Security Code showcases latest sensitive data protection solutions at GITEX Technology Week 2018
SECURITY CODE ANNOUNCES ITS PARTICIPATION IN GITEX TECHNOLOGY WEEK 2018, THE LARGEST ICT EXHIBITION IN THE MIDDLE EAST, TAKING PLACE ON OCTOBER 14-18 IN DUBAI AND BRINGING TOGETHER REPRESENTATIVES FROM 120+ COUNTRIES
FIND US AT - SHEIKH RASHID HALL, STAND - SR-36
Security Code announces its participation in GITEX Technology Week 2018, the largest ICT exhibition in the Middle East, taking place on October 14-18 in Dubai and bringing together representatives from 120+ countries. The event will see the Company’s leading experts, including Chief Technology Officer Dmitry Zryachikh, share their experience and showcase technologies for sensitive data protection at the premises, in the cloud and across the network.
During the five-day event, the Security Code stand at SR-B6 in Sheikh Rashid Hall will exhibit a leading portfolio of security solutions including:
vGate - private cloud security posture management solution. It enhances cloud security, data protection and ensures compliance with security regulations. Instead of virtual machines, vGate controls cloud infrastructure management plane and hypervisor hosts itself. vGate also deny any cloud administrator access to sensitive datastores.
Secret Net Studio for Data – information-centric endpoint protection solution. It allows sensitive data handling control, data leakage prevention and streamline incident investigation process for highly sensitive environments. Secret Net Studio for Data creates virtual air gap for sensitive files, and doesn’t allow users to transmit them outside of the trusted network. With Secret Net Studio for Data customers could replace two desktops for different networks with one.
Secret Net Studio Trusted Environment – Unique pre-OS endpoint security solution. It controls consistency of standard endpoint protection mechanisms. It cannot be detected and deactivated remotely because it works below operating system level. It works on reserved CPU core which is separated from OS using Intel virtualization technology. Instead of every other endpoint protection mechanism, Trusted Environment has full access to OS kernel memory so it prevents any potentially malicious OS-level events to happen.
The technologies developed by the Security Code assume that evasive attacks don't reuse artifacts and may even use new techniques and tactics. Technical professionals can't rely on threat intelligence alone for catching such threats and should understand core security patterns and use alternative technologies to prevent evasive threats.
Visitors to the stand can find out more about sensitive data protection, the impact of cyberwar on corporate security as well as new partner opportunities. The Security Code top management including the CEO Andrey Golov, CTO Dmitry ZryachiKh will be available to discuss security trends and new technologies and new partnership opportunities.
About Security Code
The Security Code is a Russian independent developer of cybersecurity software, appliances, and services headquartered in Moscow, its product development team counts over 400 engineers working out of 3 R&D centers.
The Security Code offers a unique security architecture that ensures data security all the way from endpoint through network to cloud. The key idea is to preserve sensitive data security while accepting the fact that underlying infrastructure might be vulnerable.
The Security Code solutions (Information-centric endpoint protection platforms, Cloud workload protection platforms, Enterprise firewalls, among others) have been successfully implemented in more than 32 000 enterprises and Government agencies and to address information security issues on workstations, servers, virtual infrastructure, and networks.
The Security code is acknowledged by Gartner as a Cloud Workload Protection Platform developer, and has technology partnerships with Intel, Microsoft, VMware, Kaspersky lab.