This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

9 - 11 October 2018 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2018
Zoom product LOGO_Proofpoint

Proofpoint

LOGO_Proofpoint

Proofpoint

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Companies impacted by digital industrial espionage, sabotage or data theft often do not even know that they have been attacked or that data is currently leaving their network. Recent history has shown that 90% of targeted attacks take place via email. These include unwanted content, virus attachments, malicious links and trojans. Proofpoint's award-winning security, the leader in Gartner's Magic Quadrant for secure email gateways for years, ensures that only clean and validated files enter your network.

The solution offers complete protection. One is signature-based detection of known threats. On the other hand, by defending against unknown dangers. A dynamic reputation analysis continuously evaluates IP addresses and decides whether e-mail connections are accepted, rejected or restricted. Spam detection is 99%. Suspicious emails or attachments are placed in quarantine and the respective recipient is notified. It also detects malware-free threats such as password phishing and fraudulent emails. This is done by evaluating various attributes, such as the sender-receiver relationship or the header and content.

In addition, we offer you central management in our german certified data centers. This includes not only the operation and regular maintenance and updating of the platform. You also benefit from the support service of our security experts & the DTS Security Operation Center (SOC).

LogRhythm

LOGO_LogRhythm

Next Generation Endpoint Security

LOGO_Next Generation Endpoint Security

ForeScout

LOGO_ForeScout

DTS Security Operations Center (SOC)

LOGO_DTS Security Operations Center (SOC)

You decided to attend the it-sa? Get your tickets at the TicketShop



Chat

Do you have further Questions?

Chat with us.

top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.