Data Terminator is a Data Leakage Protection Specialist providing certified equipment and professional services for secure electronic data erasure, destruction and IT asset disposal. It is managed by experienced and security-cleared specialists with more than 20 years of IT and security experience.
Data Terminator has a wide range of high performance and comprehensive Certified Data erasure software and Certified destruction Equipment by the US Department of Defense (DoD) and National Security Agency (NSA). It’s professional data termination services either at customer's site or at its secure facility is the only one in Singapore to be in full compliance to the required standards to give customers complete peace of mind and confidence in security. We are the only provider certified for military-grade sanitization practice in Singapore. With full commitment to the highest quality and standards, our secure data destruction and IT asset disposal processes are both ISO 9001 and 14000 certified, meeting the International quality and environmental standards.
Data Terminator is licensed by the Singapore Police Force as the authorized Security Service Provider. Certified by the MoM as a BizSAFE company in compliance to Workplace, Safety and Health (WSH) Act is utmost importance, as Equipment for operation of data sanitization.
Leading provider of Data Leakage Products and Services for End-of-Life Data
Reference operator of the ministry of Defence for the international transfer of the French military know-how to France friendly countries armed forces, DCI group has been operating across all the defence and security spectrum for more than 40 years.
DCI is a key player in the promotion of French cyber solutions abroad. DCI offers tailor-made services for consulting, training and technical assistance: academic or customised courses along with operational exercises and practices supported in particular by the Cyberdefence Pole of Excellence. DCI aims at offering France friendly countries solutions to design more easily target operational architectures, through training and practice capabilities.
Today, DCI cyber service is renowned for its know-how and focusing on reinforcing its activity by adding to its catalogue new trainings, exercises (today, a total of 30) and associated technical means. French industry promotion abroad will be enhanced in order to offer France partner nations the means to protect themselves from ever more aggressive and destructive cyber-attacks.
Technical & operational training based on the French armes forces know-how
Cyber Security at Delft University of Technology has a unique socio-technical approach towards the protection of cyber space.
| Research | Education | Collaboration |
Researchers with a background in computer science, mathematics, electrical engineering, physics, economics, ethics, and law, work together in research projects and teaching. These important joint efforts do not only focus on the prevention of incidents, but also on the detection of incidents, and the recovery. All cyber security incidents have a technical and a social aspect. Solutions have a technical core, but require a detailed understanding of the social context to be effective. Contributing to the Dutch Digital Delta, together with companies, government and other organizations, TU Delft strives to offer comprehensive solutions for a cyber secure world.
About TU Delft
Founded in 1842, TU Delft is ranked #1 university of the Netherlands. With more than 20.000 Bsc, Msc and PhD students and 3.000 scientific staff, it’s is the largest and most comprehensive university of technology in the Netherlands. TU Delft wants to make a significant contribution towards a sustainable society for the 21st century through world-class research and education.
DT Asia is a Value-Added Distributor providing BAU-friendly (business-as-usual) solutions that secure Data at Rest, Data in Motion and Data in Use. The focus in this event will be:
Fidelis Cybersecurity Solutions – Providing organizations with a fully-automated and complete compromise detection and response system to deal with any Advance Persistent Threat (APT).
Privileged Access Management (PAM) – An agentless, enterprise distributed network based monitoring solution for all HTTPS/SSH/RDP access to your critical infrastructure.
Balabit Syslog-ng Enterprise Syslog Management System - A centralized enterprise-wide unified logging infrastructure which integrates well with existing SIEM solutions that is highly secured and delivers unparalleled log integrity and performance.
Linoma GoAnywhere Managed File Transfer – Easily automate and manage file transfer processes for both user-to-user and system-to-system trading partners.
Yubikey’s Strong 2FA Authentication for Identity Access Management – Securing logins via multiple authentication protocols, enabling a single YubiKey to be used for VPN, code signing, disk encryption and authentication with hundreds of service and software providers.
NSA and EAL4+ Approved Data Sanitization Solutions – Tried and tested NSA approved degaussing equipment and EAL4+ data wiping software and appliance.
Also, defend your network with HP’s full range of Smart and Secure Print and Computing Solutions.