Software Technologies to offer the first CPA Grade Certified Email Encryption Product. For the first time Government organisations will have access to a comprehensive set of encryption tools that allow them to share RESTRICTED information outside of accredited networks.
Eol IT Services Ltd [K94] – Freedom Of Information exposes serious security holes in Public Sector:
Essex Headquartered data erasure and IT Security specialist EOL have commented on a study that suggests disposing of old and used mobile phones is presenting the public sector with a number of challenges.
e-skills UK [O94] – e-skills UK is the Sector Skills Council for Business and Information Technology, rated ‘outstanding’ in the latest relicensing of Sector Skills Councils. We work on behalf of employers to develop the software, internet, computer gaming, IT services, cyber security and business change expertise that the country needs to thrive in the global digital economy.
Evidian [K41] – “Control your Windows accesses via QRCode.Evidian introduces QRentry™, a complementary authentication method to fingervein authentication. Employees may scan a QR Code to access a laptop when a biometric reader is not available. Discover Evidian QRentry by visiting us on booth K41 with our partner Hitachi.”
F5 Networks [G50] – F5 will be demonstrating the world’s fastest and most scalable application delivery firewall solution – the first in the industry to unify a network firewall with traffic management, application security, user access management, and DNS security capabilities within an intelligent services framework. Contact firstname.lastname@example.org.
FireEye UK Ltd [J60] – FireEye the leader in next-generation threat protection and preventing zero-day and targeted APT attacks, will be available to discuss the evolving security landscape and recent events. FireEye will be able to explain why its unique signature-less solutions complement traditional defences, protecting across all major threat vectors.
FireHost Ltd [G85] – At Infosecurity Europe, secure cloud hosting company FireHost will reveal its first web application attack statistics for 2013. Each quarter, FireHost details the type and number of cyberattacks blocked by its servers in the Europe and the US. The ‘Superfecta’ report provides the latest insight into cybercrime tools and tactics.
First Option Technologies [J90] – First Option Technologies is set to launch the industry’s first pay as you go on demand technical support service.
Chairman, Tim Considine, said this flexible option will give channel and end users the benefit of the in-depth resources of industry specialists without the commitment to monthly contracts.
The new service will be officially launched at Infosecurity Europe 2013.
ForeScout Technologies, Inc. [J10] – Infosecurity Europe will provide the first UK opportunity to see ForeScout CounterACT’s bi-directional integration with mobile device management (MDM) offerings from AirWatch, Citrix, Fiberlink and MobileIron, via live demos on ForeScout’s stand J10. The combination of NAC plus MDM enables secure BYOD and enterprise mobility for organisations.
Fox IT [O60] – A group of independent firms have banded together to form the European Cyber Security Group (ECSG), a private consortium formed in response to the need for increased collaboration across borders to address the growing threats to Europe’s cyber security. It is now the largest independent cyber defense force in Europe.
Gemalto SA [D95] – “Gemalto supplies a broad range of authentication software and services to thousands of the world’s largest enterprises, and has been recognized as a Leader in Gartner’s 2013 Magic Quadrant for User Authentication. As part of Gemalto’s solution portfolio, we will demonstrate how we can secure companies’ executives and address security concerns raised by BYOD.”
GlobalSign [D90] – Auto Enrollment Enterprise Gateway provides organisations using Active Directory® with seamless digital certificate registration and provisioning, eliminating the resources needed to manage an on-premise CA. The Gateway is the latest example of GlobalSign delivering comprehensive services that focus on increasing value, reducing costs and improving the digital certificate management process. Visit us at Stand D90 for further information.
Globo International LLC [L87] – GLOBO recently launched the new product GO!Enterprise BOX – a complete mobility solution that is tailor made to meet the needs of small to medium enterprises. This is a ‘plug and play’ solution offering free secure storage and access to cloud-hosted Microsoft Exchange e-mail and PIM services.
Good Technology [E80] – Good Technology will be unveiling Good Trust in Europe, the security platform extending identity and access management to mobile devices. These include strong authentication and single sign on. Good Vault will also be introduced, the first identity and access management solution for secure email on iOS devices, incorporating two-factor authentication.
HANDD Business Solutions [C95] – A worrying trend has now become an epidemic. Organisations’ prime information assets are at risk. But there is a solution. GoAnywhere’s updated, unique and revolutionary Managed File Transfer solution from Linoma Software, distributed by HANDD Business Solutions, helps organisations meet compliance regulations by simplifying, automating and encrypting data transfers.
Hedgehog Security [K97] – “Gemalto supplies a broad range of authentication software and services to thousands of the world’s largest enterprises, and has been recognized as a Leader in Gartner’s 2013 Magic Quadrant for User Authentication. As part of Gemalto’s solution portfolio, we will demonstrate how we can secure companies’ executives and address security concerns raised by BYOD.”
Help Systems [M80] – Help/Systems, a world leader in security, systems management, and business intelligence software, recently completed the acquisition of Dartware LLC, a network management software company.
Dartware is the maker of InterMapper®, network monitoring, mapping, and alerting software for Mac®, Windows®, Linux®, and Solaris® platforms. InterMapper is known for its ease-of-use, affordability, and comprehensive feature set that provides real-time knowledge of an entire network’s health through visual maps. Visit M80 to see Intermapper!
HP LTD [C70] – HP Enterprise Security will be announcing two pieces of news at InfoSecurity 2013, with experts from market leaders ArcSight, Atalla, Fortify, TippingPoint and HP Security Services available for interview. The stand will also be lively with demos, an ElitePad up for gaps as part of an on-site survey and animated thought leadership videos.
IBM UK Ltd [H80] – At this year’s InfoSecurity IBM will be introducing its “Ready for Security Intelligence” program for channel partners.
Traditional IT infrastructure now has to combine with rapidly evolving mobile, cloud, and data platforms – Security Intelligence provides detailed situational awareness, helps detect and prevent advanced threats, and monitors policy violations.
IBM’s “Ready for IBM Security Intelligence” program demonstrates a commitment to these principles, and to applying them not just to IBM products, but beyond to a robust ISV ecosystem of channel partners.
If you would like to have a discussion with an IBM spokesperson or an IBM channel partner on the above program or any other aspect of IBM’s security strategy, contact Kathy Tyler on +44 (0)7771 976255
Icex Limited [C51] – As a leading IT recycling and asset management company in the UK, ADISA accredited ICEX offers a secure and flexible solution to IT asset management, environmental compliance and certified data erasure and destruction.
The services and processes we provide include:
• IT asset management
• secure on/off site data eradication
• full compliance documentation
iCritical [D20] – iCritical shows organisations how to make email downtime a thing of the past with always-on email continuity.
With always-on, users can access their emails 24×7 whether they’re in the office or on the move and even when the email server is out of action.
Online demonstrations available on stand D20.
Imation UK Ltd. [H41] – Imation IronKey™ Workspace W500 UK launch. This new ‘PC on a Stick™ offers a Windows 8 Enterprise, bootable USB drive that gives remote workers access to applications and data. Its hardware encryption helps avoid costly and damaging data breaches while optional device management ensures IT keeps control of mobile workspaces.
Imperva [F39] – Imperva will be releasing its latest report which has analysed real-world traffic from 60 web applications to identify attack patterns and whether crowd-sourcing could defend against such cyber attacks. Alongside this report, Imperva will also be announcing the release of SecureSphere 10.0. This release introduces important new innovations that raise the bar for securing data centre assets as well as web application threat protection by introducing a crowd-sourced threat intelligence service.
Imperva’s CEO, Shlomo Kramer and CTO, Amichai Shulman, will both be at the show to discuss these findings. Shlomo will also be inducted into the Hall of Fame for his contribution to the industry.
Inquisitive Systems [N60] – Inquisitive Systems is announcing the launch of Zonefox. ZoneFox data protection software provides protection from security breaches by monitoring where it’s most relevant: at the data level, providing immediate alerts to breaches of policy as well as forensic tracking for auditing and investigation. Utilising its unique foxDNA technology, ZoneFox has reduced the number of factors needed to investigate or be alerted from thousands to just five: User, Machine, Application, Object and Behaviour so that, unlike its competitors, ZoneFox records all activities in a lightweight and manageable manner. ZoneFox protects reputation, significantly reducing the risk of breach and the cost and impact should a breach occur.
Institute of Information Security Professionals [D40] – Join us on the IISP stand and to talk to us about developing your career as an Information Security Professional. If you are responsible for developing security professionals within your organisation, we can help you. Don’t miss our workshop on Thursday “the Security Professional of the Future”.
ISACA [k44] – ISACA, a global association of 100,000 IT governance, assurance, security and risk professionals, will be presenting the results of its APT study. The global survey of more than 1,500 security professionals found that more than one in five respondents said their enterprise has experienced an advanced persistent threat (APT) attack. According to the study, 94 percent say APTs represent a credible threat to national security and economic stability, yet most enterprises are still employing ineffective technologies to protect themselves. To download the free report, visit www.isaca.org/cybersecurity.
iStorage Limited [H22] – iStorage has received the Federal Information Processing Standard (FIPS) 140-2 Level 3 certification for its datAshur hardware encrypted USB flash drive. This critical and globally recognised metric demonstrates a device has passed a stringent set of testing procedures and meets the highest standard set for encryption algorithms and data protection.
IT Governance Ltd [F98] – IT Governance-owned Vigilant Software will demo the new version of vsRisk™ on stand F98. vsRisk™ is the only cybersecurity risk assessment tool in its price range to integrate out-of-the-box into an ISO27001 management system, allowing an automated, robust and extensive cybersecurity risk assessment of an organisation’s assets compliant with ISO27001.
IT Governance Ltd is launching the first dedicated ISO27005 Certified ISMS Risk Management training course in the UK. This course is the newest addition to the well-respected IT Governance ISO27001 certificated education programme. Delegates who successfully complete this Advanced Level course will be awarded the Certified ISMS Risk Manager (CIS RM) qualification, issued by the International Board for IT Governance Qualifications (IBITGQ).
Kaspersky Lab UK Ltd. [E41] – Kaspersky Lab, Stand E41 Come and meet the Kaspersky Lab UK, European and Global teams at InfoSec. Registrations are open for special presentation sessions each day, as well as one-to-one meetings with members of the Kaspersky team.
Global experts will be on hand to discuss areas such as the ever-changing threat landscape, evolution of IT, BYOD, best practice security management and of course, the new Kaspersky Endpoint Security for Business.
L-3 TRL Technology [C80] – L-3 TRL will be launching the latest additions to the CATAPAN family of CESG CAPS accredited Government Grade Network Security solutions, including secure IP voice & data for remote/home working, alongside the new Airtime Service packages, enabling mobile users to utilise satellite, Wi-Fi and cellular data to stay securely connected.
Lacoon Security Ltd [L92] – While iOS devices are presumably considered security-sound, Lacoon Mobile Security’s research has shown that 52% of devices compromised with spyphones were iOS-based. This new startup developed a platform-agnostic solution which uses on-device and network behavioral analysis to identify and thwart advanced mobile-targeted attacks – including mobile spyware and Wifi Man-in-the-Middle attacks.
Lancope Inc [K50] – At Infosecurity Europe Amrit Williams, CTO of Lancope will discuss Targeting the Kill Chain: A multifaceted approach to defence in depth in the seminar programme. Sophisticated, targeted attacks are prompting new thinking about risk and the defence of computer networks. Borrowed from military jargon, the “kill chain” refers to the steps an attacker goes through in order to execute a successful strike. The seminar will discuss each stage of the kill chain and present a multifaceted approach for detecting attacks at each stage and give an insight of the “kill chain” steps attackers use to infiltrate a network and why conventional controls are no longer enough to fend off advanced attacks. To help reduce risk it is important to know how to best apply existing security technologies to the kill chain and determine which additional tools and strategies are needed to combat advanced threats
Lancope will show case their Stealthwatch technology which helps organizations reduce operational risk by providing total visibility for all host communications and traffic across the network. By knowing what’s happening on the network, organisations can Identify suspicious and anomalous behaviour (i.e. policy violation, data leakage via mobile devices, dropbox, etc) and detect and resolve advanced threats (DDoS, Insider threats, malware). It also helps accelerate incident response – by identifying suspicious behaviour/attacks, companies can resolve security incidents more quickly, helping to reduce operational risk, reputation damage, etc. Stealthwatch will also enhance policy enforcement and regulatory compliance (PCI DSS for retail, etc) and improve forensic investigations to minimize potential risks.
Level 3 [K92] – For the first time at Infosecurity, Level 3 Communications is highlighting its Managed Security Services, which provide the expertise and support needed to detect, prevent and, if necessary, remediate any threats to businesses. With its unique ability to integrate security and network capabilities, Level 3 can correlate events across all global infrastructures and thus protect organisations against infected command-and-control servers.
Linoma Software  – Growing pressure to avoid the cost of data breaches combined with strong support from global partners such as HANDD Business Solutions has brought impressive growth in sales for U.S. company Linoma Software, and especially its GoAnywhere Managed File Transfer suite.
Mimecast [G20] – Mimecast (www.mimecast.com) is the leading supplier of cloud-based email management services – including archiving, continuity and security – for Microsoft Exchange, Hosted Exchange and Office 365. Whilst there are several vendors which offer services for email archiving, continuity and security, Mimecast is currently the only vendor to offer unified email management.
By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast strives to eliminate risk and complexity that plagues email management in business.
But are all clouds equal? No! So how can companies ensure that they are getting the benefits they are promised with their chosen vendor?
Come along to our session on ‘Good Cloud, Bad Cloud’ on Wednesday 24th April at 10.30-12.30 and 2-4pm, hosted by Mimecast’s chief scientist, Dr Nathaniel Borenstein, who will challenge attendees to examine their own cloud services, and the due diligence carried out during their procurement. You may just leave with a better insight into what cloud security really means!
Mozy [L41] – Loss, not theft, is the biggest threat to data, finds Mozy’s 3,500 person survey. Find out more about the research, the evolution of cloud backup and the importance of controlling data access from the exploding number of tablets and smartphones in the workplace on the Mozy stand.
My1login [L93] – The trend towards cloud, outsourcing and working from multiple devices means single sign on solutions are no longer fit for purpose.
my1login solves the problem of password management for business. With no installation required, my1login works with existing business passwords, allowing users to access websites with just one login.
my1login also enables users to securely share passwords where authorised whilst managers have an overview of password security across the organisation.
At Infosec 2013, my1login will officially launch its new business product and explain how complex, multi-layered encryption makes my1login the most secure password manager on the market.
nCircle Ltd [J85] – nCircle, the leader in information risk and security performance solutions which was recently bought by leading IT security vendor Tripwire, will be at the show revealing the results from a smart grid security survey recently conducted with EnergySec, a Department of Energy funded public-private partnership that works to enhance the cyber security of the electric infrastructure.
The research will look at security in the energy space and it will reveal whether industry experts believe security has been adequately addressed in smart grid deployments and whether smart meter installations have sufficient security controls to protect against false data injection.
nCircle will also be showcasing their unique benchmarking service which allows organisations to: measure their IT security performance, compare how their security measures up against their industry peers, and work out the effectiveness of security investments.
NSFOCUS Information Technology Co., Ltd. [H32] – NSFOCUS Information Technology Co., Ltd is a leading network and web security provider dedicated in DDoS (Distributed Denial of Services) mitigation and Web attack prevention solutions. Founded in 2000, NSFOCUS has been helping Datacenter/Hosting, telecom carrier, and many industries in defending against devastating DDoS attacks and ever-changing web attacks.
Obrela Security Industries [O65] – Next Generation Information Security Management. The whole nine-yards under one umbrella. Obrela Security Industries envisioned the future and built the Swordfish Platform just for you. Engineering that evaluates risks in real time and delivers measurable compliance, effective governance and efficient operations. Come see the future of Enterprise Security at Infosec London (Stand O65).
Onelogin Inc [L75] – OneLogin, who launched in the UK this past january, has a growing roster of UK customers including News Corp International, Xyratex, Reed Recruitment, Hailo, and London Chamber of Commerce. OneLogin will be demoing the first Federated Cloud Search product which enables you to securely search across public cloud applications like Box, Salesforce, GoogleApps, Zendesk and Dropbox.
Origin Storage [J81] – Origin is launching two new manufacturers at Infosec 13, Lucidport have a range of hardware encrypted key tokens,Chameleon and Chameleon Pro and IndependenceKey, with a family of highly secure data sharing keys offering encryption of entire disks. New additions to our range include the launch of DataLocker Skycrypt cloud based encryption and Wave’s cloud based management encryption solutions. Visit stand E63 to see more.
PaloAlto Networks [J30] – Palo Alto Networks – the leader in the Gartner magic quadrant for enterprise firewalls – will be showcasing new reports that reveal the ten applications harbouring 97% of all network threats, and the thousands of malware samples that are going undetected by traditional stateful inspection firewalls. Stand J30.
Pangea Systems Ltd [D33] – Pangea Systems, Platinum LANDesk Partner and LogPoint Partner, work with organisations globally to achieve improved business performance, reduced support costs and compliance management. We will be demonstrating LogPoint SIEM solutions as one adaptable, scalable and cost-effective package enabling quick troubleshooting turnaround time for security incidents across any IT infrastructure. Visit D33 for a personal demonstration.
Performanta pty [K90] – “As part of its European expansion, Performanta has opened its UK head office helping enterprise customers in the UK with their information security deployments. An already successful and established company in Africa, Performanta has seen increased customer demand in the UK for its managed, bespoke and turn-key support solutions.”
PerspecSys [O93] – PerspecSys will be demoing its award winning Cloud Data Protection Gateway at InfoSec at Stand O93. UK enterprises and Government organisations have deployed PerspecSys to meet ICO requirements for cloud data protection, utilising its tokenisation and encryption capabilities to address Data Residency and Privacy requirements while making their move to the Cloud.
PhishMe Inc [J76] – At this years’ Infosecurity Europe 2013, PhishMe, the leading provider of immersive phishing awareness training, will be showcasing new mobile features in its PhishMe Spear Phishing Simulator. The PhishMe Spear Phishing Simulator helps raise awareness around the strategies and sophisticated tactics used by today’s hackers looking to compromise an organisations data and systems.
As well as this PhishMe will be presenting in the Technical Theatre around: ‘Make your employees Mal-AWARE: How to implement a scalable behaviour modification program’. The presentation will explain what organisations can do to train their staff on how to recognise phishing scams and how to prevent them. PhishMe believes that educating staff on cyber security helps minimise the risk of employees falling victim to an attack.
PhishMe’s Chief Executive Officer and Founder, Rohyt Belani, will also be revealing the results of research into whether BYOD policies increase an organisations chances of being targeted by phishing emails.
Pradeo [M75] – At the occasion of Infosec 2013, PRADEO will be holding a Press Conference Wednesday, April 24 at 10a.m and lift the veil on the various threats emanating from mobile apps. The following points will be discussed:
• Weight of the Mobile Application Market
• Mobile Application Security Issues
• Mobile Application Security Flaws : Concrete figures
• Solutions to provide : PRADEO’s point of view
PRADEO SECURITY SYSTEMS  – CheckMyApps in the Cloud™ is a global solution mainly focusing on the security of mobile apps. Thanks to our solution, large companies will be able to:
- audit the mobile applications developed by their partners and make sure that they comply with their security policy,
- control them,
- and deploy them on their mobile devices .
To complete the security solution, CheckMyApps in the Cloud™ also includes a management solution (MDM,MIM, MAM).
Proofpoint Limited [E60] – Proofpoint recently identified a new class of attack, dubbed longlining. The new class of sophisticated and effective, large-scale phishing attack, combines successful spear phishing tactics with mass customisation. In its study outlined in this whitepaper, Proofpoint found mass customised phish are effective enough to trick more than 10 percent of recipients into clicking on malicious content.
Proton Data Security [K80] – Proton Data Security is the world’s leading manufacturer of degaussers and data erasure products. With over 25 years of experience in the industry, our quality degaussers and destroyers ensure that sensitive data on electronic media (hard disks, tapes, etc) is erased in accordance with recognized standards and is forensically unrecoverable.
Pyramid Computer Gmbh [L91] – Pyramid Computer GmbH is focussing on its NetFlex ELX modular server platform at Infosecurity 2013 (L91). NetFlex ELX provides a choice of processing subsystems and network-interface modules installed via the server front panel allowing Independent Software Vendors (ISVs) and system OEMs to satisfy customers’ networking and security applications competitively and quickly.
Qualys [H70] – As usual, Qualys is letting its customers do the talking at Infosecurity. Presentations from TNT Express, the Financial Conduct Authority, WorldPay and more will be taking place alongside an insightful presentation into our customers’ compliance habits with data taken from 5million+ scans from companies around the world. In addition, Qualys’ Mike Shema will also be presenting how to strengthen web application security and will be signing copies of his book at stand H70.
QUANTEC SA [N92] – INDEPENDENCEKEY: World’s fastest portable encryption device!
An engineering miracle of pure and advanced design:
- Once-click AES 256-bit hardware encryption for files, directories and disks with unique random keys.
- Protected cloud usage: maximum speed, minimum bandwidth and time!
- Easy encryption, double-click opening and no need of decryption to modify your data.
- Simplified hardware association among several IndependenceKey for secure data sharing.
- No instructions manual!
- The cryptographic keys never leave IndependenceKey!
With Security Cap: hardware associated 1:1, you are 100% protected from theft, loss, amnesia.
Privacy, Security and Freedom are finally restored thanks to such easy-to-use device!
RandomStorm [F80] – RandomStorm [Booth F80] is showcasing its updated online web application scanning service, WebStorm, which identifies exploitable vulnerabilities in critical applications and StormAgent, a scalable enterprise-class log-management appliance. Both products form part of the RandomStorm suite of network security monitoring tools that combine to form a flexible, integrated vulnerability management platform.
RAPID7 [K72] – InfoSec will be a rare chance to meet Rapid7’s security researcher Claudio Guarnieri. He will be available to discuss recently discovered threats such as critical Java and IE flaws, cybercrime gangs behind recent high profile breaches, and the rise of cyber espionage. The company’s latest research includes identifying security flaws affecting 50 million networking devices, and misconfigured Amazon S3 buckets.
Reflex IS [K95] – Safetica Technologies is a pioneer on the market with internal IT security – protection from employee negligence and malicious actions. The company’s flagship is Safetica Endpoint Security, the world’s first software providing a complete protection from threats resulting from inattentive behaviour and harmful intents of employees.
SCC [N63] – A team of Information Assurance specialists from SCC, which became the first UK provider to receive Pan-Government accreditation for its Secure Multi-Tenancy Cloud in 2013, will be showing delegates how navigate the complex G-Cloud accreditation process.
SecurePush Ltd. [K87] – The SecurePush Anti-theft Mobile ID in-house patented technology is specially designed for banks, credit-card companies, e-commerce, social networks, cloud services providers, Internet routers and switches, and many more, while supporting the highest security standards and regulation demands of international financial systems This unique system dramatically enhances existing security methodologies creating an efficient independent layer of authentication for all users. It simply runs on existing smart devices with no necessity for additional investment. No more need for tokens or other old fashioned devices!
Sentor Manged Security Services [M90] – Sentor will have customer case studies and on-stand visits from customers who will be available, by prior appointment, to discuss security issues, web scraping and their use of ScrapeSentry. Sentor is also presenting in the Business Strategy sessions, on 23.04.2013 at 1.20pm. For further information contact email@example.com
ServerChoice [O95] – ServerChoice are UK-based managed hosting specialists, providing secure Cloud Solutions, Colocation and Connectivity. We’ve just opened a new high-security Tier 4-standard data centre in Hertfordshire, with emphasis on security, performance and reliability. ServerChoice are PCI-DSS compliant, ISO 27001 accredited and our data centres are 40% more energy efficient than traditional data centres.
Signify [M61] – Signify is demonstrating how quick and easy it is to deploy and manage its cloud-based 2-Factor Authentication service (2FA). It will also be highlighting the hidden costs of implementing 2FA in-house, such as ongoing management and administration, token provisioning and the specialist skills and resources needed to deliver a reliable service 24/7.
Silobreaker Ltd [L89] – Silobreaker will announce the launch of a mobile app that extends its award-winning tools and features to users on the move. Collect, monitor and analyse data in this new app, and share findings straight from your mobile phone.
Sophos [H60] – Sophos will introduce Sophos Cloud, its new cloud-based Security-as-a-Service. You’ll also see the company’s latest Endpoint, UTM and Mobile innovations in action, addressing issues including virtualisation, Android malware and BYOD. Sophos will also explore new threat trends such as ‘Hacking-as-a-Service’ – cloud services for criminals.
Spectorsoft Corp [C92] – Insider threats are one of the fastest growing security challenges. To combat this threat, SpectorSoft has recently launched v7.5 of Spector 360, its flagship enterprise software package. Spector 360, which now incorporates BlackBerry reporting, enables organisations to rapidly detect, substantiate and react to data leakage incidents and thereby mitigate loss.
SSH Communications Security Corporation [F88] – Due to mismanagement of SSH keys, most major governments, banks and enterprises operate out of compliance with federal IT security regulations. The new SSH Risk Assessor (SRA) tool provides civilian and defense regulators with an easy, fast and accurate way to determine the compliance status of organizations’ SSH user key environments.
SSL247 [B60] – SSL247 launches HackAvert: leading anti-malware and vulnerability scanning for your website(s). Aggregates trusted sources including McAfee, Symantec, Bing, Yahoo & Google plus many more to avoid search engine blacklisting and resulting lost revenue. Protects your site, your revenue and visitors and provides peace of mind. Visit https://www.ssl247.co.uk/hackavert or stand B60.
SureCloud [H31] – Ovum’s new research paper on SureCloud’s Collaborative Compliance Platform™ discusses problems traditionally associated with IT Governance, Risk & Compliance (GRC) including complexity and level of resources needed to implement and operate systems. It concludes that the SureCloud software-as-a-service (SaaS) solution’s emphasis on agility, simplicity and price helps overcome such issues.
Week commencing April 15 will see SureCloud introduce Business Analytics capabilities to its SaaS-based risk assessment and compliance platform. Already SureCloud customers like Shop Direct are stating publicly how much they are looking forward to the prospect of gaining unprecedented insight into their third party assurance programmes.
Sutcliffe & Co. [L97] – A Sutcliffe & Co cyber liability insurance policy can cover accidental or malicious cyber risks including:
• Loss or damage of own and third party data
• Business interruption costs
• Forensic costs
• Legal costs and financial penalties
• PR costs
• Notification costs and credit monitoring
Swivel Secure Ltd. [B40] – Swivel Secure, a pioneering network security solutions provider is the only token-less authentication solution provider supported by Microsoft for O365. Swivel will be conducting demonstrations of its awarding solution including its in-browser, SMS and Mobile APP authentication solutions. Visit us at stand B40 to find out more.
Symantec (UK) Ltd [P70] – Symantec has announced that it will launch its Cyber Readiness Challenge in the UK at Infosec Europe 2013. On 23rd April, 2pm-4pm IT Security professionals will come together to put themselves in the hacker’s shoes to understand their targets, technology and thought processes so they can ultimately better protect their company or agency.
This interactive “capture the flag” game has been designed for all levels of technical expertise to offer the opportunity for participants to test their skills within a unique and real world environment developed by Symantec, a global leader in security. Players will compete against each other to solve IT security problems and win prizes.
To register your place at the Symantec Cyber Readiness Challenge visit: https://secure.e-ventcentral.com/events/CyberReadinessChallenge/
Tabernus UK Ltd [L61] – We will be using the Infosecurity 2013 event to inform customers about Tabernus exciting new EE USB Solution that we will be releasing over the next couple of months. Tabernus is also keen to promote our ever expanding global profile which now spans across four out of the seven continents
Titania [M78] – 2013 will be Titania’s 3rd year exhibiting at InfoSec, and this year we are looking to make a big impact. At our stand we will be demonstrating our award winning network auditing tool, Nipper Studio, and our new product Paws Studio which offers intelligent compliance auditing for workstations and servers. For a unique InfoSecurity experience and some great prizes visit our stand at M78.
TITUS Inc [E73] – A simple mistake like sending an email to the wrong person can have grave repercussions. Identifying the sensitivity of information through data classification can help organizations ensure the right people access the right information. Visit Stand E73 for interview opportunities with TITUS CEO Tim Upton and CTO Steph Charbonneau.
Tripwire [G90] – Tripwire is a leading global provider of risk-based security and compliance management solutions that enable organizations to effectively connect security to the business. Tripwire delivers foundational security controls like security configuration management, file integrity monitoring, log and event management, vulnerability management, and security business intelligence with performance reporting and visualization.
Trusteer [G95] – Advanced information-stealing malware enables APTs and targeted attacks on enterprises. The main infection vectors are exploitation of application vulnerabilities, and social engineering schemes that result in direct malware installation. Trusteer Apex applies a new approach, Stateful Application Control, to stop zero day application exploits and data exfiltration. By analyzing what the application is doing (operation) and why it is doing it (state), Trusteer Apex can automatically and accurately determine if an application action is legitimate or malicious. Trusteer’s Stateful Application Control enables automated enterprise malware protection that maximizes security while simplifying deployment and minimizing management overhead.
Tufin Software Technologies Ltd [J41] – Tufin Technologies along with their customer, Kabel Deutschland, will be discussing how they have developed a resource-efficient way to manage application connectivity and firewall change processes while ensuring that security policies are not compromised. Companies can learn how a completely new approach to managing application connectivity, can allow security professionals to define, update, monitor and remove applications as well as understand how to manage application-related firewall changes from a business process perspective, instead of requiring firewall teams to hunt for connectivity data spread across the entire infrastructure.
Varonis UK Ltd [H21] – Are organisations able to detect suspicious network traffic, suspicious access to data, or activity on email servers? And how – if so – are these crucial activities monitored?
At Infosecurity Varonis will give insight on how organisations lack the basic controls that could help them to stop hackers and quickly remediate an attack, and in many cases prevent or limit breaches in the first place. Most attacks are far less sophisticated than we think, and even if they are they don’t need to be to do damage if the basics aren’t addressed. Varonis will give insight how it is these basic controls that can lock the door for a whole host of attacks.
Varonis will also launch the ‘Children of the Digital Revolution’ white paper packed with statistics which examines how in a single generation, digital collaboration has completely changed the way we communicate and work. Right now, our trust in the digital world is threatened. Varonis explains the rules of the road which will allow individuals and organisations to continue to derive benefit from digital collaboration without harm.
Varonis will also present DatAnywhere, which gives users the same collaboration experience that cloud services provide, without actually having to move data into the cloud. DatAnywhere automatically and securely syncs files from corporate file shares to and from remote employee laptops and devices, authenticates with corporate directory services and gives employees the ability to securely share files with co-workers and external business partners.
Viewfinity [L71] – Viewfinity will preview the new Viewfinity Application Control, which significantly reduces IT security risk by providing application control reinforced with managed administrative privileges. Viewfinity’s approach provides a powerful new foundation for enterprise IT security with increased levels of security automation, greater end user productivity, and low total cost of ownership.
Voltage Security, Inc. [E31] – Voltage’s data-centric solutions are used by over a 1000 of the biggest companies in the world to secure data in the Cloud, residing on mobiles and when data is used in Big Data.
At Infosecurity, Voltage will give insight on how data-centric security can be a simple and effective answer to some of the most pressing security issues, including:
• How you can solve the thorny problem of securing SAAS applications such as Salesforce in the Cloud. Many companies are faced with how they should secure sensitive corporate, client and customer information and using SAAS applications such as Salesforce has long caused organisations a huge headache. Voltage will show how to solve the Cloud security issue with seamless security that doesn’t impair employee efficiency.
• How to stay compliant across borders
Voltage have a brilliant yet simple solution to the problem of the “patriot act” and dealing with cross border security issues which so many companies can get caught out over. Staying on top of the maze of laws which the data you move and store comes under (depending on where the data goes and where the data centre is geographically hosted) can be confusing and frustrating to even the savviest of enterprises. Voltage will encrypt the data at source which means that none of the rules, laws, audits etc apply because none of the information can be read as it’s encrypted before it goes anywhere.
• Finally they will also be giving advice on how to safely tap into the 4G data explosion.
Vormetric [M65] – On Stand M65 at Infosecurity Europe 2013, specialists from data security expert Vormetric will be on hand to show how enterprises can protect what matters including data security challenges such as securing databases, Big Data and Cloud deployments and meeting stringent compliance requirements, including forthcoming EU Data Protection Regulation.
WatchGuard Technologies [D71] – WatchGuard® is featuring its new range of Xtensible Threat Management (XTM) products that meet the growing demand for high-performance, integrated security solutions from large organisations. WatchGuard is also showcasing its new wireless access point products that provide the same level of security for WLAN traffic as fixed network.
Webroot Services Limited [D60] – Webroot, a leader in delivering Internet security as a service, will be announcing a new mobile security study InfoSecurity Europe 2013 in London. The report exposes that the popular trend of allowing employees to use their smartphones and tablets at work is causing a significant drain on IT resources while at the same time putting corporate data at risk. Webroot will also demonstrate its SecureAnywhere solutions that protect against online threats with the world’s most powerful cloud-based security intelligence, keeping you safe from anywhere you connect to the Internet and from any device. For more information about Webroot visit http:www.webroot.com.
WFSW, S.A. [O80] – Watchful Software showcases a layered information protection solution to keep data safe and secure regardless of whether it is at rest, ‘on-the-fly’, or totally outside the network perimeter. RightsWATCH brings the inevitable merger between DLP and ERM to life, in a single, simple to deploy and user-friendly software product.
White Hat Rally [B74] – White Hat Rally has so far seen 16 teams from the InfoSec community enter the 3 day pirates and smugglers themed driving challenge across Devon driving in ‘Pieces of V8’! Last year they raised £39,000 for Barnardo’s and are determined to make this year’s event a bigger success. Teams from UK businesses, predominately in the Information security sector, will once again come together in the fifth White Hat Rally event on 21st to 23rd June 2013. If you would like to find out more or enter a team – go to www.whitehatrally.org or visit stand B74
WhiteHat Security [H33] – WhiteHat Security, a leading provider of end-to-end Web security solutions, recently received $31million of funding and is expanding internationally, with special focus on Europe. CEO Stephanie Fohn, one of few females’ executives in the security industry, will be at the show to discuss the future of WhiteHat Security.
Wick Hill Ltd [F50] – Wick Hill is showing a range of solutions with an emphasis on mobility, cloud and wireless. Solutions include MDM, end-point protection, securing high density multi-Gbps wireless, ID management, SIEM, Windows to Go™ and Check Point’s new releases. Also the show launch for Wick Hill’s its new vendor Becrypt.
Winfrasoft Ltd [P90] – Winfrasoft, the multi-factor authentication security specialist is launching AuthCentral Desktop Logon Agent for secure 1.5FA and 2FA Windows logon. The software augments the CTRL+ALT+DEL process of logging on, by adding the requirement to provide a One Time Code, in addition to the Windows password to gain access to the desktop.
Zertificon UK Ltd.  – ‘Zertificon, a leading German provider of server-based email encryption & signature solutions, newly launched Z1 SecureHub for secure transfer of large files in the GB-range. This is a long-awaited extension of the successful Z1 SecureMail Gateway, that secures B2B and B2C communication making use of either Public Key Infrastructures (PKI) according to S/MIME and PGP standard, or, for non-certificate based email encryption, of password protection. Additional features include end2end encryption including smartphones, multi-tenancy, cluster capability, high scalability and easy integration with any standardized IT environment. Please meet Mrs Meinke and Mr Pieper for more information at the German pavilion.’