Fidelis to demonstrate defence capabilities at GISEC 2016
Jim Jaeger, Chief Cyber Strategist, Fidelis

Fidelis to demonstrate defence capabilities at GISEC 2016

Fidelis Cybersecurity has announced their participation in the Gulf Information Security Expo & Conference (GISEC), to be held at the Dubai World Trade Centre, March 29-31.

Attendees are invited to Hall 7, Stand B-144 to learn how advanced products and incident response services from Fidelis Cybersecurity reduce the time to detect and resolve incidents, prevent data theft and stop attackers at every stage in the attack lifecycle.

In addition to exhibiting at GISEC, Jim Jaeger, a former director of intelligence with the US Air Force (USAF) Atlantic Command, will host a session on forensic analysis of cyber attacks. He will share insights into how enterprises can identify the root cause of cyberattacks and put in place solutions and processes to counteract threats and mitigate future attacks. The session will be held on Wednesday, March 30 from 3:10pm – 3:40 pm in Sheikh Rashid Hall.

“Cyber criminals are targeting the Middle East, and the mass adoption of e-services, from banking and insurance to government, adds another layer of complexity and introduces potential security issues. Organisations must be able to quickly operationalise intelligence across their infrastructure so they can identify and remove attackers no matter where they hide on the network and endpoints,” says Fidelis Cybersecurity Chief Cyber Strategist, Jim Jaeger.

Fidelis Network analyses network traffic at multi-gigabit speeds in real-time. It detects the tools and tactics of advanced attackers – including advanced malware, exploits, command and control activity, and data theft techniques – that can often get past traditional network security systems, such as firewalls and intrusion prevention systems. Fidelis Endpoint allows an organisation to initiate an investigation and respond to a threat, no matter where it is in the corporate environment – network, endpoint or mobile device – across all ports and protocols, without depending on third-party proxies.

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive