On our website, we would like to use the services of third-party providers who help us improve our promotional offerings (marketing), evaluate the use of our website (performance) and adapt the website to your preferences (functionality). We need your consent for the use of these services; you can always revoke this consent. You can find information about the services and the chance to reject them under “User-defined.” You can find additional information in our Data Protection Policy.

Use #itsa20

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2019
Zoom product LOGO_Application Security

Application Security

LOGO_Application Security

Application Security

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Threat and Risk Monitoring of Key Enterprise Applications

CHALLENGE:  No Threat Visibility

Application Risk Intelligence plays a key role in any organization’s overall security and risk posture. Enterprise applications are the primary source of an organization’s critical assets and processes. As such they are the primary targets for insider and external threats and attacks. Most organizations have limited to no threat monitoring of these applications and are rely primarily on access controls and network security solutions that do little or nothing against an insider threat or an external targeted attack. Operating under a false sense of security, organizations need a real-time, continuous monitoring control to provide them with visibility into application-targeted threats before it is too late.

SOLUTION:  Application Threat & Risk Monitoring

Securonix addresses this need by monitoring critical applications and systems at the transaction, data set, and sensitive user record level. Securonix continuously builds a risk profile for all applications and systems while identifying all high-risk users, access, and activities associated with sensitive data and transactions. All results are scored and presented in application risk scorecards.

BENEFITS: Real Time Visibility with Actionable Intelligence

The Securonix solution for enterprise applications provides:

→  Continuous control and compliance monitoring

→  Automated rapid detection of high risk activity through behavior analysis

→  Detection and monitoring of high risk access and activity

→  Continuous detection and monitoring of critical information for DLP

→  Enriches data with identity, behavior and business context for security and compliance management

→  Pro-active detection and management of fraud, misuse, snooping and other illicit activity

You decided to attend the it-sa? Get your tickets at the TicketShop


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.