Technology, UAE

Security Code to showcase security expertise at GITEX

Russian independent developer of cybersecurity software, appliances and services firm Security Code will showcase its expertise at the upcoming GITEX Technology Week.

The event will see the Company’s leading experts, including Chief Technology Officer Dmitry Zryachikh, share their experience and showcase technologies for sensitive data protection at the premises, in the cloud and across the network.

During the five-day event, the Security Code stand at SR-B6 in Sheikh Rashid Hall will exhibit the company’s portfolio of security solutions including:

  • vGate – private cloud security posture management solution. It enhances cloud security, data protection and ensures compliance with security regulations. Instead of virtual machines, vGate controls cloud infrastructure management plane and hypervisor hosts itself. vGate also deny any cloud administrator access to sensitive datastores.
  • Secret Net Studio for Data – information-centric endpoint protection solution. It allows sensitive data handling control, data leakage prevention and streamline incident investigation process for highly sensitive environments. Secret Net Studio for Data creates virtual air gap for sensitive files and doesn’t allow users to transmit them outside of trusted network. With Secret Net Studio for Data customers could replace two desktops for different networks with one.
  • Secret Net Studio Trusted Environment – Unique pre-OS endpoint security solution. It controls consistency of standard endpoint protection mechanisms. It cannot be detected and deactivated remotely because it works below operating system level. It works on reserved CPU core which is separated from OS using Intel virtualisation technology. Instead of every other endpoint protection mechanism, Trusted Environment has full access to OS kernel memory, so it prevents any potentially malicious OS-level events to happen.

Security Code’s technology offerings are developed to assume that evasive attacks don’t reuse artifacts and may even use new techniques and tactics. It reiterates that technical professionals can’t rely on threat intelligence alone for catching such threats and should understand core security patterns and use alternative technologies to prevent evasive threats

Visitors to the stand can find out more about sensitive data protection, the impact of cyber war on corporate security as well as new partner opportunities.

The Security Code top management including the General Manager Andrey Golov, CTO Dmitry ZryachiKh will be available to discuss security trends and new technologies and new partnership opportunities.

Previous ArticleNext Article

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines