Cyber Security Fairevent

COMPUTERWELT

Halbgasse 3-5
1070 Wien
Deutschland

+43 664 8535002

digital@cwverlag.at
https://computerwelt.at/impressum/




Firmenprofil:

Die COMPUTERWELT, die seit 1986 erscheint, ist Österreichs führendes Magazin für den gesamten Bereich der Informationstechnik und Telekommunikation. Mit einer Druckauflage von 12.000 Exemplaren erreicht sie alle zwei Wochen rund 50.000 Leser. Sie richtet sich an die IKT-Entscheidungsträger in den Unternehmen. Zusätzlich zur Printausgabe erscheint die COMPUTERWELT auch Online. Auf www.computerwelt.at gibt es neben täglich aktuellen IT-News auch jede Menge Hintergrundinformation zu aktuellen IT-Themen.


COMPUTERWELT bietet Ihnen Produkte aus diesen Produktgruppen:
  • Application Security Solutions
  • Application Security Testing
  • CASB / Cloud Access Security Broker
  • Cloud App Gateway
  • Email Security
  • Email TD Gateway
  • Next Generation Firewall
  • Spam & Phishing Control
  • Unified Threat Management (UTM)
  • Web App Firewall
  • Blockchain-based Security
  • Certification
  • Cloud Security
  • Compliance
  • Cyber Security Awareness Trainings
  • Cyber Security Consulting
  • Cyber Security Insurance
  • Cyber Security Services
  • Threat Hunting
  • Threat Intelligence
  • Data
  • Archiving
  • Datacenter Security
  • Storage
  • Storage / Cloud
  • Virtualization
  • Data Security
  • Data Compartmentation
  • Data Loss Prevention
  • Data Segmentation
  • Data Tokenization
  • DRM / Digital-Rights-Management
  • Encryption at Rest
  • Intrusion-Detection/Prevention
  • Rights Management
  • Endpoint Security
  • App Whitelisting
  • AV / Anti-Virus
  • Behavior & Anomaly
  • Detection & Protection
  • EDR / MDR / XDR
  • Endpoint Protection
  • Host IDS
  • Managed Threat Response
  • Mobile Device Management
  • Mobile Security
  • Standard Operating Environment
  • Vulnerability Management
  • GDPR / DSGVO
  • Hardware-based Security Technologies
  • HSM
  • SHE
  • TPM
  • Identity Management Solutions
  • ACL / Access Control List
  • Consumer Identity
  • IAM / Identity & Access Management Identity Analytics
  • Identity Governance
  • Key Management
  • MFA / Multi-Factor Authentication
  • PIM and PAM
  • PKI / Public Key Infrastructure
  • Industrial Security
  • IoT / Internet of Things
  • KI / Artificial Intelligence
  • Made in Germany
  • Managed Security Services
  • Monitoring
  • Behavior & Anomaly Detection
  • Fuzzing
  • Log Collector & Data Lake
  • Network Traffic Analytics
  • Network Traffic Evidence & Visualisation
  • Security Analytics
  • Security Monitoring
  • Security Testing
  • SIEM
  • SOAR / Security Orchestration, Automation and Response
  • SOC / Security Operation Centre
  • Static Code Analysis
  • Threat Modeling
  • Threat Sharing
  • MSP - Managed Services Provider
  • Network Solutions
  • Advanced Persistent Threat / APT Monitoring
  • Anti-Spoofing
  • Compartmentation
  • DDOS
  • DNS Security
  • Encryption (in Transit)
  • Network IDS
  • Network Security
  • Proxy AV
  • Remote Access
  • SSL/VPN
  • UTM / Next Generation Firewall
  • Virtualization
  • Web Gateway
  • Web Security
  • Wireless Network Security
  • Physical IT Security / USV
  • Zero Trust