0

During the 12th annual e-Crime & Cybersecurity Congress in Dubai, CyberKnight showcased its ZTX Framework, originally developed by Forrester, while participating along with six strategic cybersecurity vendors. CyberKnight’s focus on Zero Trust Security supports enterprise and government organizations in the Middle East to attain a state of security resilience by simplifying incident response while achieving compliance.

According to a recent forecast by Gartner Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019. An ever-evolving threat landscape and the advent of digital transformation are forcing security and risk leaders in the region to re-evaluate their spending priorities.

“Considering the limitations of the perimeter centric security approach, customers are advised to implement a Zero Trust security model, a data-centric and identity-driven model to secure their environments. The technologies we will be showcasing at the e-Crime Congress enable security teams to accelerate their incident response and compliance journey,” said Avinash Advani, Founder, and CEO at CyberKnight.

“Since the Zero Trust model is an augmentation of organizations’ existing architecture, it does not require a complete technology overhaul. Together with our technology partners, we strive to help our customers in the region deploy and maintain a Zero Trust architecture,” added Vivek Gupta, Co-Founder, and COO at CyberKnight.

The technologies represented by CyberKnight at the event include:

  • Deep and Dark Web Threat Intelligence (Flashpoint)
  • Remote Browser Threat Isolation (Cyberinc)
  • Data Access Governance & Active Directory Security(Stealthbits)
  • Security Training, Awareness and Anti-Phishing Platform (PhishRod)
  • Mobile Threat Defense and Mobile App Security (Zimperium)
  • Data-Centric Security – Digital Rights Management and Data Classification (Seclore)

Enterprises in UAE Adopting Hybrid Cloud Models: Nutanix Survey

Previous article

Voice Assistants Can Be Hacked with Ultrasonic Waves

Next article

You may also like

Comments

Leave a reply

Your email address will not be published. Required fields are marked *

More in Events