Events

Events

Events News Reportage Promotions

03/09 [Workshop] Effective Network Analysis and Security Monitoring with...

Sycope helps ensure high performance and security of your network infrastructure. Register

03.09.2024 - 03.09.2024

Softprom has received the status of Gold Partner Zoom

Softprom, Zoom's official partner in Central and Eastern Europe, has confirmed its expertise and technical competences by obtaining a number of Zoom certificates ... read more

25.07.2024

The 2024 Imperva DDoS Threat Landscape Report

The Imperva DDoS Threat Landscape Report is an comprehensive study of DDoS attack activity in the first half of 2024 that highlights key developments... read more

24.07.2024

The best application of code analysis for identifying and remediation...

Veracode is an amazing application security platform which offers colorful tools to help integrate security within the Software Development Lifecycle... read more

18.07.2024

19/09 [Webinar] Imperva cyber defense in action: Protecting data and all...

Learn more about the evolution of cyber threats and Imperva's best modern solutions for protecting data, APIs and applications. Register

19.09.2024 - 19.09.2024

Zoom Workplace: convenient communication features you should know about...

Zoom Workplace combines communication and employee engagement solutions with built-in AI capabilities. Let's take a look at the features that simplify... read more

20.06.2024

[Webinar recording] Brand Protection on the Internet: Effective Solutions...

They are demonstrating how the BrandShield platform helps companies securely protect their brands in the digital space and keep their customers safe and... read more

14.06.2024

Discover the new features of Sycope 2.6

Sycope announces new features of Sycope 2.6 the latest release of its network traffic and security monitoring software, now featuring multitenancy and... read more

12.06.2024

[Speech recording] Bentley Systems BIM Digital Twin Model

Demonstration of BIM Digital Twin on the example of airport construction. Examples of realized projects with BIM Digital Twin from Bentley Systems. read more

07.06.2024

New Release of Gytpol 2.0 Solves Cybersecurity Issue with Endpoint Misconfigurations...

Gytpol 2.0 represents the next generation of Gytpol Inc.'s platform for configuration security and policy verification. The platform detects and remediates... read more

24.05.2024

GoTo is Fighting Scammers with New AI-powered Scam Detection for GoTo...

New functionality protects mobile device users from financial fraud by monitoring and automatically terminating support sessions with suspected scams ... read more

22.05.2024

GDPR Compliance: Understanding the Regulation and How PAM Can Help

How the General Data Protection Regulation (GDPR) affects businesses worldwide and how senhasegura's PAM solution makes compliance easy read more

22.05.2024

[Webinar recording] Deceptive Bytes is a master at tricking malware

Deceptive Bytes is an active endpoint protection that prevents cyberattacks using Deception technology. read more

21.05.2024

SOFTPROM Signs a Distribution Agreement with Acalvio to Elevate Cyber...

SOFTPROM, a leading Value Added IT Distributor, announces a distribution agreement with Acalvio Technologies. This partnership will enable SOFTPROM to... read more

20.05.2024

2024 Buyer's Guide to Threat Intelligence Platforms

Level up your cybersecurity defense with ThreatQuotient ultimate guide to finding the right Threat Intelligence Platform! read more

17.05.2024

BrandShield Unveils LogoShield™: Revolutionary Solution for Logo Infringement...

BrandShield launches LogoShield™, an innovative AI-powered solution that automatically detects and tackles logo misuse online, ensuring comprehensive... read more

10.05.2024

LiveAction and Cisco: A Partnership for Network Innovation

LiveAction and Cisco have a strong partnership spanning over two decades, delivering innovative network solutions to organizations worldwide. LiveAction... read more

10.05.2024

Acalvio Solidifies Leadership in Deception Technology According to GigaOm...

Acalvio Technologies, a leader in cyber deception technology, has reaffirmed its position as a leader in the GigaOm Radar Report for Deception Technology. ... read more

01.05.2024

Five Key Takeaways from the 2024 Imperva Bad Bot Report

Imperva Bad Bot Report 2024 was published to help organizations better understand the challenges associated with automated traffic and the risks of not... read more

26.04.2024

21/05 Deceptive Bytes is a master at tricking malware | Webinar

Deceptive Bytes is an active endpoint protection that prevents cyberattacks using Deception technology. Register

21.05.2024 - 21.05.2024

[AWS case-study] Identifying customers at PIZZA Day service points with...

The salesperson has access to complete customer information in seconds, greatly speeding up service. Reduce software costs by 50% read more

26.04.2024