On our website, we would like to use the services of third-party providers who help us improve our promotional offerings (marketing), evaluate the use of our website (performance) and adapt the website to your preferences (functionality). We need your consent for the use of these services; you can always revoke this consent. You can find information about the services and the chance to reject them under “User-defined.” You can find additional information in our Data Protection Policy.

Use #itsa20

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2020
Zoom product LOGO_IT security – authentication, firewalls, endpoint security, monitoring and more

IT security – authentication, firewalls, endpoint security, monitoring and more

LOGO_IT security – authentication, firewalls, endpoint security, monitoring and more

IT security – authentication, firewalls, endpoint security, monitoring and more

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

We develop and implement security infrastructures for IT environments of all sizes including training and support. Our experience in the field of firewall and endpoint security make us the right IT partner for your project. We also offer IT consulting for mobile security scenarios, multi-factor authentication and password management solutions.

IT Consulting, Project Management and Support

We support you in the entire life-cycle of IT projects and make sure to make them a success – from analysis to rollout and testing. Our IT specialists advice you through planning, implementation and post-processing of IT projects – in collaboration with your IT team or as full managed service for all technical and organizational project tasks.

IT Security Solutions


A consistent security strategy requires strong authentication as an additional security layer. We find the right solution for your multi-factor authentication without user acceptance or system compatibility problems.

Our portfolio: Password Safe (Certified Partner) | Entrust Datacard/sms passcode

Endpoint Security

Endpoint Security is more than just virus protection. It protects endpoints, mobile devices, e-mails and network access from malware, spam or data loss and secures company data through encryption. We support you from the very beginning of your endpoint solution through implementation and maintenance.

Our portfolio: Sophos (Platinum Partner)


Secure networking of locations and network protection are essential IT business requirements. We offer more than just product knowledge: Our consultants are specialists in their field and analyze all technical details connected to your firewall.

Our portfolio: Sophos (Platinum Partner) | Check Point (Stars Partner Enterprise) | Fortinet (Authorized Partner)

Mobile Device Management

IT teams manage a wide range of different devices in company networks. We advise you on useful features and the right solution for your environment.

Our portfolio: MobileIron (Gold Partner) | Sophos (Platinum Partner)


Monitor your network around the clock and discover problems before they become an emergency. We support in all monitoring projects for clients and servers and evaluate monitoring scenarios to find perfect solutions for all business needs.

Our portfolio: Paessler (Gold Partner) | Microsoft (Gold Partner/Certified Training Center)

Account Hacking Prevention

Protect your company against account takeover (ATO). We support you in conception and realisation of a solution that recognises compromised account data and automatically resets passwords.

Our Portfolio: SpyCloud

Password Management

Passwords are the tickets to all processes in an organisation. Therefore, companies and their teams need a central database for a secure management of used passwords and critical business information that is also able to react flexibly to changes.

Our Portfolio: Password Safe (Certified Partner)

Network Access Control

With a NAC solution you can protect all the devices in your network against unauthorised access. A vendor-independent network access control for LAN and WLAN infrastructures protects networks against the intrusion of unwanted devices, provides an overview of all the devices in your network and thus a current IT asset management.

Our Portfolio: macmon

WLAN and Switching

Router, Switches & Co. are the basis of every network. We advise you on building, extending, updating and monitoring your network infrastructure. As an experienced partner we offer service and support for your wireless network from planning, design and deployment to operation and maintenance.

Our Portfolio: Aerohive (Authorised Partner) | Juniper (Select Partner)

You decided to attend the it-sa? Get your tickets at the TicketShop


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.