This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

9 - 11 October 2018 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2018
Zoom product LOGO_Penetration Testing, Vulnerability Scans & IT-Sicherheitsanalysen

Penetration Testing, Vulnerability Scans & IT-Sicherheitsanalysen

LOGO_Penetration Testing, Vulnerability Scans & IT-Sicherheitsanalysen

Penetration Testing, Vulnerability Scans & IT-Sicherheitsanalysen

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Without reliable statements about the status quo of your own security infrastructures, security measures and possible venues of attack, neither a reliable risk management nor the identification of targeted protection and countermeasures can exist.

Simulation and analysis software are the basis to formulate individual security goals and to detect strengths and weaknesses of your own information infrastructures and processes with the help of penetration tests, vulnerability scans and checks and attack simulations within a security assessment.

This should not only be done once as comprehensive cyber security is not a state but a process. Therefore, regular analysis is indispensable in order to evaluate the success of the initiated security measures and to detect and evaluate possible new threat scenarios.

Cyber Security Trainings, Awareness & Simulation

With all the potential of cyber criminals one should not neglect that according to a current IBM survey less than half of all security threats come from external sources. More than a third of them originate from malicious members of your own organization, another fourth are due to merely thoughtless handling errors. Therefore, an increased awareness, a regular sensitization for and education about security risks among the users of information technology from the workplace to the private device in a comprehensive cyber security strategy is indispensable.

Due to the extensive experience of CONET's security specialists in processes, methods and security products across industry and manufacturer boundaries, we are your ideal partner for training, workshops and seminars - at your site or in our training center.

Existing architectures are tested thoroughly in cyber trainings, cyber laboratories and cyber academies with threat simulations. Employees are being trained and suitable organization structures and processes are being developed to avoid risks before they mutate to hazards. Countermeasures are being taken effectively and efficiently before damages occur and in the event of incurred damage securing and restoring measures can be taken to minimize the negative effects. CONET is actively engaged in a variety of initiatives and works closely with established institutes and technology providers.

Cyber Security Consulting & Compliance

LOGO_Cyber Security Consulting & Compliance

Managed Security Services, Security as a Service, Security Intelligence

LOGO_Managed Security Services, Security as a Service, Security Intelligence

Identity & Access Management, Privileged User Management, Multi-Factor-Authentication

LOGO_Identity & Access Management, Privileged User Management, Multi-Factor-Authentication

Security Information and Event Management (SIEM), Monitoring, Detection & Reporting

LOGO_Security Information and Event Management (SIEM), Monitoring, Detection & Reporting

Penetration Testing, Vulnerability Scans & IT-Sicherheitsanalysen is assigned to following product groups:

You decided to attend the it-sa? Get your tickets at the TicketShop



Chat

Do you have further Questions?

Chat with us.

top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.