Cybersecurity VAD CyberKnight joins annual e-Crime & Cybersecurity Congress in Dubai

Participating with six strategic cybersecurity vendors, CyberKnight will focus on how Zero Trust Security supports enterprise and government organisations attain security resilience

CyberKnight Technologies, Cybersecurity, Data Security, Enterprise

During the 12th annual e-Crime & Cybersecurity Congress in Dubai, CyberKnight will showcase its ZTX Framework, originally developed by Forrester, while participating along with six strategic cybersecurity vendors. CyberKnight’s focus on Zero Trust Security supports enterprise and government organisations in the Middle East attain a state of security resilience by simplifying incident response while achieving compliance.

According to a recent forecast by Gartner Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019. An ever-evolving threat landscape and the advent of digital transformation is forcing security and risk leaders in the region to re-evaluate their spending priorities.

“Considering the limitations of the perimeter centric security approach, customers are advised to implement a Zero Trust security model, a data centric and identity driven model to secure their environments. The technologies we will be showcasing at the e-Crime Congress enable security teams to accelerate their incident response and compliance journey”, said Avinash Advani, Founder and CEO at CyberKnight.

Related Articles

“Since the Zero Trust model is an augmentation of organisations’ existing architecture, it does not require a complete technology overhaul. Together with our technology partners, we strive to help our customers in the region deploy and maintain a Zero Trust architecture,” added Vivek Gupta, Co-Founder and COO at CyberKnight.

The technologies that will be represented by CyberKnight at the event include:

  • Deep and Dark Web Threat Intelligence (Flashpoint)
  • Remote Browser Threat Isolation (Cyberinc)
  • Data Access Governance & Active Directory Security(Stealthbits)
  • Security Training, Awareness and Anti-Phishing Platform (PhishRod)
  • Mobile Threat Defense and Mobile App Security (Zimperium)
  • Data Centric Security – Digital Rights Management and Data Classification (Seclore).

Most Popular

AWARDS