Speakers

Keynote speakers

Säkerhet i Multicloudmiljöer – undvik överraskningar

Företag flyttar sina workloads till molnet, många gör detta i en multi-cloud modell, samtidigt riskexponerar man sina nätverk i allt högre grad. Det är nästan omöjligt att säkra en dynamisk miljö med hjälp av traditionella säkerhetslösningar. Vi tittar på vilka utmaningar som finns samt hur vi kan adressera dom.

Berndt Frogner
Channel Director North
Fortinet

Nutanix – världens bästa mjukvaruplattform för datacenter, enligt Gartner!

Tänk on du kunde använda ditt DataCenter som dom du använder det publika molnet. Kunna konsumera IT-resurser som om de vore molntjänster. Med Nutanix kan du åstadkomma detta och även utnyttja det publika molnet för det som är intressant. Vi visar konkret på hur du förenklar och gör besparingar inom virtualisering, lagring och framförallt administration.

Peter Eriksson
Sr System Engineer
Nutanix

Automated Endpoint Protection and the democratization of incident response

How do we confront the entire threat lifecycle to thwart the impact of attacks on endpoints?
SentinelOne has the defences you need to prevent, detect, and resolve known and unknown threats. By simplifying automated response to threats and making incident response possible for any size of organizations, SentinelOne covers the full life cycle of modern threats.

Hans Grapenmyr
Regional Sales Manager Nordics & Baltics
SentinelOne

Speakers

Varför nästa trådlösa säkerhetsstandard är välkommen och verkligen behövs! Är ditt nät säkert?

Trådlös säkerhet har varit debatterat ända sedan WiFi introducerades. Den senaste standarden som de flesta använder (WPA2), är inte mindre än 14 år gammal! Nu introduceras nästa generation trådlös säkerhet, WPA3. Vi berättar varför den behövs, och vad den innebär (och vad den inte innebär).

Jonas Mellander
Systems Engineer, Nordics and Baltics
Aerohive

Limitlessly Scalable Storage for Capacity-Intensive Computing

With Cloudian’s technology, you can built your own Cloud Data Service platform, just like AWS. It will give you the freedom, to run it on any x86 servers and/or in the public cloud, so you can shop after the best pricing and services. Thousand of applications can use this Data Service platform, out-of-the-box, and automation can be achieved by using RESTful API.

Henrik Thorsøe Pedersen
Regional Sales Manager, Nordic
Cloudian

Lägg inte alla äggen i molnleverantörens korg

Stephane talar om vikten av riskspridning mellan molnleverantörer samt deras lösningar inombords, och hur Gemalto med standardbaserade lösningar möjliggör bästa möjliga –eller mest lämpliga- säkerhet, för företag i molnet, på väg till molnet eller kvar bakom brandväggen. Stephane kommer bland annat beröra nyheter i portföljen kring området IAM och skydd av nycklar.

Stephane Kunegel
Sales Engineer
Gemalto

Actionable insights and analytics, an imperative in a cybersecurity strategy.

Want to know how to achieve best value from your cyber security investment? You need an answer, not a load more data.

Ensuring that your choice of solution provides global insight and actionable analytics into suspicious activity and insider threats means you can start to prioritise threats according to the level of criticality, and better secure your environment as a whole. You can’t hope to protect what you don’t know is happening, especially when the access is legitimate.

Steve Smith
Regional Sales Director – Strategic Accounts
Imperva

How Infoblox Cloud & Ecosystem integration brings your Security to the Next Level

Your organization depends on your network. And your network depends on secure DNS and related core network services to run reliably and securely.

Infoblox brings next-level security, reliability and automation to cloud and hybrid systems, managed through a single pane of glass. This means your network—and your business—can run safer and faster with the high availability, efficiency and application response times you need to thrive in the hyperconnected world.

Having security up front is key to give customer confidence and highlight Infoblox core strength in security.  Speaking directly to the billions of threat indicators that can be operationalized and the more than 30 API-level integrations means Infoblox makes it easier to have tight integration between network and security, a key desire.

Niklas Carlström
Infoblox

Strengthen security and optimize performance in your hybrid, public, and private clouds

Clouds help you go to market faster, save money, achieve scale, and gain flexibility. But traditional data monitoring techniques don’t work effectively in the cloud. Without complete data access, you are vulnerable to security attacks and don’t have all the data you need to maintain network and application performance. Cloud visibility lets you deploy public and private clouds with confidence.

Ronny Gahns
Sales Engineer
Ixia

Stop endpoint attacks before they get started

XDR provides detection and response across network endpoint and cloud, but also natively embeds analytics and automation between each data source and feature. This ensures that the products in this category are well thought out, each one improving security operations not increasing burden or shifting effort from one area to another.

Andreas Persson
Sales Manager – Cyber Security Solutions, Nordics – Baltics – Eastern Europe
Palo Alto Networks

Why automation?

  • Simplify and automate network changes for heterogeneous environments physical and cloud
  • Rapidly implement network changes in minutes
  • Visibility across the entire network security-control topology including application dependencies
  • Automatic audit trail for easy audit preparation and troubleshooting
  • Security as part of the enterprise ITSM process
  • Centralized management for a wide variety of different vendors
  • Ensure security and compliance with built-in security controls

Patrick Johansson
Regional Sales Manager, Nordics
Tufin

Participants

FireEye is on the front lines of cyber attacks every day. Our experts’ knowledge of the threat landscape provides insights that enable us to build the best technologies in the industry. Using these technologies first-hand on the front lines further equips our product teams with a constant source of feedback. Through this feedback loop we continuously improve our products at a rate and with sophistication unmatched in the industry, creating a unique innovation cycle.

Gigamon is leading the convergence of network and security operations to reduce complexity and increase efficiency of security stacks. Our GigaSECURE® Security Delivery Platform is a next generation network packet broker that makes threats more visible – across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of security tools.

Proofpoint is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today.

Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media and mobile apps, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur.

Proofpoint gives protection and visibility for any organization’s most valuable asset, and greatest security risk — its people.

Register to Club Exclusive