4 - 5 OCTOBER 2017 / EXCEL LONDON
Exclusive Networks

Exclusive Networks

Stand: BB8

Exclusive Networks is the ‘go-to’ value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Combining specialist value-adding technical and marketing support inside each local territory, with the volume and reach of a global distributor, reseller partners rely upon Exclusive Networks to boost business opportunities and help achieve new revenues from the changing enterprise technology landscape.

Exclusive Networks continually challenges traditional VAD models, redefining value and creating differentiation. We call this ‘Disruptive Distribution’.

Exclusive Networks is an Exclusive Group company.



CARM Curve Leaflet

CARM Cheatsheet

Vendor Overview

Cyber Attack Remidiation and Mitigation
Passport

Exhibitor Website

Twitter LinkedIn

Exclusive Networks Seminars

  • Threats are evolving. A new approach to cyber security is required. Wed 4th Oct 11:00 - 11:30

    Threats are evolving. A new approach to cyber security is required.

    “By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches,” according to Gartner Research. 

    It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.

    TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of:

    • Advanced machine analytics, which are key to discovering potential threats quickly. 
    • Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.

    Speaker

    Adam BradyMore

    Time / Place

    Wed 4th Oct 11:00 to 11:30

    CARM Theatre

  • Rise of the EMPIRE Wed 4th Oct 11:40 - 12:10

    Rise of the EMPIRE

    Dealing with today’s cyber threats requires a fundamentally different approach. In recent attacks such as the DNC hack and the wide spread attack uncovered by Kaspersky Labs in over 40 countries, we've seen the increased use of fileless attack vectors, which can easily bypass legacy AV. The truth is, legacy AV and other prevention-only solutions simply don’t cut it. Today’s advanced malware, exploits, and stealthy insider attacks will blow right by most static prevention solutions in a fraction of the time it takes to get updated with the latest threat signatures, and even then sometimes they won't work.

    Speaker

    Eran Ashkenazi

    Eran AshkenaziMore

    Time / Place

    Wed 4th Oct 11:40 to 12:10

    CARM Theatre

  • Reconciling Regulatory Requirements with Technology Wed 4th Oct 12:20 - 12:50

    Reconciling Regulatory Requirements with Technology

    The clock is ticking and GDPR is getting closer.  However GDPR is not an industry standard that relies on technology to tick the boxes, how to be compliant with the regulation will be unique to each organization.  The one constant however is the role that a secure network must play in data protection.  Whether data is being created, is in motion or at rest, protecting it from cyber-attacks requires an underlying network that is secure.  This session will focus on the role of network level security within the GDPR framework and how it can support an organization’s GDPR compliance efforts.

    Speaker

     

    Steve MulhearnMore

    Time / Place

    Wed 4th Oct 12:20 to 12:50

    CARM Theatre

  • Impact of Encryption on Networks - Key to understanding TLS 1.3 Wed 4th Oct 13:00 - 13:30

    Impact of Encryption on Networks - Key to understanding TLS 1.3

    Speaker

    Areg Alimian

    Areg AlimianMore

    Time / Place

    Wed 4th Oct 13:00 to 13:30

    CARM Theatre

  • Leveraging Context Aware Security from the Core Wed 4th Oct 13:40 - 14:10

    Leveraging Context Aware Security from the Core

    Networks are undergoing a transformation. There are new paradigm shifts like cloud and SDN, new trends like IoT, and more connected devices than ever before. Managing and securing today’s IT infrastructure and data is getting harder as networks evolve and the attack surface increases. There are security products galore, but what’s missing are integrated solutions that see the big picture, provide context, fill critical security gaps and work in unison to contain threats.

    Don’t miss this chance to learn how you can leverage security solutions that use actionable network intelligence and context to improve your security posture.

    Speaker

    Dr. Malcolm Murphy

    Dr. Malcolm MurphyMore

    Time / Place

    Wed 4th Oct 13:40 to 14:10

    CARM Theatre

  • GDPR Blueprint Wed 4th Oct 14:20 - 14:50

    GDPR Blueprint

    The new EU regulation of the Privacy world (the GDPR) is rapidly approaching.  Jason Hart will reveal a back to basics approach in relation to GDPR. Specifically, we will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.

    Speaker

    Jason Hart

    Jason HartMore

    Time / Place

    Wed 4th Oct 14:20 to 14:50

    CARM Theatre

  • PANEL: GDPR: Facts, Fiction and Myths in 40 minutes Wed 4th Oct 15:00 - 15:45

    PANEL: GDPR: Facts, Fiction and Myths in 40 minutes

    Time / Place

    Wed 4th Oct 15:00 to 15:45

    CARM Theatre

  • Cyber, EDR, Cloud, BYOD, Machine Learning…Why an automated platform beats your subconscious buzzword thinking Thu 5th Oct 11:00 - 11:30

    Cyber, EDR, Cloud, BYOD, Machine Learning…Why an automated platform beats your subconscious buzzword thinking

    Breaches are happening, and it’s headline news. In the age of big data, machine learning, security analytics and threat intelligence, why don't we have secure infrastructure? You see the buzzwords every day, but will focus on them result in better security posture and fewer incidents? In this talk, we consider the reality of today’s threats, looking past the sensationalist media coverage. There are many ways in which attackers and their toolsets have evolved, with the automation and velocity of the offensive team now being the key pain point. If you take best of breed security technology everywhere in your infrastructure, and have ticked off all your cybersecurity buzzwords, you now have secure infrastructure, right?

    Speaker

    James Holland

    James HollandMore

    Time / Place

    Thu 5th Oct 11:00 to 11:30

    CARM Theatre

  • Reconciling Regulatory Requirements with Technology Thu 5th Oct 11:40 - 12:10

    Reconciling Regulatory Requirements with Technology

    The clock is ticking and GDPR is getting closer.  However GDPR is not an industry standard that relies on technology to tick the boxes, how to be compliant with the regulation will be unique to each organization.  The one constant however is the role that a secure network must play in data protection.  Whether data is being created, is in motion or at rest, protecting it from cyber-attacks requires an underlying network that is secure.  This session will focus on the role of network level security within the GDPR framework and how it can support an organization’s GDPR compliance efforts.

    Speaker

     

    Steve MulhearnMore

    Time / Place

    Thu 5th Oct 11:40 to 12:10

    CARM Theatre

  • Psychology Behind Digital Ransom Notes Thu 5th Oct 12:20 - 12:50

    Psychology Behind Digital Ransom Notes

    Ransom Notes were used through the ages as a means to scare and cohort subject to pay, and in the digital age are massively used in Ransomware situations. Join Eran as he reviews the report prepared for SentinelOne by Dr. Lee Hadlington, from De Montfort University, explaining the evolution of ransom notes, what psychological "tricks" are used to increase payment chances.

    Speaker

    Eran Ashkenazi

    Eran AshkenaziMore

    Time / Place

    Thu 5th Oct 12:20 to 12:50

    CARM Theatre

  • “Best of breed” - are we wasting our money? Thu 5th Oct 13:00 - 13:30

    “Best of breed” - are we wasting our money?

    It’s an established mantra among many vendors that they take “best of breed” products and services to market, and many customers claim only to buy “best of breed”. Does such a thing even exist? If we actually put together a cyber security infrastructure using only  “the best” components would it even work? Ade Taylor, CTO for SecureLink UK thinks we should be talking about “best for us”, or “best for this” and forgetting “best of breed”. It used to be said in mainframe circles that nobody ever got sacked for buying IBM. Now it seems that the safe zone is “top right”, but does it make us more secure to select “best of breed”, or is it a risky waste of money?

    Speaker

    Ade Taylor

    Ade TaylorMore

    Time / Place

    Thu 5th Oct 13:00 to 13:30

    CARM Theatre

  • Turning the Tide: Fending off Cyber Threats Thu 5th Oct 13:40 - 14:10

    Turning the Tide: Fending off Cyber Threats

    Cybercriminals are Increasingly targeting the human vulnerability. With businesses more interconnected than ever and with the perimeter being progressively blurred, we will show how Proofpoint will bring a more deterministic way of building resilience into the ecosystem that protects our employees, business partners and customers from cyber threats. In this session, we will discuss how Proofpoint’s market leading and unique technology is restoring trust to today‘s number one attack vector: email.

    Time / Place

    Thu 5th Oct 13:40 to 14:10

    CARM Theatre

  • Orchestrating Security across Mixed Cloud Environments Thu 5th Oct 14:20 - 14:50

    Orchestrating Security across Mixed Cloud Environments

    Modern data centre operations embrace a wealth of innovative and next generation technologies. There is significant growth in areas such as Hyper Converged Infrastructure, micro-segmentation and advanced security techniques, and orchestration operating with multi cloud environments using both on premise private data centres and public cloud services.

    This presentation will draw these elements together to show how a single strategy can encompass all of these technology solutions, using a common approach to security and orchestration across multiple environments. We will discuss the benefits and driving forces behind these solutions and highlight key characteristics that clients should consider.

    Speaker

    Paul Brynuee

    Paul BrynueeMore

    Time / Place

    Thu 5th Oct 14:20 to 14:50

    CARM Theatre

Top