Menu

Company Profile

Exclusive Networks is the ‘go-to’ value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Combining specialist value-adding technical and marketing support inside each local territory, with the volume and reach of a global distributor, reseller partners rely upon Exclusive Networks to boost business opportunities and help achieve new revenues from the changing enterprise technology landscape.

Exclusive Networks continually challenges traditional VAD models, redefining value and creating differentiation. We call this ‘Disruptive Distribution’.

Exclusive Networks is an Exclusive Group company.

Exclusive Networks Seminars

  • So you think you’re encrypting…. think again! Joe Pindar  |   Gemalto  |   Wed 5th Oct 11:00 - 11:30

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 11:00 to 11:30

    So you think you’re encrypting…. think again!

    Everyone knows they have to encrypt their sensitive data, but cryptography is often seen as a dark art and complex – with terms like hashing, tokenization, symmetric and asymmetric… is it any wonder? In this workshop we’ll reveal how encryption and external key management can be a highly effective security control, yet simple to deploy with the right crypto strategy.

    Speaker

    Photo Speaker Name Profile
    Joe Pindar Joe Pindar View Profile
  • Ransomware vs. SentinelOne's Next-Generation Endpoint Protection Platform Eran Ashkenazi  |   SentinelOne  |   Wed 5th Oct 11:40 - 12:10

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 11:40 to 12:10

    Ransomware vs. SentinelOne's Next-Generation Endpoint Protection Platform

    Presents an introduction to SentinelOne’s endpoint protection platform through the eyes of a unique ransomware attack designed specifically to bypass traditional, and even ‘next-generation’ endpoint security tools. Learn how a behavior-based approach can stop even the cleverest of attacks.

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • Beyond Files: The Full Spectrum of Attacks Eran Ashkenazi  |   SentinelOne  |   Wed 5th Oct 14:20 - 14:50

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 14:20 to 14:50

    Beyond Files: The Full Spectrum of Attacks

    We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • UBA in the Real World Andy Skrei   |   Exabeam   |   Wed 5th Oct 15:40 - 16:10

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 15:40 to 16:10

    UBA in the Real World

    Andy Skrei, a Solutions Architect at Exabeam, previously worked as a Lead Security Engineer at eBay developing and deploying technologies for their global SOC. Prior to eBay he was a manager at KPMG, helping some of the larges organizations in the world increase security maturity and reduce risk. Andy has a unique view on UBA from being a customer and now deploying it worldwide at organizations both large and small.

    Speaker

    Photo Speaker Name Profile
    Andy Skrei Andy Skrei View Profile
  • Beyond Files: The Full Spectrum of Attacks Eran Ashkenazi  |   SentinelOne  |   Thu 6th Oct 11:40 - 12:10

    Cyber Security Disruptive Technologies Theatre

    Thu 6th Oct 11:40 to 12:10

    Beyond Files: The Full Spectrum of Attacks

    We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • Aligning your mobile strategy with security and end user satisfaction Sinisha Patkovic   |   BlackBerry Security Advisory  |   Thu 6th Oct 12:20 - 12:50

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 12:20 to 12:50

    Aligning your mobile strategy with security and end user satisfaction

    See how you can align mobility to your business strategy, whilst avoiding trade-offs between mobile productivity, user satisfaction, agile IT and Security.

    Speaker

    Photo Speaker Name Profile
    Sinisha Patkovic Sinisha Patkovic View Profile
  • The Security fabric and why you need one Trevor Dearing  |   Gigamon  |   Thu 6th Oct 13:40 - 14:10

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 13:40 to 14:10

    The Security fabric and why you need one

    Shutting the door once the criminal is inside is a futile exercise so we should adopt the posture that assumes someone will get in at some point. What we do next is the key to a successful defence. This is not a single box exercise but the building of a fabric of multiple vendors products. There are many challenges to this and we will look at how to overcome them.

    Speaker

    Photo Speaker Name Profile
    Trevor Dearing Trevor Dearing View Profile
  • UBA in the Real World Andy Skrei   |   Exabeam   |   Thu 6th Oct 14:20 - 14:50

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 14:20 to 14:50

    UBA in the Real World

    Andy Skrei, a Solutions Architect at Exabeam, previously worked as a Lead Security Engineer at eBay developing and deploying technologies for their global SOC. Prior to eBay he was a manager at KPMG, helping some of the larges organizations in the world increase security maturity and reduce risk. Andy has a unique view on UBA from being a customer and now deploying it worldwide at organizations both large and small.
     

    Speaker

    Photo Speaker Name Profile
    Andy Skrei Andy Skrei View Profile
  • Ransomware vs. SentinelOne's Next-Generation Endpoint Protection Platform Tony Rowan  |   SentinelOne  |   Thu 6th Oct 14:20 - 14:50

    Cyber Security Disruptive Technologies Theatre

    Thu 6th Oct 14:20 to 14:50

    Ransomware vs. SentinelOne's Next-Generation Endpoint Protection Platform

    Presents an introduction to SentinelOne’s endpoint protection platform through the eyes of a unique ransomware attack designed specifically to bypass traditional, and even ‘next-generation’ endpoint security tools. Learn how a behavior-based approach can stop even the cleverest of attacks.

    Speaker

    Photo Speaker Name Profile
      Tony Rowan View Profile

Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook