Sponsors & Exhibitors Profile

  • FinalCode Asia Pacific Pte Ltd
    Company Profile

    FinalCode offers a persistent means to readily secure sensitive files wherever they go within and outside an organization. Available as a SaaS or virtual appliance offering, FinalCode makes enterprise-grade file security easy and in a way that works with popular applications, file storage, devices, cloud and content management systems and across all communication channels: trusted, untrusted, private or public. The solution allows for user-defined and corporate policy-enforced file security with an extensive array of granular controls and the ability to remotely delete files. The company’s patented CryptoEase™ technology streamlines file security and encryption processes without requiring the user to remember passwords, and by dramatically reducing key management overhead, makes implementation of FinalCode rapid, scalable and cost-effective. Headquartered in San Jose, California, FinalCode offers its solutions through its global network of authorized partners.

    Products / Solutions

    FinalCode

  • FireEye
    Website

    www.fireeye.com

    Company Profile

    FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 6,000 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.

    Products / Solutions

    Cyber Security, Endpoint Security, Email Security, Network Security, FireEye as a Service, Threat Analytics Platform, Incident Response Services, Penetration Testing, Compromised Assessment, etc.

  • FireFense
    Company Profile

    FireFense is a Singapore‐based start-up that develops robust and secured systems. We worked closely with industry and research partners to integrate best-of-breed technologies and design bespoke solutions that solve real world security-related problems. These solutions include:

    • Mobile device management solution that is tightly integrated with a physical access control system to manage camera usage in restricted areas
    • Facial recognition solution for digital identification, service provision and digital transaction verification
    • Event management solution that supports on-site crowd management and real-time secured area access control

    Based on our track record, we have been invited to work on several proof‐of‐concept research projects and are actively looking for opportunities to explore emerging trends in cyber technologies.

    Products / Solutions

    N.A.

  • Forcepoint
    Company Profile

    Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.

    Products / Solutions

    Forcepoint technology is built from the ground up to meet four essential needs:

    • Advanced threat protection provides defenses to ensure that your critical data and business processes can be used safely wherever they’re needed — in the office, on the road or in the cloud.
    • End-to-end visibility allows you to see what’s really happening continuously throughout your network so you can better measure, manage and secure it.
    • Advanced analytics rapidly transform information from across your network into accurate insights so you can take the right actions.
    • Adaptive security allows you to apply contextual intelligence to stay ahead of evolving threats and rapidly return to normal when you do encounter trouble.