Our Diamond sponsor
Our reasons for taking part in IFC 2015, 7th edition
The International Forum on Cybersecurity was one of the first events to understand the new strategic and cross-disciplinary field that is cyberspace. The IFC has the capacity to bring service providers, manufacturers, users, government and local authorities together around innovative, value-added topics such as digitisation. Sogeti-Capgemini Group is proud to have been the sponsor of this high-quality event for several years already.
Digitisation affects all business sectors. It is per se linked to security obligations. Sogeti-Capgemini has shared this view for more than 5 years. By building bridges between players, the IFC gets to the very core of successful digitization, which is digital trust.
About Capgemini and Sogeti
With more than 140,000 people in over 40 countries, Capgemini is one of the world’s foremost providers of consulting, technology and outsourcing services. The Group reported 2013 global revenues of EUR 10.1 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business Experience™ and draws on Rightshore®, its worldwide delivery model.
Sogeti is a leading provider of technology and software testing, specializing in Application, Infrastructure and Engineering Services. Sogeti offers cutting-edge solutions around Testing, Business Intelligence & Analytics, Mobile, Cloud and Cybersecurity. Sogeti brings together more than 20,000 professionals in 15 countries and has a strong local presence in over 100 locations in Europe, USA and India. Sogeti is a wholly-owned subsidiary of Cap Gemini S.A., listed on the Paris Stock Exchange.
Our Platinum sponsors
Airbus Defense & Space
With its 600 cyber security experts Airbus Defence and Space (DS)- CyberSecurity, offers
its expertise and its European solutions to various customers: defence and security
organisations, governments, critical infrastructures and companies. Through its Cyber
Defence Centre, Airbus DS proposes high-grade professional services, combining
monitoring, early detection and investigation of attacks, while drastically reducing the incident
Airbus DS portfolio also includes products and solutions from the subsidiary Arkoon Netasq,
to protect networks (Stormshield Network Security), workstations (Stormshield Endpoitn
Security) and data (Stormshield Data Security).
Airbus Defence and Space is attending the 2015 edition of the Forum International de la
Cybersécurité, unavoidable rendezvous of European cyber security. At the same time a
place where to exchange views and share opinions, the FIC is also where all the actors of
innovation in the field meet, particularly with the Prix de la PME innovante (Innovative SME
award), which Airbus DS supports again.
A company that is part of Le Groupe La Poste, DOCAPOST assists companies and administrations in digital and mobile transformation.
DOCAPOST is present in the health market, the regulated professions market, banking and insurance, retail sales, energy and transportation markets, telecommunications, and the public sector to offer trustworthy solutions and services: consulting, web solutions, mobile telecom services, secured data exchange, industrial or customized desktop publishing, electronic archiving, Business Process Outsourcing…
DOCAPOST draws its strength from its extensive and skilled knowhow in data management, along with the use of the most robust recent technology, as well as from its experience in innovation and cooperation with its customers.
DOCAPOST counts 4600 employees and realized 450 M€ of consolidated revenue in 2013.
The HexaTrust club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity and digital trust.
Representative of French excellence in innovative solutions, these software vendors and Integrators have come together to provide a full range of efficient and consistent products and services dedicated to the security of critical infrastructures. This combination meets the needs of enterprises, administrations, public and private organizations of all sizes, keen to receive European and French innovative offers, covering all their IT security needs.
Building on their presence on the European market, HexaTrust members also want to accelerate their international development by sharing their experience, their networks and means of access to global markets. HexaTrust will act in close cooperation with professional organizations, users and institutional actors, working to strengthen the chain of Cybersecurity and Digital Trust groups, supporting the development of innovation and growth SMEs, future leaders of information security systems.
Orange Cyberdefense is the Group’s global response to risks and threats from the digital world.
With the digital wave and the cybercrime outbreak, companies that tread the path towards digital transformation are becoming increasingly vulnerable. In nowadays, the question is no longer whether your business will be attacked but getting your business prepared. We must therefore move from a preventive mode to a proactive mode and learn how to defend ourselves against attackers of all kinds.
Pôle d’Excellence Cyber
The Pôle d’Excellence Cyber is a cyber cluster recently set up in Bretagne by the French Ministry of Defence with support from the Regional Council. The cluster operates nationwide and aims to extend its scope internationally. It focuses on three areas:
- foundation courses, and continuing and higher education
- industrial growth with particular emphasis on innovative SMEs and SMIs
› Four objectives
- Extend the scope and use of the French Ministry of Defence’s cyber facilities available in Bretagne.
- Drive research, training provision and innovation by drawing on a solid academic and industrial base in order to boost the growth of the cyber sector including access to international markets.
- Set up a training programme in cyber operations and crisis management for public and foreign customers.
- Provide capabilities in cyber defence simulation training, practice and upskilling.
Defence: CALID Bretagne, DGA Maîtrise de l’information (DGA Information Superiority, an establishment of the DGA, the French Defence Procurement Agency), Ecole des transmissions (ETRS), Ecoles de Saint-Cyr Coëtquidan, Ecole navale, ENSTA Bretagne (engineering school),…
Economic development: BDI, Eden Bretagne, Images & Réseaux, IRT B-COM, MEITO, Rennes Atalante…
Education and training: IUT de Bretagne, CNAM Bretagne, INSA Rennes, SUPELEC Rennes, Télécom Bretagne, Université Rennes 1, Université de Bretagne occidentale, Université de Bretagne-Sud, Université européenne de Bretagne…
Business: AMOSSYS, AriadNEXT, ARX Défense et Sécurité, CLARANET, DIATEAM, GFI Informatique, OPALE Security, RUBYCAT Labs, Secure-IC, SWID, TEVALIS, 6cure …
Thales is a global technology leader in the aerospace, transportation, defence and security markets.In 2013, the company generated revenues of €14.2 billion with 65,000 employees in 56 countries.With 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements.
Our Critical Information Systems and Cybersecurity business provides security solutions for critical information systems in service with the most demanding customers. Addressing the entire information systems security chain, Thales offers a comprehensive set of solutions and services ranging from security consulting, intrusion testing and architecture design to system certification and life cycle management for security products and services.
To assure information system security, we support customers at every stage of the process, from initial risk analysis to the development of proactive security strategies to anticipate threats, avoid security breaches and provide protection from cyber attacks. Key areas of development include software solutions and outsourced management of critical infrastructure, with a focus on cloud services, Big data and the Internet of Things (IoT). The company’s end-to-end approach to critical system security and resilience engineering is perfectly aligned with the new challenges facing society today.
Our Gold sponsors
ANSSI (Agence nationale pour la sécurité des systèmes d’information) is the French cybersecurity agency and the national authority for the defence and security of information systems. Its core missions include incident response, development of high security products for governmental use, information and advisory, cybersecurity training, and qualification of trusted products and services.
Although these missions might seem simple to define, ground realities of a constantly and rapidly growing interconnected world definitely proved to be quite complex to address. As of 2014, new threats and challenges created two new priorities for ANSSI. The agency is currently working on the implementation of Article 22 of the « Loi de programmation militaire » (military programming act), which specifically deals with cybersecurity critical infrastructures. Also, in the context of the « New Industrial France » initiative launched by the French government, the agency is actively involved in the development of the French cybersecurity industry.
These various and challenging missions call for an ambitious recruitment policy on a wide range of profiles.
As it also does recognise the ever-growing importance of cybersecurity, ANSSI is one of the natural speakers of the FIC.
The trust in the digital economy require to strengthen the protection of the logical accesses to the data, to ensure the traceability and accountability of the actions and at the same time remain close to the standards and the regulations. The ambition of Imprimerie Nationale is to help communities and businesses in such an approach of Cybersecurity by favoring scalable solutions, simple to operate, particularly by taking advantage of
the reliability and the flexibility of “SaaS” services. From themanagement of professional digital identity to the deploymentof reliable digital services, Imprimerie Nationale cards multiservices, BYOD, authentification, SSO, electronic signature anddigital safe are at the heart of the concerns of the InternationalForum of the Cybersecurity participants. The Imprimerie Nationale Group is a high tech company, expert in engineering solutions for official credentials, the global management of identities and rights, the protection of sensitive data and controlling flows and complex printing processes. The Imprimerie Nationale Group accompanies actors in the public and private sectors in the creation of identity documents, the securisation of documents and in the integration of trust services and technological solutions.
As a major player in electrical engineering, information and communication systems, and related services, Cofely Ineo provides its public and private customers with overall solutions from design to maintenance.
In the field of cybersecurity, Cofely Ineo provides its customers with 3 types of solutions:
- Securing infrastructure related to industrial systems, communication networks, data centers and managed infrastructure
- Protecting sensitive data
- Maintaining information systems into secured conditions
Microsoft covers the security of information, operations and computer systems through constant efforts which launched more than 10 years ago, on January 15th, 2002, by Bill Gates initiative “Trustworthy Computing « . Microsoft is committed to delivering safer experiences for improved outcomes and economic growth. Microsoft commitments include a focus on three areas: build trust in the ecosystem, incorporate security considerations into the design & development of our devices & services, provide consulting services & expertise because effective security is as much about people and processes as it is about technology
Ministère de l’Intérieur
Ministère de la Défense
The French Ministry of Defence takes part in the International Cybersecurity Forum
The French MoD is honored to welcome you to its booth and to show where it fits in French cyberdefence.
Cyberdefence is a component of operations, seated at the heart of a layout dedicated to the effectiveness of armed forces actions. Education and training in cyberdefence are illustrated by the Citizens’ Reserve Cyberdefence component, Saint-Cyr military academy MSc. in cyberdefence operations and crisis management, and the presence of the DCI company.
French armaments procurement agency (DGA) will conduct a real-time presentation showing its work in the field of IT threats anticipation.
Defensive Computing Fight Analysis Center (CALID), center of technical and operational expertise for MoD IT systems will explain its missions of protecting armed forces cyberspace as well.
To conclude, Land Force Command (CFT) will expose its capabilities in the context of an operational deployment.
Palo Alto Networks
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content.
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 6,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, Accuvant, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, InfoSys, NTT, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA) and Council on CyberSecurity.
Societe Generale is one of the largest European financial services groups. Based on a diversified universal banking model, the Group combines financial solidity with a strategy of sustainable growth, and aims to be the reference for relationship banking, recognised on its markets, close to clients, chosen for the quality and commitment of its teams.
Societe Generale has been playing a vital role in the economy for 150 years. With more than 154,000 employees, based in 76countries, it accompanies 32 million clients throughout the world on a daily basis. It offers a wide range of advice and tailor-made financial solutions to individuals, businesses and institutional investors, based on three complementary business divisions:
- Retail banking in France with the Societe Generale branch network, Credit du Nord and Boursorama, offering a comprehensive range of multichannel financial services on the leading edge of digital innovation;
- International retail banking, financial services and insurance with a presence in emerging economies and leading specialized businesses;
- Corporate and investment banking, private banking, asset management and securities services, with recognised expertise, top international rankings and integrated solutions.
Sopra Steria, European leader in digital transformation, provides one of the most comprehensive portfolios of end to end service offerings in the market: Consulting, Systems Integration, Software Development and Business Process Services. Sopra Steria is trusted by leading private and public organisations to deliver successful transformation programmes that address their most complex and critical business challenges. Combining high quality and performance services, added-value and innovation, Sopra Steria enables its clients to make the best use of information technology.
Our Silver sponsors
6cure is an innovative company, specialized in IT Security. Her experts are world-widely recognized for their R&D activities in the field of Intrusion Detection Systems and Reaction against cyber-attacks. 6cure provides solutions for active defense against attacks on information systems and networks to guarantee the availability and quality of customers’ services.
They are based on very innovative technologies, which allow to maintain the availability and quality of customer’s network and services, by preserving the flow of legitimate transactions, whilst eliminating, in real time, malicious traffic. Thanks to their ease of use and modular implementation, they optimise the ROI from the security functions by completing and improving the existing protection systems. His solution, Threat Protection, a traffic cleaning solution, is the only European solution for complete protection, efficient and differentiated against DDoS.
Founded in 1994, ALLIACOM is a consultancy company with expertise in networks, systems and Security of Information Technology .
With its 55 employees , ALLIACOM has developed a unique offer combining a strong expertise in IT security and integration of high-tech solutions with a consulting approach proven .
In 2012, ALLIACOM has launched its service AlliaCERT (security intelligence) that has already attracted the attention of several large accounts. AlliaCERT is complemented by a comprehensive portfolio of support services and assistance dealing with incidents of security information, breach analysis and safety oversight .
ALLIACOM addresses European and African markets with the presence of a subsidiary in Tunisia.
ALLIACOM has chosen FIC 2015 to promote its new strategic service AlliaCERT; we plan to meet many decision makers, CISO and security experts during this major cybersecurity event, one hour away from Paris .
Each day, information assets of organizations become more and more valuable. Proper functioning of information systems has become vital.
Security incidents are becoming more feared, especially since the threat is real (cyber-attacks, cyber-crime, malware, denial of service, etc.) and the exhibition area increases (nomadism, cloud services, smartphones and tablets telecommuting…).
AMOSSYS assists clients in securing and defending their Information Systems consistent with their issues and needs, and offers additional services:
- SECURITY AUDIT
- CYBERSECURITY CONSULTING
- DIGITAL INVESTIGATION (CERT-AMOSSYS)
- SECURITY EVALUATION
- SECURITY STUDIES
- INNOVATIVE SOFTWARES
AMOSSYS is recognized by the highest state authorities:
- Prestataire d’Audit de la Sécurité des Systèmes d’Information (PASSI) qualified by ANSSI, the French National Security Agency
- Centre d’Evaluation de la Sécurité des Technologies de l’Information (CESTI) approved by ANSSI and accredited by COFRAC
- Certifier approved by ARJEL, the French Online Games Authority.
Choose AMOSSYS is:
- Working with independent, dynamic and agile company
- To be accompanied by cyber security experts with multidisciplinary profiles – auditors, consultants, analysts, architects – with certified skills
- A trusted relationship, with the priority given to privacy: AMOSSYS has protected office and networks with different security level.
AMOSSYS is a member of ACN, CLUSIF (French professional organizations), AFNOR (French normalization association) and Trusted Computing Group (International working group).
AriadNEXT offers SaaS solutions to secure customer enrollment: secured documents such as ID, passports, can be checked using our online services and non-secured documents can be secured using our signed bar-code technology. Based on these technologies, AriadNEXT has developed a solution to dematerialize contracts in point of sales.
Areas of expertise
Leader in secure enrollment and inventor of the 2D-Doc standard to secure documents, AriadNEXT is an expert in cyber security and the fight against theft and falsification of identity.
Our online checking solutions enable document verification in real time (ID card, residence permit, passport, proof of address, bank details, check) … Today almost 2 million records are analyzed each year on our infrastructure.
2D-Doc technology invented by AriadNEXT in partnership with the French Ministry of Interior can be used to secure any type of document with a 2D barcode electronically signed. We stamped over 160 million items on our infrastructure.
Our solution for electronic contracts in point of sales uses our checking solution combined with a reliable electronic signature process. Our SCUBE embeds a security scanner and a signature tab. Each week nearly 40,000 contracts are signed using our 2,000 S
ARX Défense et Sécurité
ARX Defense & Security is spin-off of ARX Arceo, a private R&D laboratory in the fields of digital security, data mining and image and video analysis. As a software publisher it integrates innovative technologies from collaborative R&D projects with a specific focus on Military and Security forces applications. With this strong experience in this field, ADS offers security solutions adapted to civilian companies. ADS softwares answer to needs for data and communications protection, digital forensics and heterogeneous data analysis.
Atos SE (Societas Europaea) is a leader in digital services with 2013 pro forma annual revenue of €10 billion and 86,000 employees in 66 countries. Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Security solutions, as well as transactional services through Worldline, the European leader in the payments and transactional services industry. With its deep technology expertise and industry knowledge, the Group works with clients across different business sectors: Defence, Health, Manufacturing, Media & Utilities, Public Sector, Retail, Telecommunications and Transportation.Atos is focused on business technology that powers progress and helps organizations to create their firm of the future. The Group is the Worldwide Information Technology Partner for the Olympic & Paralympic Games and is listed on the Euronext Paris market. Atos operates under the brands Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, and Worldline.
BalaBit IT Security
BalaBit – headquartered in Luxembourg – is a European IT security innovator, specializing in log management and advanced monitoring technologies. It has sales offices in France, Germany, Hungary, Russia, the United Kingdom and the United States and partners in 40+ countries. Its main development centers are located in Hungary. BalaBit has customers all over the world including 23 Fortune 100 companies.
The company is widely-known for syslog-ng™, its open source log management solution, used by more than a million companies worldwide. This significant user base has provided a solid foundation for the company’s expansion which has been fueled by Shell Control Box™, a pioneering development for the rapidly-growing privileged activity monitoring market.
Beazley is a specialist international insurance group that manages 5 Lloyds syndicates. All Lloyds syndicates are rated A by A.M Best. Beazley has been underwriting risks in France for more than 10 years, and in 2006 opened an office in Paris. In 2012 Beazley launched its Beazley Breach Response (BBR) solution to the French market, which insures businesses against cyber-crime and data breach risks. The unique quality of the BBR solution is that it does not only offer liability insurance, but also the expert services of specialist providers to help companies to manage any data breach events. By working with companies in this way Beazley offers a new vision of the role of an insurer.
A Bertin Technologies division, Bertin IT is an IT expert and provider of cutting edge software solutions for cyber-security, cyber-intelligence and crisis management media monitoring. Focused on anticipation and protection, its offering covers the security of sensitive information systems and critical infrastructures, as well as the in-depth analysis of multilingual multimedia open sources for the purpose of detecting threats and enhancing situational awareness.
Through the subsidiary Vecsys, specialized in voice technologies, Bertin IT also proposes solutions and services dedicated to automatic multilingual transcription of audio and video contents, the production of linguistic resources, and onboard voice commands.
Beyond Security’s solutions accurately assess and manage security weaknesses in networks, web applications, industrial systems and networked software. We help businesses and governments simplify and improve the accuracy of their network and application security thus reducing their vulnerability to attack and data loss. Our product lines, AVDS (network and web application vulnerability management) and beSTORM (software security testing), will help you secure your network and applications, comply with your security policy requirements and exceed industry and government security standards.
The AVDS family of network vulnerability assessment and web application security testing solutions are the most accurate and easiest to use in the industry. AVDS is available as a network appliance or hosted solution and will deliver layer 3-7 scanning to businesses and government units of any size. It will find, prioritize and manage the repair of security weaknesses in your network and web applications with the fastest setup and the least upkeep possible.
beSTORM is an enterprise strength software security testing tool that performs comprehensive dynamic security analysis on any networked software. It will discover security vulnerabilities during development or prior to product purchase without access to source code. beSTORM tests over 50 protocols and ‘auto learns’ new or proprietary protocolssuch as those used in process control or aerospace applications. Highlights: Automated binary and textual analysis, advanced debugging and stack tracing.
Bitdefender is the antimalware European specialist. Its proactive technologies are ranked n°1 in detection and resource consumption by independent test labs and protect more than 500 million users worldwide. Since 2001, Bitdefender has been an industry pioneer, introducing and developing protection technologies for the main IT market environments: endpoints, mobile devices, virtual desktops and servers. Bitdefender antimalware solutions are available as classic installation, as virtual appliance or hosted in the cloud. Bitdefender’s ability to adapt to the changing threat landscape, constantly innovate, and raise the bar in proactive anti-malware technology has made it a security technology leader.
Blancco est le leader mondial des solutions d’effacement des données et de gestion d’équipements en fin de vie. Avec des millions d’utilisateurs sur tous les continents, nous sommes la solution d’effacement préférée des instances militaires, de défense, de police, des banques et des revendeurs IT dans le monde. Fondé en 1997, Blancco propose les solutions d’effacement de données les plus certifiées de l’industrie. Blancco a son siège en Finlande et opère à travers un réseau international de 14 filiales et partenaires en Europe, Amérique du Nord, Asie et Australie. Chaque jour, Blancco améliore l’efficacité de milliers d’entreprises et de centaines
Given the level of threat posed to a business and its development by cyberattacks at the present time, organisations have to address the challenge by reviewing their defensive strategies against such attacks.
Moving from traditional forms of protection, based on knowledge of the threat and of the technologies capable of blocking it, the company has to be aware that its IT systems are continually being infected, and it needs to have procedures and tools in place able to identify unknown threats, in order to understand them and the impact they can have.
Blue Coat provides security for the largest companies in the world, as well as the most sensitive public and private organisations in France. We see FIC 2015 as the opportunity to meet them and introduce our new approach.
BT, IT network services company, provides companies with a comprehensive range of security through solutions, tools, process recognized in the security market.
With 1,300 security experts including the 350 in France, BT is the operator who has one of the largest teams of consultants and experts dedicated to services in its sector. BT has 12 SOC in the world and manage more than 300,000 devices.
BT partners with over 100 major security actors. BT is active in the security orgtanisations worldwide.
Cellebrite established its mobile forensics division in 2007, with the Universal Forensic Extraction Device (UFED). Cellebrite is the first and only mobile forensics vendor to provide flexible platform options for lab and field personnel via UFED Touch, UFED 4PC and UFED TK. It’s full range of mobile forensic products, UFED Series, enable extraction, decoding and analysis of data from thousands of mobile devices, including feature phones, smartphones, portable GPS devices, tablets and phones manufactured with Chinese chipsets.
Certissim is the number one fraud protection system on the French market. Its role is to protect e-shops against fraud risks thanks to a shared scoring system with a database of more than 20 million consumers. For 15 years Certissim adapts and anticipates e-commerce developments to resolve the various problems of its customers. Internet fraud is changing, more sales equals more fraud and Certissim also teaches consumers how to avoid fraud risks. This educational approach is essential because the e-commerce is becoming more democratic due to its convenience and the wide choice it offers.
Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled code in all major coding languages and identify its security vulnerabilities. With Checkmarx’s CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.
Check Point Software Technologies Ltd, the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process.
CONTEXTE Les entreprises, vos métiers, sont de plus en plus séduits par l’opportunité de souscrire à des services Cloud et pour cause, les bénéfices y sont grands : réduction des coûts, évolutivité, accessibilité, capacité de mise à niveau, résilience, etc. RISQUE Cet engouement pour les services Cloud est aujourd’hui ralenti, voire stoppé, par un frein principal : les données. Les entreprises disposent de données sensibles méritant une attention toute particulière et la compromission de celles-ci peut avoir des conséquences graves en cas de fuite de données, violations de réglementations spécifiques à des secteurs d’activité ou de lois sur les données personnelles et/ou de
Cisco delivers intelligent cybersecurity for the real world, providing one of the industry’s most comprehensive advanced threat protection portfolio of solutions that is integrated, pervasive, continuous, and open. Cisco’s threat-centric and operationalized approach to security reduces complexity and fragmentation while providing unmatched visibility, consistent control, and advanced threat protection across the entire attack continuum – before, during, and after an attack.
Founded in 1996, Claranet has evolved from being a pioneering ISP (Internet Service Provider) into one of the leading independent MSPs (Managed Services Provider) in Europe, offering businesses integrated network and hosting services. It was recently recognised as a ‘Leader’ in Gartner’s Magic Quadrant for European Managed Hosting. The company has annual revenues of around €160million, circa 800 employees, and an international footprint in six countries. While Claranet has grown internationally, the focus has always been on local service, out of local offices, using local data centres.
Claranet brings together the best people, process and technology to provide flexible, secure and cost-effective managed services that guarantee network and application performance. We allow customers to focus on their core business, not IT management.
Claranet accreditations : PCI DSS, ISO27001, ISO 9001, Hosting of Private Medical Data through Grita, its French subsidiary.
CS, your trusted partner
Designer, integrator and operator of critical systems, CS posts a turnover of € 162 million with 1,730 employees worldwide. Integrator and editor of security solutions, CS protects your infrastructure and your data.
For the 7th International Forum on Cybersecurity, CSwill presentitsEuropean SIEM (Security Information Event Management), based on open source: PRELUDE, allowing security events supervising in real-time. PRELUDEis intended forlarge organizations, small and mid-sized company, and may be proposed in a Security Operation Center with added-value services such as prevention, remediation, forensics and intervention.
With its range of services Trusty, CS also secures data, users, fixed and mobile communications, and multi-level critical interfaces and mission-critical applications.
CS protects end-to-end your information system and your communications infrastructure: security governance and performance of the network, PKI and encryption, electronic signature, time stamping, probative value archiving.
At CybelAngel, we have developed a Big Data technology that identifies data leaks and technical threats in real time. Our proprietary algorithms scan the Web massively and with a high frequency. The collected data are then automatically filtered and analyzed by our team of analysts. If it proves critical, alerts are quickly sent to our customers, most of them part of the French CAC 40.
Our innovative technology allows us to monitor:
- The Dark Web : real-time scanning of open communication channels commonly used by hackers. We identify threats that target our customers or their subsidiaries.
- The Deep Web : active watch on specific ports of freely available IP addresses. We are able to detect unprotected hardware as well as sensitive files.
n France, Deloitte calls on diversified expertise to meet the challenges of its clients of all sizes from all industries – major multinationals, local micro-companies and medium-sized enterprises. With the expertise of its 9 000 professionals and partners, Deloitte France is a leading player in audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.
With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte’s approximately 210,000 professionals are committed to becoming the standard of excellence.
DenyAll is a European software vendor, an expert in next generation application security. Building on 15 years of experience securing web applications and services, the company keeps on innovating to meet the needs of organizations of all sizes, worldwide. The company leverages an ecosystem of value-added resellers, outsourcers, hosters and cloud players. A member of Hexatrust, the association of French IT security vendors, DenyAll partners with other vendors to deliver innovative, integrated solutions.
DIATEAM is a R&D company that offers industry-leading systems for cyber security training that are easily and intuitively operated.
Operating in a thriving market
With forecasts of heavy demand for cyber-security professionals through 2020 and beyond, private and public sector organizations continue to develop outreach programs all over the world.
Existing cyber security training and personnel development programs, while good, are limited in focus and lack flexible and costless simulation capabilities. In order to effectively ensure continued technical advantage and future cyber security expertise for its customers, DIATEAM offers the perfect simulation solution to develop a technologically-skilled and cyber-savvy workforce. DIATEAM’s products are easily deployed to support the development, test, experimentation and training of cyber tools and techniques.
The right product portfolio
DIATEAM sells a comprehensive range of appliance-based and software-based systems that enable complete cybersecurity expertise through hybrid network simulation.
HNS CYBER LAB & HNS CYBER TRAINING CENTER : help define and build security solutions by allowing modeling and simulation of complex IT infrastructures and advanced threats. DIATEAM commercializes a software solution for efficient network emulation, virtualization, and integration for training, platform validation, rehearsals, and evaluations. HNS PLATFORM is the ideal solution supporting the development and test of tools and techniques, and the training of today’s cyber security workforce.
- Government agencies
- Consulting companies
- Managed Security Service Providers
- Academic organizations
EBRC & Guidance Software
Best Security Services to safeguard your business
ICT specialist founded in 2000, EBRC is an European player dealing with information management and critical infrastructure through 6 « Trusted » offers. Built on Tier-IV certified Data Centres, EBRC leverages Cloud, Managed and Security Services. Those last ones include consultancy and SaaS solutions, covering Security Operations, SIEM, Forensics, Vulnerability Management and audits.
Guidance Software is recognized worldwide as the industry leader in endpoint investigation solutions for security incident response and forensics analysis. The EnCase® Enterprise solution, deployed over 20 million endpoints, is used by more than 70 percent of the Fortune 100 as well as by government agencies to conduct digital investigations of servers, laptops, desktops and mobile devices.
Econocom-Osiatis is a result of the acquisition of Osiatis by Econocom,a European provider of business-to-business digital services. With 7,000 employees in 11 countries, Econocom-Osiatis is a major player specialising in infrastructure services (IT governance and security, architecture consulting, tool and cloud transformation engineering, outsourcing, critical maintenance) and infrastructure-related applications (portals, collaboration, remote access for mobile workers, business intelligence, etc.). Its expertise ranges from data centres and user environments, including mobile devices (tablets, smartphones, etc.), to networks and business applications.
ERCOM is a French company, providing solutions to improve the use and privacy of voice and data telecommunication resources for enterprises, administrations and governments.
Since 1986, ERCOM has developed products requiring expert knowledge in the field of information security. Its market vision enables to offer long-term and adapted solutions to customers‘ present and future needs.
Ernst & Young
EY is a global leader in cybersecurity. EY has an integrated organization that ensures cooperation between its various specialists and representation in many countries around the world. The practice provides assistance both on prevention work (security audit, penetration testing, ongoing assistance in implementing security organizations, etc.) and in seeking and handling security incidents (analyses of logs and network data, computer forensics, etc.). The multi-disciplinary character of EY’s teams enables them to offer services across a whole range of business line, IT and legal skills. EY works completely independently with regard to software vendors and IT outsourced providers which allow the firm to be recognized as a major player at the global level.
ESET is a pioneer in the antivirus industry with its award-winning NOD32 technology celebrating its 25th anniversary in 2012. ESET advanced security solutions are trusted by businesses and consumers around the world for protection against today’s most sophisticated cyber attacks. On a daily basis, we protect millions of users across all types of environments – be it computers, laptops, mobile devices or servers.
For more than 20 years, ESET development teams have been engineering security solutions that focus on highly effective detection with a low system footprint, which is why our Live Grid® scanning engine intelligently combines a variety of detection techniques without hampering productivity.
Estonian Ministry of Defence
Estonian booth will showcase the Estonian experience in public-private co-operation in conducting cyber security. Representatives from the Estonian Ministry of Defence, the Estonian Defence League’s Cyber Defence Unit, the NATO Co-operative Cyber Defence Centre of Excellence and the Estonian Government’s e-governance showroom will exhibit their experience and capabilities. Three private companies, Cybernetica, BHC Laboratory and Vequrity will show, how the strong private-public partnership has materialized from the private sector’s point of view.
Estonian Defence Force’s Cyber Range Capability is a platform for conducting cyber defence training and exercises from individual training to strategic-level large scale collective exercises.
e-Showroom: Interaction among government agencies, and between the government and citizens, has been completely transformed in e-Estonia. The e-Estonia details the methods by which Estonia is using advanced technical solutions to create a stronger economy, a better community and a brighter future.
Cybernetica develops secure information sharing and processing solutions for governments and companies. Our SDSB service bus is the foundation of e-governments in Estonia, Azerbaijan and Namibia. The Sharemind application and database server can process encrypted information without decrypting it. Our goal in FIC is to introduce our novel technologies and initiate collaborations.
Vequrity: The training is a critical component for building cyber defence capabilities in any organization. Unfortunately, today’s technical IT security trainings are mostly theoretical and do not provide sufficient hands-on experience. We will demonstrate how to increase drastically practical component of the trainings and use the experience of large scale cyber defence exercises in the cyber capability building process.
BHC: bringing together cyberspace and security experts, BHC Laboratory provides tailored cyber security solutions and expertise in technology, leadership and communications.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Platform provides real-time, dynamic threat protection without signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. FireEye has over 2,700 customers across 67 countries, including over 157 of the Fortune 500.
Founded in 2000, Fortinet is a global provider of IT security solutions. The company designs, develops and markets solutions that provide organizations with the power to protect and control their IT infrastructure, while optimizing performance, simplifying management and reducing costs. Pioneer and a market leader of Unified Threat Management (UTM), Fortinet has more than 160,000 customers across the globe, protecting organizations of all sizes and verticals. Its customers include SMBs, large enterprises, service providers, telecommunications carriers and government entities. During the last 13 years, Fortinet has continued to innovate on its FortiGate platform and enriching its solution portfolio with products that provide protection at and around the gateway. Today, Fortinet provides broad, integrated, and high performance protection against dynamic security threats while simplifying the IT security infrastructure for enterprises. US company headquartered in Sunnyvale, California, and went public on Nasdaq in November 2009, Fortinet has more than 30 offices around the world. In Europe, technical support and research lab are based in Sophia Antipolis, France. The French sales team is based in Paris La Défense.
Gfi Informatique is a major player in value-added IT services and software in Europe. It occupies a strategic position in its differentiated approach to global firms and niche entities. With its multi-specialist profile, the Group serves its clients with a unique combination of proximity, sector organisation and industrial-quality solutions. The Group has around 10,000 employees and generated revenue of €743 million in 2013.
Gfi Informatique is listed on the Paris Euronext, NYSE Euronext (Compartment B).
ISIN Code: FR0004038099.
Product Overview: VigieSI (SIEM)
VigieSI is a security management solution that belongs to the SIEM product category (Security Information and Event Management). Its main advantages reside in its ability to perform a real-time analysis of the Information System activities and to detect attacks through advanced correlation engines. Moreover, it offers the capability to react to cyber-attacks. VigieSI is a French and reliable solution marketed by Gfi Informatique since 2011.
N°1 insurance broker in France since 1992, Gras Savoye is established in more than 30 offices in France and 5 overseas departments. Gras Savoye has also built a substantial presence in 50 countries abroad. With a presence in Europe, Africa, Middle-East and Asia, Gras Savoye employs more than 3 800 people worldwide for a turnover of 543.6 M Euros en 2013.
Gras Savoye, broker for thousands of companies of all sizes, has been involved in many national and international projects requiring specialist skills. Its expertise has allowed the group to become a partner of trust for major construction projects and engineering structures, as well as for the organization of worldwide sporting and cultural events…
HARMONIE TECHNOLOGIE is a French consulting and technical expertise firm, specialized in INFORMATION SECURITY SYSTEM. With both functional and technical skills, HARMONIE TECHNOLOGIE is able to deliver a 360 degrees services to its clients on all security issues :
- GOVERNANCE, RISK & COMPLIANCE
- IDENTITY AND ACCESS MANAGEMENT
- PROTECTION DATA AND ASSETS
Huawei is a leading global information and communications technology (ICT) solutions provider with the vision to enrich life through communication. Driven by customer-centric innovation and open partnerships, Huawei has established an end-to-end ICT solutions portfolio that gives our customers competitive advantages in telecom and enterprise networks, devices and cloud computing. Huawei’s 150,000 employees worldwide are committed to creating maximum value for telecom operators, enterprises and consumers. Our innovative ICT solutions, products and services have been deployed in over 140 countries, serving more than one third of the world’s population. Founded in 1987, Huawei is a private company fully owned by its employees.
IBM is a $100B company (rounding up) in terms of revenue.
We do business in over 170 countries and have 5 key business segments
Over the years we have been remixing our portfolio to more software and services…less hardware. The segment profit shows that shift.
An interesting data point is about half of our 400,000 employees have less than 5 years at IBM due to acquisitions, outsourced companies to IBM and increased population in growth markets. Over 1/3 of our employees do not work at an IBM office, they either work from home, mobile or at a client site.
These 2 data points gives us some interesting challenges to integrate cultures, share our values and provide services.
We are at our core a company built on innovation. As the #1 recipient of US patents in 2013 .
Our business model : Helping clients succeed in delivering business value by becoming more innovative, efficient and competitive through the use of business insight and information technology (IT) solutions, and providing long-term value to shareholders
Summary of how our strategic beliefs come together to form IBM’s strategy.
IBM’s strategy is one of innovation, transformation and a constant evolution to higher value.
Our strategy is built on the foundation of the three shifts and strategic imperatives … and it enables us to execute on our growth plays.
We make markets by transforming industries and professions with data.
We remake enterprise IT for the era of cloud.
And we enable systems of engagement for enterprises, and lead by example.
When we put it all together, we will deliver on our purpose: to make IBM essential
In 2012, Ginni Rometty took the helm as IBM’s 9th CEO. She has placed a renewed focus on delivering a signature IBM client experience and making IBM essential. She has articulated the important link between client experience and engaged employees … and has positioned IBM to lead in a era being shaped by data, remaking of enterprise IT forged by Cloud technology and new forms of engagement emerging from social and mobile technology.
In 2014, IBM announced the formation of the Watson Group – ushering in the era of cognitive computing.
Clients are interested in how IBM went from serious financial difficulties in the early 90s to over a decade of financial strength with double digit earnings per share growth. Our lessons learned can accelerate the 10 year Globally Integrated Enterprise journey for our clients.
Ilex International is a software provider specialising in IAM (Identity & Access Management).
Provider to most of the blue chip companies, throughout the past 20 years, Ilex International has developed proven expertise in data access control and the management of identity and rights repositories.
Ilex International’s offering is centred around 4 products:
- Sign&go: Strong Authentication, Access Control, Global SSO (Web Access Management and Enterprise SSO) and Identity Federation
- Meibo: Business workflows, Provisioning, Identity and Rights management
- Meibo People Pack: A « turn-key » solution for managing user lifecycles and their authorisations on the information system.
- IDen Park: A solution for managing authentication devices lifecycles (smart cards, USB keys, badges)
Ilex International will exhibit at the FIC 2015 Show, on the HEXATRUST stand. The HEXATRUST association was founded by Wallix, OpenTrust, Deny All, Ilex International, Netheos, The GreenBow, In-Webo, Olfeo, Brainwave, VadeRetro Technology and Bertin Technologies in order to provide entreprises and public organisations of all sizes with an efficient, consistent and comprehensive range of products and services dedicated to the security of critical infrastructures.
Interdata, a leading network solutions integrator in France, has gained a reputation for excellence through the delivery of highly scalable and secure networks at major enterprise, government and carrier customers. Interdata will be present with Hexis Cyber solutions (full spectrum threat remediation that includes removal of threats automatically or machine-guided based on user-defined policies) and Allot (ServiceProtector to Guarantee Service Continuity and Ensure Network Integrity protects service providers against malicious activity and prevents domain blacklisting.
For 20 years, Intrinsec has been building and maintaining trust with its customers.
Whether your needs are focused on protecting your information, dealing with cybercriminality or related to cyberdefense, Intrinsec brings innovative services to build and support your strategy.
This approach, which benefits from different labels (ARJEL, CERT, PASSI), is based on four domains:
- Information security assessments (penetration tests, audits)
- Consulting (CISO support, part-time CISO, awareness and technical trainings, business continuity)
- Managed Security Services through I-SOC, the security as a service offer:
- Anticipation: information security watch, cyber threat intelligence, vulnerability management
- Detection: intrusion detection services, managed SIEM service
- Response: incident response by the CERT-Intrinsec
- Innovation: R&D, proofs of concept, technical studies focused on vulnerabilities
Our business: preserving yours.
In-Webo provides frictionless 2 and 3 factor authentication and online transaction sealing that protects digital identities, thereby protecting your business in a connected world.
In-Webo enables easy, massive and on-time rollout with its highly secure tokens. Its unique, patented and certified technology uses dynamic keys. Turn your laptop,tablet, phone or smartphone, TV into a 2-factor authentication and align your security with your business requirements whether you are a business, a service provider or a SaaS vendor !
IN-WEBO PRODUCTS – In-Webo offers global online service to make the authentication agile and easy for the user but also for the IT team: HSM based servers, automatic provisioning, flexible management, several flavors of token including mobile, desktop, agentless, in-app tokens, and a password manager.
Lexsi was born to defend companies’ critical cyber-assets. 15 years after its creation, Lexsi’s services help protect 600+ customers, lot of them among the most exposed organizations in the world and orchestrates its offer around 2 axes: anticipation and retaliation.
Anticipation consists in providing customers with the means required to limit their risk exposure and get poised for a possible breach:
- Get a clear and unbiased view of our customers’ security posture
- Design an actionable security improvement plan
- Evangelize employees
- Know the enemy
Retaliation is a post-incident, quick-response process that aims at breaking an attack in no time and at minimizing its aftermaths:
- Immediately assess the span and scope of the incident and design a first-level response that stops proliferation
- Manage public and customers relations, maintain trust
- Provide custom eradication tools
- Monitor both visible and dark web
- Take down hosted malicious services
LogPoint A/S is European pioneer in SIEM, introduced to the market in 2008. Cyber crime is one of the company’s core competencies and by utilizing this leading technology, over 250 clients globally are currently enjoying the most flexible yet simple platform available for reliably collecting, analysing and monitoring their data. From applications, databases, and infrastructure, to sensitive assets, manufacturing systems, and security systems.
LogPoint’s sales and support offices are located throughout Europe and their strategic partnerships reach across the globe.
Phone: +33 1 46 96 56 99
LogRhythm is the leader in security intelligence and analytics and empowers organisations around the globe to rapidly detect, respond to and neutralise cyber threats. The company’s patented and award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, as well as advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides compliance automation and assurance, and enhanced IT intelligence.
The FIC provides the company with an opportunity to showcase its security intelligence solutions and enables LogRhythm to contribute to wider discussions on the cyber security landscape, along with other industry experts, and share its expertise with more inexperienced professionals in a bid to strengthen today’s fight against cybercrime.
McAfee – part of Intel Security
McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world.
NBS System evolves in the world of IT security and web hosting since 1999.
Expert in security of web applications, we offer penetration testing solution services and a high security solution of platform hosting.
With more than 3,000 managed services, NBS System has seen 8% of French web users on the first day of summer sales in 2014; As such, this represents more than 480 million euros passing through our infrastructure, placing us as the leader in e-commerce and managed services in France. More than a services provider, NBS System works in partnership with its customers to provide the highest level of requirements in terms of safety, performance and support.
NBS System will take part in the FIC 2015 because we have concentrated since 4 years all our efforts on a major challenge: high security hosting. The combination of our expertise in security and managed services allows us to meet this objective: high security private Cloud. Only a company specializing in penetration testing and managed services could offer a cloud like this, called CerberHost. Challenged and tested repeatedly by IT security experts, CerberHost has never been compromised.
NBS System in 2014 is also: 122% of order growth, 5 million euros in turnover and 40 employees.
Specializing in Cybersecurity for over 15 years, the Group NES relies on its
Complementary Skills Centers to answer its customers’ needs.
- Audit and consulting
- Solution Integration
- Operational Security Outsourcing
- IT Staffing
NES innovates by developing methodologies and tools that will allow CISO to fight against all threats that target the IS.
It is with great pleasure that we would like to welcome you to our Booth (No. E9) and answer your questions.
Created in september 2012, Numergy is a company specialized in the construction and exploitation of Cloud computing infrastructures designed for France and Europe. Fortified by its shareholders SFR, Bull, and the Caisse des dépôts, Numergy has been conceived to be a real « digital energy power station » in the service of economy and growth. Its mission: Providing to companies (small, medium and big) and public organizations secured, efficient, and competitive computer resources. Numergy guaranties and commit to the high availability of its infrastructure, but also to the localization of the data in the French territory.
Nware is a company created on a strong idea « make IT simple. », and located in Paris.
Nware brings skills and experience to audit,install, optimize and secure virtualized infrastructures.
Our solutions :
- NSecure 360 targets weaknesses of the security’s infrastructures privileged access,web security,IS supervision ,Availability management
- DCIAM is our « on demand secured » datacenter in a minute offer
- VDIAM is an instant, turnkey, secured, VDI deployment.
Olfeo Software facilitates organizations to manage, monitor and secure their Internet traffic in compliance with cultural and legal requirements of their respective market using 5 complementary products :
- Proxy cache QoS
- URL filtering
- Protocol filtering
- Mobility controller.
Olfeo provides French, Belgian, Swiss, German, Luxembourgish, Moroccan, Tunisian and Algerian edition of its software. This local approach offers the best and optimal legal protection, an unrivalled filtering quality and a high level of security for your information systems.
Ofleo provides too an international edition, ideal projects spanning multiple countries around the globe.
This strategy, focused on innovation, has been overwhelmingly popular, and has attracted over 2.000 customers representing 3 million users.
Olfeo Software provides a unified and multilingual administration console and a unique technical architecture ensuring very high performances.
Olfeo, french software vendor, participates in FIC conference to accelerate its European and international development (North Africa, Germany, Switzerland, Belgium …). Because of its multi-local innovative approach Olfeo tailors its local or multi-country solutions to each individual market in order to meet each company and government agencies specifics needs concerning Internet security.
Opale Security’s IT security consultants offer effective and practical consulting services on information system security and embedded devices (Internet of Things). Each member of our team of former security managers and recognized technical experts has more than 10 years of operational experience. We offer services that help our clients to manage risk effectively. Our approach is practical. Constant monitoring and frequent intrusion testing engagements enable us to control and manage threats to information systems. We also have the ability to anticipate how threats will evolve over time. Our experience enables us to develop effective solutions and offer customized security measures to our clients.
OPALE SECURITY deals with research projects linked, amongst other things to the security of embedded systems. We have obtained a certification, under the french research tax credit, for organisations carrying out for thirds, operations of research & developpment for a period of 3 years (2014-2016). As part of this system, our customers rely on our expertise in R & D and can deduct from their research project part of all related expenses (subject to compliance with applicable regulations).
Openminded Consulting is a French company created in 2008 and specialized in IT security services. Its mission is to offer a wide range of high value-added services to large companies and institutions. The significant growth of the company in recent years has allowed us to ascertain our expertise and continue our development to tackle ever more demanding and complex issues from the market and clients. This how we managed to develop an offer of security managed service (MSSP), strengthen our technical audits capacities (Pentest) or even started offering Cyber surveillance services with an innovative partner possessing disruptive technology. We also maintain our growth in our « historical » core competencies: Skill Delegation, Expertise, Consulting, Integration and Managed Services.
The rationale behind our participation in the FIC for the time is two-fold:
- First, that of contributors, to be able to discuss with participants on the topic of cyber security, share feedback, best practices and learn from our peers.
- Second, that of partners from large companies and institutions: through the FIC, we wish to propose our services in markets that we did not previously tackle thoroughly (large institutions, defense sector) with a mature and sharp offer and approach players from the Northern area (and more broadly in neighboring countries) to present the objectives of our newly opened Lille agency
OpenTrust is a leading provider of trusted identity-based solutions for protecting credentials, data and transactions. We are also an internationally recognized Certification Authority. OpenTrust’s two major product lines are available as a cloud service or under a software license:
- Trusted Identities, featuring strong authentication and certificate lifecycle management for any type of media or device (PC, smartphone, tablet, badge, token)
- Trusted Documents & Transactions, featuring digital signatures, confidentiality and proof management.
The OVH group was founded in 1999, a time when very few recognised the potential of the internet. Since then, OVH hasn’t stopped innovating at the heart of the internet, datacentres and networks, and is now a market leader in cloud computing in Europe.
With the OVH.com, So you Start, RunAbove, Kimsufi and hubiC brands, the OVH group offers simple and powerful tools and solutions. They put technology to the service of business and revolutionise the working practices of 700,000 customers across the globe.
The company has also chosen to build a fully redundant network. It has put multiple security measures in place to eliminate any risk of failure.
The OVH key figures
- 3rd leading hosting provider worldwide, number 1 internet hosting provider in Europe and France*
- 180,000 servers
- 17 active datacentres, 2 in development
- 3 Tbps bandwidth
Ping Identity, the Identity Security company, believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 2,000 companies, including half of the Fortune 100, rely on our award-winning products to make the digital world a better experience for billions of people. “Forrester Research recognizes us as a leader in Identity and Access Management, IDC notes our leadership in Federated Identity Management and according to Gartner, we are a leader in the IDaaS market. » Andre Durand, Ping Identity CEO.
Prim’X Technologies develops encryption software to efficiently prohibit unauthorized access to sensitive information whether local or remote, stored or exchanged.
Main Prim’X encryption software:
• ZoneCentral : Protection of files stored on workstations, peripherals and servers
• Cryhod : Protection of laptops with pre-boot authentication and full-disk encryption
• ZonePoint : Encryption of data shared on MS SharePoint and filing security
• Zed! : Encrypted containers for data archiving or email exchange (free reader available for all operating systems and platforms)
• ZedMail : Email confidentiality through end-to-end encryption with password or certificate authentication
Proofpoint Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.
Provadys est un cabinet d’audit et de conseil spécialiste des technologies de l’information. Nous accompagnons les organisations dans leurs grands projets de transformation. Pour appréhender au mieux les défis de la gestion des risques liés aux SI, Provadys tire profit de son ancrage multi- sectoriel. L’approche globale que nous mettons en place combine expertise en matière de gouvernance et de transformation des SI et gestion globale des risques au bénéfice d’une approche spécifique des risques IT. Ainsi, cette dernière se déploie en trois axes : la sécurité des SI, la conformité et la résilience. Trois chiffres clés : • 300% de croissance en 5 ans • 50 collaborateurs
Return Path is a consumer intelligence company. We analyze the world’s largest collection of email data to show marketers how to stay connected to their audiences, strengthen their customer engagement, and protect their brands from fraud. Our solutions help mailbox providers around the world deliver great user experiences and build trust in email by ensuring that wanted messages reach the inbox while spam and abuse don’t. Consumers use Return Path technology to manage their inboxes and make email work better for them.
The company’s main product is PROVE IT, an autonomous and non-invasive software appliance.
PROVE IT adds an additional level to your security policy by including traceability and privileged users control : PROVE IT monitors, tracks and records user sessions to your sensitive systems for an immediate or a future vizualisation.
Scassi is an engineering, consulting and auditing company, specialized in information systems and embedded systems security. Our mission: to prevent and manage risks in any critical information system. We combine two types of expertise. First, we deal with technical security: i.e. project security, auditing, Pentesting, software security. Second, we manage organizational security: consulting, methods, norms, training and awareness-raising on IS security topics.
Located in Toulouse, Paris and Madrid, we manage risks for large industrial companies, for banking institutions and administrations.With 1.5M€ of revenue and 20 persons in our team, we have developed over the last 10 years, the following distinguishing expertises:
- We are able to combine technical, organizational and functional approaches
- We master security in critical and embedded components
- We deal with security inside safety
- We address Defence, Space and Nuclear markets
Innovation is at the heart of our strategy and we dedicate each year 15 % of our revenue to R&D. We have developed an innovative offer for training and awareness raising in cybersecurity : PHOSFOREA®.
PHOSFOREA (www.phosforea.com/demo) is a Market Place. It includes services, pedagogical contents, a methodology and an innovative platform enabling course personalization and transmission of knowledge and know-how in cybersecurity.
Secure-IC is a provider of computing security technologies for embedded systems to protect them from malevolent attacks and cyber threats.
The world is becoming more and more connected. Our Government and Commercial customers are challenged to achieve the highest levels of digital trust in their services. Secure-IC helps them keep up with the ever-evolving complexity of cyber threats and prepares them for tomorrow, today.
Company: Sentryo develops an innovative approach to secure critical industrial systems by bridging the gap between two worlds: OT (automation) and IT. The company primarily targets energy, manufacturing, public utilities and transportation industries.
Solution: Sentryo ICS CyberVision protects Industrial Control Systems (ICS) against cyber breaches by providing a total situational awareness to the network manager, by detecting abnormal behaviors and by complying with new regulations. With Sentryo ICS CyberVision, the asset owner manages its cyber risks by implementing cybersecurity best practices and by actively monitoring its industrial control system.
Solucom is a management and IT consulting firm. Solucom’s clients are among the top 200 large companies and public bodies. Solucom is able to mobilise and combine the competences of 1300 employees on its clients’ behalf. Our mission statement? To place innovation at the heart of business lines, target and steer value-added-generating transformations, and make the information system a true asset serving corporate strategies.
Sophos is the first European-based vendor of security solutions for businesses. With nearly 30 years of experience in IT Security and six Research and Development sites in the European Union, Sophos provides complete IT Security solutions to businesses and public organizations of all sizes. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs – a global network of threat intelligence centers, and provide the best protection against complex threats and data loss.
Splunk products make Machine Data Accessible, Usable and Valuable to Everyone
The modern enterprise requires security technologies that can adapt to a dynamic threat landscape, evolving adversary tactics, advanced threats and changing business demands. To meet these new requirements, security teams need to have advanced analytics capabilities to rapidly implement new threat detection techniques.
The Splunk App for Enterprise Security runs on top of Splunk Enterprise to identify and address these emerging security threats through the use of monitoring, alerts and analytics. Suitable for a small security team or an enterprise security operations center, the app is the primary data interface for the security professional faced with a growing list of challenges.
Data breaches have risen sharply in volume and in frequency, with strong impacts on companies business. According to the « Cost of Data Breach (2013) » report, a single data breach has an overall cost of about 2,9 million euros.
Swid specialises in solutions to avoid confidential data from being compromised:
- Data fragmentation to ensure non exploitation of stolen data.
- Database watermarking to enforce traceability on stolen data and to guarantee rightful ownership.
- Check databases to enforce integrity.
Swid offers professional services for successful deployment of data protection solutions: strategic advice beforehand, analysis and integration into the information system, technical training and support.
At Symantec Corporation (NASDAQ: SYMC), we protect your information wherever it’s stored, accessed or shared. Founded in April 1982, Symantec operates the largest civilian cyberintelligence threat network in the world. The company’s more than 20,000 employees reside in more than 50 countries and are pioneering new solutions in growing markets like backup appliances, mobile, cloud, advanced threat protection, data loss prevention, and managed security services. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion.
TEVALIS is a company specialized in security audit, whose philosophy is to study the infrastructures in their complete ecosystem according to the attacker point of view. The aims are to detect the vulnerabilities and to identify complex attack patterns, as well as the obvious ones.
To answer the issues of the protection of business assets, TEVALIS offers the following services:
- security audits ;
- support for setting up of security measures ;
- awareness campaign of risks and issues.
The TEVALIS offer takes into account the organizational and informational fields as well as the physical and technical ones. The aim is to be as global as possible.
Thanks to its modeling and analysis software named InfraSec, TEVALIS provides a clear and relevant vision of an infrastructure that includes subcontractors and human among others. Combined with an innovative audit methodology, InfraSec identifies vulnerability areas and attack patterns to reach the vital elements of the infrastructure. To make the analysis easier, the results are ordered by efficiency, in terms of cost and time. Finally, InfraSec allows to optimize the application of the security measures thanks to an analysis of the impact on the entire infrastructure.
TheGreenBow, a French company, is dedicated to building strong and reliable IT security products, yet easy to use. We are focused on Communication Encryption. TheGreenBow VPN Client is one of the leading products worldwide and the only IPsec VPN client to achieve
CC EAL3+ certification.
CryptoMailer provides an unrivaled ease of use for sending encrypted email, making email encryption as simple as sending an unencrypted email.
TheGreenBow Solutions are scalable and perfectly integrate with existing IT-Infrastructures (PKI, Token Management, deployment tools etc.).
The “Premium” product line is particularly suited for large companies and government administrations.
TheGreenBow – useful innovation.
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.
Our mission is to keep emails safe and convenient.
Vade Retro is the next-generation email-filtering platform, and the only solution today capable of classifying emails by priority, and eliminating low priority emails (Graymail) using an automated safe unsubscribe. Vade Retro’s heuristic filtering engine has the industry’s best record for ensuring zero-day responses against security threats and low-volume botnet attacks. Vade Retro gateway solutions (Cloud and Virtual MailCube) are already protecting over 150 million email inboxes in 28 countries. Vade Retro is a global company with 4 internationnal offices (San Francisco, Montréal, Hem and Hong Kong).
Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured, human-generated data. This type of unstructured data includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees.
WALLIX is a leading software company in Privileged Account Management and have succeeded in combining the three core requirements of managing privileged users, password management, access control and traceability, into a single easy to deploy software suite – The Wallix AdminBastion (WAB). WAB used to trace actions of privileged users by offering a high level of reporting and real-time alerts. Wallix AdminBastion is available as software (WAB), on a SaaS mode (WAAS) and on demand based on the number of devices to be managed. (WAB on Demand).
WALLIX’s solutions are distributed through a network of VARs across the world. The solutions are designed to meet the compliance and governance needs of organizations across all industry and services sectors. Wallix has offices in France where the solution is certified by French Government Organization ANSSI and in the UK. The solution was awarded « Product of the Year 2014 for the Privileged Users Management » and « New Product of the Year 2014″ for its offer « WAB on Demand ». At the CIF 2015, WALLIX will present the latest developments of the solution and how this product is involved in strengthening the fight against cybercrime.
Zscaler ensures that more than 12 million employees at more than 5,000 enterprise and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location.
Zurich Insurance Group est l’un des plus grands groupes d’assurance au monde et l’un des rares à opérer de façon véritablement globale. Avec près de 55 000 collaborateurs et un réseau de filiales et de bureaux sur les cinq continents, Zurich offre des solutions d’assurance vie et non-vie dans plus de 170 pays. Depuis 1877 et avec plus de 200 collaborateurs entièrement dédiés aux risques d’entreprises, Zurich en France offre une large palette de solutions d’assurance IARD pour les entreprises, des PME aux grandes multinationales. Au cours des vingt dernières années, le développement des nouvelles technologies a modifié notre manière
Our Innovation sponsors
Advens is a French pure player in information security management with offices in Paris and Lille, 100 employees and more than 300 customers in France and abroad.
We help organizations to take advantage of their digital transformation by providing a trustworthy environment. With a deep understanding of business activities and an innovative approach, we dedicate ourselves to building a global – and sustainable – information security management.
Our solutions are tailored by sector and by actor to meet its new requirements:
- Industry solutions to assist organizations with their specific business needs and use-cases
- Security Insurance programs to assist IT Managers and deliver end-to-end information security
- Services units to provide all expertise, knowledge and technologies needed to build information security
As a key actor and member of numerous committees such as the Cluster Cybersécurité, CESIN, OWASP, CLUSIF, CLUSIR, Advens will participate to this new edition of the FIC for the fifth consecutive year. Our goal: to share our experience, our vision, and to meet key actors of the cybersecurity community.
APLIKA specializes in anti-piracy and strong-authentication solutions. Specializing in software-security since 1999, they now guide clients in adding strong-authentication to their projects.
Two innovative authentication products are available: SmartSign and DinkeyWeb. SmartSign provides user friendly strong-authentication via a smartphone app that can scan a QR Code for maximum user convenience. DinkeyWeb provides web authentication via USB dongles.
Copy protection is provided by Dinkey dongles or CopyMinder (a software and/or cloud-based copy protection system). This products are built on 25 years of experience in the IT & software security industry and a foundation of trust with thousands of clients worldwide.
APLIKA, headquartered in Paris and Tours, makes sales, technical advice ans support for France and french speaking country.
Our partner Microcosm created in 1979 and based in Bristol, UK, will be present at FIC 2015 to offer English-speaking technical advice and support.
As an Independent Regional Integrator, specialized in Security solutions; Aquastar Consulting supports for over 12 years our customers: ISSM, ISD, IT Managers, in their security projects. Our team is meant to be source of proposals!
We focus on :
- Our technological expertise,
- Our security partners’,
- Certified ANSSI solutions,
Our core business :
- Network security
- End-point Security
- Application Security
- Supervision and Tracing
We support our clients throughout their project: from pre-sales to trainings, including Design and Integration. But above, we provide the maintenance and evolution of installed solutions through custom assistance contract and monitoring.
arkhe is a systems company.
At arkhe, we believe that progress must be closer to human being, to serve his heart and his mind.
As digital users, we are looking for being successful in everyday life, being yourself and creating links, or controling our distance regarding our digital tools.
arkhe designs a digital butler, the first universal and learning system to help us in the digital experience.
Meet us at FIC2015 !
ArxSys est une société française de services et d’ingénierie en sécurité informatique fondée en 2009 par les créateurs historiques du projet Digital Forensics Framework (DFF). Nos solutions aident les entreprises et gouvernements à faire face à la criminalité numérique en proposant des solutions d’analyse forensique et de réponse sur incidents.
The Internet network relies on a set of basic and fragile protocols that were design 3 decades ago. Performance and availability are poorly managed. Websites might suffer from connectivity loss. Users sometimes have to undergo long loading times. This affects all Internet services.
Internet infrastructures also suffer from traffic floods named DDoS attacks, generated by thousands of coordinated & infected machines.
BORDER 6 operates a software solution that detects Internet performance and quality issues automatically. It also implements statistical models to detect DDoS attacks and automatically implement countermeasures.
BRM Avocats, law firm dedicated to technology law, is based in Lille, Paris and Brussels.
Martine RICOUART-MAILLET and Raphaël RAULT have developed within the firm an expertise in information technology, law of personal data and cybersecurity. This expertise has been materialized by the label issued by the CNIL (www.cnil.fr) in January 2014.
Martine RICOUART-MAILLET is Vice-President of the AFCDP (www.afcdp.net), Raphaël RAULT is also member of it, and of the ACISSI (www.acissi.net).
Martine RICOUART-MAILLET is a founding member of the R&DSSI and member of the Clusir InfoNord (associations dedicated to the security of information systems).
Centre of Technological Expertise in contactless technologies – Resource Centre – Training Centre. The CITC (Innovation Centre for Contactless Technologies) is a major stakeholder in the Internet of Things and Ambient Intelligence. It operates as a centre for resources, technical expertise and experimentation in the field of identification, traceability, mobility and geolocation. It helps mastering contactless technologies and the Internet of Things, designing innovative and standardised solutions, and developing new high-potential businesses. It takes part in the activities related to the Internet of the Future by leveraging the synergies between companies and research & training organisations.
As an innovation partner, CITC assists companies in the development of technology projects. CITC uses its network, business intelligence and its engineers’ expertise to have a clear vision of the ethical, society, environmental, regulatory, standardisation, security and health issues that the Internet of Things is currently facing. CITC offers a broad range of complementary services: Technical Expertise Advice, Tests & Trials Prototyping, Prequalification, Precertification, R&D* Work Experimentation & Demonstrations, Vocational Training Initial Training, On-demand Studies Intelligence, Connecting People Working Commissions Collaborative Projects.
CIV / Alternative Data Center
For over 40 years, CIV has been pioneer in building servers’ rooms and has now gathered its skills and the one of its partners, to provide high secured hosting through its brand new Alternative Data Center®. As a major economical player for the whole Lille Region, either for business companies or for institutional organizations, Alternative Data Center® makes your information systems safer with major assets like huge security check, personalized and private spaces, Bio Vein System, video surveillance in and around the Data Center, 24 hours a day, 365 days a year ! As you know it, cybercrime is an important risk that may be everywhere: inside our outside. This is the reason why it has been so important for us to provide you the better security conditions in order to control every customer’s physical access on servers. Alternative Data Center® is not only an innovative hosting solution! It is also a very new integrated and technological solution to host safely your information systems. Alternative Data Center® will provide you and your commercial partners, very high secured spaces of course, but also outsourcing solutions.
The Clusir INFONORD consists of forty IT security managers of large companies and regional SME, security experts and academics. Its members are committed to promoting an active security policy in their business and / or organization. After signing the confidentiality policy, members of the Clusir InfoNord participate in meetings held by experts on topics related to IT security and can exchange their security issues, concerns and experiences. CLUSIR Aquitaine, accompanying economic actors of its territory in the field of digital trust, is proud to be present this year at FIC 2015, alongside his counterpart CLUSIR Infonord.
Cybernetica develops secure information sharing and processing solutions for governments and companies. Our SDSB service bus is the foundation of e-governments in Estonia, Azerbaijan and Namibia. The Sharemind application and database server can process encrypted information without decrypting it. Our goal in FIC is to introduce our novel technologies and initiate collaborations.
CYBERWATCH is a Cybersecurity company specialized in Vulnerability
Management for SMB.
Experts in network and software security, we provide since 2013 simple and effective
turnkey solutions to our clients to protect them without slowing their businesses.
We propose 3 offers:
- Cyberwatch SaaS – Subscription-based Security patches service
The first subscription that protects in real time your servers and systemsoftware from IT vulnerabilities.
Starting at 29€/month/server (excl. tax).
- Security auditing and penetration testing
Our consultants put themselves in black-hats’ shoes and detect threats on your Information System.
100% of our audits have detected at least one critical threat.
- Secure development
We develop and deploy secure custom solutions for SMB.
Our expertise: Cloud computing security.
Family business created in 1956, Decima is today an innovating group particularly distinguished by the design of their datacenters. With the integration in 2012 of the ARAMYS Society, major player in the world of infrastructures systems and networks with high availability, Decima Group strengthened its position in the regional digital economy as global partner of solutions and Cloud services. As hosted service provider, the group joined in the approach of ISO certification process 27001 and Host of Data of health. This strict commitment regarding physical and logical security for its own data centers, allied to the skills of our engineers allows the group to meet requirements by our customers in terms of the security of their data.
Our business: Development of authentication, electronic signature, time-stamping and encryption solutions. Dhimyotis has a range of electronic certificates conform to European ETSI and French RGS standards. Root CA Certigna is integrated in WINDOWS, MAC and MOZILLA.
1. Certigna SSL: https websites Security
2. Certigna ID: ID for internet users
3. www.mapreuve.com : For legal protection of inventions and copyrights
4. 2D-Origin: Secure flashcode to verify the authenticity of a printed document.
Fidens is a French Information Systems Security specialist, recognized by large corporate and French government and public administrations for more than 12 years, independent from publishers and hardware manufacturers. We offer three main services: consulting, audit and training. We support CISOs, management and implementation. Since 2011, we developed Fidens EGERIE RiskManager (v1.5) software tool for Cyber Risk Protection (CRP), management and control of cyber risks. Our solution allows a mapping of complete and standard-compliant risks, based on comprehensive repositories. This helps decision-making by providing a clear and concise graphical presentation of exposure and risk treatment, for all types of areas. It optimizes the communication work and automates the production of the required reporting of IS security.
FREEMINDTRONIC designs, develops and commercialized dynamic embedded electronic systems with a high level of protection. Heart of our business is especially the intelligent systems development, interconnected with black box in the Cyber Security domain. The FIC Forum is an great opportunity for Freemindtronic to introduce its latest innovative solutions equipped with NFC: EVIKEY ONE NFC, USB key Cyber Securised and EVIDISK ONE NFC, SSD cyber securised , genuine digital safe boxes that the user unlocks via his smartphone or other devices on customer demand (optional). To reply to the major increase in the BYOD and Cyber Crime threat, FREEMINDTRONIC is first company to propose innovative solutions and highly secured to the computer datas access.
GB & SMITH
GB & SMITH streamlines and enhances software security
Award-winning company (Deloitte Fast50, EY Emerging Entrepreneur Of the Year) we are historically focusing on enriching BusinessObjects. We now extend our activity and offer a unique and innovative console to manage and document easily any software security and habilitations (Windows AD, Sharepoint, Oracle DB …)
400 clients worldwide have already integrated the Administration Intelligence concept (FRB, US Army & SAE) to perform productivity gains, ensure that their IT security is under control and optimize their GRC activities.
Exer is a Value Added Distributor focused, since 1986, on Internet and Network Security solutions.
Willingness to always be as close as possible to the needs of their resellers and to give them good advises Exer has now gain the confidence of more than 600 resellers all over France.
The company has reshuffled its product portfolio by adding major brands such as F-Secure, StormShield, Aruba Networks, DenyAll, Vade Retro, LogLogic …
Exer provides pre-sales and after sales technical support and offers systems integration support services to its reseller network. The company is also acting as an authorized training and cetification centre. For more information: www.groupe-exer.fr or meet us on the “Cluster Cybersécurité” booth on the FIC.
How can you be sure that no one reads your email ?
Idecsi has created an essential innovation that is totally dedicated to mailbox protection for Top managers, Key People and Executive Board members. IDECSI ACCESS ANALYZER ® works like an intelligent alarm system which alerts you immediately in case of malicious access to mailboxes, whatever the means used to access them. Designed for Top Executives, the solution is completely transparent for the protected persons (no additional constraints). It is neutral for IT Systems. It is neither intrusive nor disruptive. It is easy to install (less than 4 hours). Idecsi is a French company. It is the result of 24 months of R&D and it relies upon worldwide patent protection.
Founded by a CISO and a Technical Projects Manager, Incloudio (http://incloud.io) provides a managed digital security SaaS solution for your applications connected to the internet, either for your consumers or your partners.
Have you identified the actual strength of your web applications, mobile apps or connected objects? Data theft, misappropriation of content or “deny of service” attack on your websites, Incloudio offers to secure your application flows for you by analyzing your traffic. Its innovation lies in Cloud flexibility by fast implementation and controlled cost through use.
Intrinsic-ID provides device-unique security solutions based on Hardware Intrinsic Security (HIS), a patented, industry-proven technology that extracts unique identifiers from the physical characteristics of each semiconductor. Intrinsic-ID’s data security and user authentication solutions seamlessly provide the highest level of security, in the most cost-effective way. Intrinsic-ID provides its solutions to the following markets: Embedded systems, Mobile, IoT, Identification, automotive, communications, content distribution, pay TV, government and defense. The company is a spin- off of Philips Electronics and is headquartered in the Netherlands, with sales offices in the USA and Asia.
Since January 2007, ITrust has been offering cybersecurity solutions and expertise on the European market in 6 different countries. We cover all security issues, ranging from organizational 27001 EBIOS, HDS, HIPAA, PCI, isae3402, technical, to legal and physical (audits of data centers).
ITrust serves more than 100 customers with a 98% satisfaction rate of 98% (study 2012).
Leveraging on the broad expertise of our experienced engineers and consultants, we have increased our customers safety with well-designed, user-friendly and effective tools. Our tools and services integrate the best current technologies (algorithms behavioral, big data, agile software design or project management, offered as SaaS, automation, decision tables edges core behavioral supervision tools).
IVS develops and markets innovative and tailored video analysis solutions in retail, security, taffic management and energy saving sectors (smart city).
In view of its status as a startup justifies its presence at the FIC and within the Cybersecurity and Digital Trust stand.
LSEC – LEADERS IN SECURITY
European network of security experts, research and industry
LSEC is a European Information Security Cluster, a not for profit organization that has the objective to promote Information Security and the expertise in Europe. Founded by KU Leuven, supported by European Commission FP7 and leading a unique PAN European Private partnership that interacts with Public Institutions, LSEC connects security experts, research institutes and universities, government agencies, end users, funding bodies and technical experts who are driving national and European research agendas. LSEC activities aim to raise cyber security awareness, support innovation and competitiveness of the European IT- Security market and promote the visibility of its members.
Unite stakeholders, stimulate collaboration, enable high tech entrepreneurship
LSEC provides an international platform that unites security stakeholders, stimulates collaboration and enables high tech entrepreneurship. This will help researchers understand industry needs, help Industry access the IT security research that they need, and help ensure that fundamental research is translated to sustainable solutions.
With a broad membership base of over 135+ Cyber Security Companies and Universities, and more than 9,000 information security professionals, LSEC accesses over 25.000 security stakeholders on a regular basis. LSEC has operations in the Netherlands, Belgium, Luxembourg and the UK and leads a PAN European Partnership with other renowned security clusters that cover the whole of Europe.
Interested to learn more about corporate – expert or academic membership for your organization or department? : firstname.lastname@example.org
Nov’IT is a French computer security software company that delivers both Anti-Malware and secure mobility solutions. Nov’IT offers the following products under the name « Uhuru »:
* A solution that protects workstations and servers (both MS-Windows and GNU/Linux) from malware. It also provides a high protection against unknown viruses or threats.
* A comprehensive secure mobility solution made of:
- A secure OS for Smartphone & tablets
- An App Store with certified applications
- Validation tools that enable to certify applications
- A centralized console for device fleet management
OVELIANE conçoit et édite des solutions de contrôle du niveau de sécurité des serveurs. Notre solution OSE permet de contrôler l’intégrité de vos fichiers sensibles, de vos configurations, et plus généralement de vos serveurs. Votre activité dépend de vos serveurs (de leurs sécurités et de leurs fiabilités). Savez-vous ce qui s’y passe ? Qui s’y connecte ? Quand ? Pour faire quoi ? OSE permet de garantir et de contrôler le niveau de sécurité de vos serveurs. Il vous permet de connaître et de suivre l’acticité en terme de sécurité via des rapports quotidiens, hebdomadaires, mensuels, ainsi qu’en temps réel.
Pradeo is an innovative French company, specialized in the field of mobile devices security.
Pradeo has designed a behavioral analysis engine for mobile Apps, called « Trust Revealing ». This engine revolutionizes the approach to malware protection. For a given App, it reveals exhaustively all actions it performed: connections established, data manipulated, operations executed… Once revealed these hidden actions, the engine compares the detected behaviors to the security rules specific to each company. Thanks to this technology, Pradeo, offers to its clients solutions to safely deploy new mobile uses to customers, employees and via connected objects: Security audit of mobile Apps and Trustmark with AuditMyApps; Protection against malwares with CheckMyApps; Protection of critical apps (m-banking, m-health …) with CheckMyApps API.
Rosberg System is a privately held Norwegian Innovation company, our technology brand is Verji – an ancient Norwegian word describing the one who protects.
Our technology development focus on highly scalable security solutions with global market potential and unique protected intellectual property.
We license our technology solutions to companies, which can achieve enhanced security, market differentiation, increased turnover and cost reduction by using the technology.
Verji SMS, protects your smartphone against infections from silent SMS and “fake cell towers”. The only thing an attacker need to remotely control your phone is your phone number.
Verji Connect, makes it possible to establish a secure connection to any device, anywhere and anytime – without connecting to the device from the outside. We can also deliver our unique secure connection software as an SDK.
Runiso specializes in the hosting and management of critical applications. End user experience is our customers’ priority and we deliver it by improving application performance while never compromising on security. As such our team constantly improves our security practices to deliver the highest standard of security to our customers. External audits are also regularly scheduled to validate and strenghten the security of our infrastructure. Thanks to our established expertise, Runiso obtained several certifications including the new PCI DSS certification allowing us to host and manage financial data. IFC being a major international event for security enthousiasts, we are excited to attend and share our expertise with other security players.
Seclab designs and manufactures hardware security solutions (in silicon) that offer total resistance to software vulnerabilities and sophisticated attacks.
Founded in 2011, Seclab is now recognized as a significant player in the cyber security space. Thanks to its highly innovative and robust solutions it has been able to focus on the protection of critical infrastructures and regulated industries. The company is based in Montpellier (France) and San Francisco (USA).
Seclab solutions are already deployed and aligned with critical the challenges faced by operators of critical infrastructures such as: electricity, oil and gas networks, water treatment, transportation, etc.
While perfectly answering strict security standards, Seclab solutions are also designed to smoothly fit in in existing systems: no architecture or systems modification are therefore required to cover the following categories:
- Infrastructures- by enabling the exchange of information between two networks while keeping them completely segregated,
- End-point- by protecting against USB threats (including BadUSB),
- Password management solution for field operators.
Seclab products offer a unique combination of software, for functionality and flexibility, and hardware for the ultimate high security assurance. Its breakthrough technology offers the following key differentiators:
- Hardware-based (“security in silicon”), ensuring total resistance against software flaws and errors, including zero-day as well as sophisticated attacks,
- Strict airlock mechanism (no network connectivity),
- Independent yet complementary to all existing security systems in place.
SecludIT is a software company founded by senior security experts. SecludIT’s innovative and patented Elastic Security technology solve these issues and allows users to automatically define and maintain an appropriate security perimeter whatever the changes in the infrastructure.
Fully focused on addressing vulnerabilities and data security in the cloud, SecludIT has become a recognized industry player :
- Founding member of the Cloud Security Alliance in 2009
- Amazon Web Services, Numergy, VMware, HP Cloud, Eucalyptus technology partnerships
- Winner of the most Innovative Startup Award from Eurocloud France, IBM Smartcamp France and Huawei Euratechnologies Innostart Award in 2014
SecurIT is a leading provider of IAM solutions to many organisations around the globe since 1999.
‘Smart bridging of the Identity Cloud’
TrustBuilder® Identity Hub is a unique solution for solving the complexity gap in the multi-perimeter world of distributed and Cloud environments. It provides dynamic bindings between Identity Providers and Service Providers, while also supporting virtually any authentication mechanism and fully automated user registration.
TrustBuilder is the first product combining Attribute Based Access Control with Cloud Identity Management, while seamlessly adapting the behaviour based on Context. Its flexible setup substantially reduces risk and maintenance costs.
Straton IT is a technology integrator specialized in IT infrastructure.We supply expert services specially in process design and improvement. We train and certify at ITIL and ISO 20000.
Our ITIL experts are accredited as lead assessor in ITIL process maturity assessment.
SubMeet provides a very high level Secured email platform, designed for companies managing sensitive and confidential information.
Available on every device and requiring neither technical expertise nor infrastructure, SubMeet makes secure exchanges seamless and super easy by plugging directly into user’s email provider.
Unlike existing encryption products, our proprietary end-to-end-encryption technology enables SubMeet to never access its users’ contents, passwords and private keys.
Submeet guarantees its users an absolute and exclusive control upon their data, and protects them against intelligence agencies, targeted advertising or hackers.
The Suricate Concept Economic Interest Grouping (EIC) is born from the common aim of local IT firms and recognized experts in their respective fields. The EIC proposes a unique concept to entities across all sectors of activities: an innovative and integrated project management method, with a strong focus on cyber-security.Our services in few words: in-depth web security audits, secured web SEO, online competitive watch, legal and strategic counselling, Change Management consulting. These services are combined with a list of complementary activities & products proposed by the members of the EIC.
TDF designs, deploys, hosts, operates and maintains networks, infrastructure and data broadcasting services for telecoms operators, IT services providers, local municipalities and institutions.
A pledge: to be the local, objective and independent partner providing bespoke telecoms solutions.
TDF is backed by 9,500 sites in France for audiovisual broadcasting and telecoms radio equipment hosting. As a creator of innovative solutions, TDF now finds itself at the crossroads between the latest digital, mobile and multimedia technologies covering connected DTT, video-on-demand, catch-up TV, web-based media, high point hosting (iron towers or rooftops), ultra-high-speed connections, data centers etc.
Trust Designer : your expert in Mobile Identification Technologies
Headquarted at EuraTechnologies, high center of ICT of Lille, Trust Designer has developed cutting-edge skills in different fields : strong authentication, digital signature, documents certification, etc. Its activity covers applications development for mobile, smartcard or connected object.
Thanks to its technology partnership with major players in the field of the digital confidence and the field of contacless payment, Trust Designer also proposes innovative and unique solutions on the market. For Trust Designer the FIC is an opportunity to discuss with other players and to create synergy in order to propose suitable solutions for the business of the future.
The training is a critical component for building cyber defence capabilities in any organization. Unfortunately, today’s technical IT security trainings are mostly theoretical and do not provide sufficient hands-on experience. We will demonstrate how to increase drastically practical component of the trainings and use the experience of large scale cyber defence exercises in the cyber capability building process.
Whitenoise technologies and a single distributed key that will outlive the life of any person or device is used to manage identity and impose provenance on all data, persons and devices on a network. The identity management key provides dynamic, continuous authentication of all network end points, establishes point-to-point encrypted tunnels and creates distributed session keys for dynamic, secure point-to-point connections for other network areas and uses such as key distribution to end points that do not yet have a key. The single key performs all network security controls.