CyberKnight to highlight zero trust security at the 12th annual e-Crime & Cybersecurity Congress in Dubai

Home/CyberKnight to highlight zero ...
CyberKnight to highlight zero trust security at the 12th annual e-Crime & Cybersecurity Congress in Dubai
CyberKnight to highlight zero trust security at the 12th annual e-Crime & Cybersecurity Congress in Dubai admin March 10, 2020

During the 12th annual e-Crime & Cybersecurity Congress in Dubai, CyberKnight will showcase its ZTX Framework, originally developed by Forrester, while participating along with six strategic cybersecurity vendors. CyberKnight’s focus on Zero Trust Security supports enterprise and government organizations in the Middle East attain a state of security resilience by simplifying incident response while achieving compliance.

According to a recent forecast by Gartner Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019. An ever-evolving threat landscape and the advent of digital transformation is forcing security and risk leaders in the region to re-evaluate their spending priorities.

“Considering the limitations of the perimeter centric security approach, customers are advised to implement a Zero Trust security model, a data centric and identity driven model to secure their environments. The technologies we will be showcasing at the e-Crime Congress enable security teams to accelerate their incident response and compliance journey”, said Avinash Advani, Founder and CEO at CyberKnight.

“Since the Zero Trust model is an augmentation of organizations’ existing architecture, it does not require a complete technology overhaul. Together with our technology partners, we strive to help our customers in the region deploy and maintain a Zero Trust architecture.”, added Vivek Gupta, Co-Founder and COO at CyberKnight.

The technologies that will be represented by CyberKnight at the event include:

  • Deep and Dark Web Threat Intelligence (Flashpoint)
  • Remote Browser Threat Isolation (Cyberinc)
  • Data Access Governance & Active Directory Security(Stealthbits)
  • Security Training, Awareness and Anti-Phishing Platform (PhishRod)
  • Mobile Threat Defense and Mobile App Security (Zimperium)
  • Data Centric Security – Digital Rights Management and Data Classification (Seclore).

PUBLISHING PARTNERS

Tags