Intelligent CIO Middle East Issue 23 - Page 103

Taj El Khayat, Gulf, Levant and North Africa Director, F5 Networks F 5 Networks will underscore its growing regional influence in application security and multi-cloud solutions at GITEX. “In a digital-driven economy, applications deliver business services for a variety of access points and locations, opening up new risks and attack vectors – particularly as IT teams extend security and encryption capabilities across cloud, data centre, and hybrid environments,” said Taj El Khayat, Gulf, Levant and North Africa Director, F5 Networks. Among the security solutions on show are F5’s latest additions to the Herculon product family. Herculon SSL Orchestrator™ provides improved insight for the visibility gaps created by the growing use of encryption for application data. With purpose-built hardware for SSL/TLS, the product provides leading cryptographic capabilities, context-aware dynamic service chaining, and native integrations. Herculon SSL Orchestrator can significantly increase performance – and decrease infrastructure costs – across the security stack by eliminating the need for redundant encryption and decryption capabilities. A ‘defence in-depth’ strategy is employed to enhance detection, enforcement, and orchestration with support from a rich ecosystem of security vendors. Location: FEATURE: FEATURE: GITEX F idelis Cybersecurity, a leading provider of products and services for detecting and stopping advanced cyberattacks, will demonstrate how its latest platform, Fidelis Elevate, empowers security teams and raises an organisation’s security posture by providing automated detection and response across both networks and endpoints. “If recent attacks like WannaCry and Petya have taught us anything, it is that traditional security defences are no longer capable of combating modern cyberattacks and protecting organisations’ most sensitive data,” said Jason Mical, Vice President, Endpoint Products, Fidelis Cybersecurity. “Enterprises have evolved with a patchwork of systems strung together that create more complexity than the problems they solve. Security teams without complete visibility across networks and endpoints don’t have the capability to prevent and detect threats, and the automation to maximise resources; which has resulted in enterprises being unable to det ЁɕѼ)ѡ剕ѡɕ́ѡѽ今t)́مє́ѕеɥݽɬ)Ё٥ͥѼѕЁѠݸ)չݸѡɕ̸ѕɥ͕́ѥ͔)ѽѕѕѥɕ͔Ѽ)ɔɽѕѥɽ͕ɥ䁥́)ѕ䰁ѽɥфٕ́ɕѼ)͕ɥ䁅́ȁՉ͕ՕЁѥɽɔ)ͥѡљɴѡ͕ɥѕ́Ѽɥ)ٕѥєɕєɕͥ䁅͔)͕ɥ䁥́ѼձɽѕЁѡȁѕɥ͔)ѡȁ͕ɥ䁡Ё́ѡ!ɍձL!ɥ)ˊݡٕ́ѽ́ձѥɕ)ЁٽյɥمͥٔLх)䁥ѕɅѥəɵɑ݅ɔݥѠѡ)ѕͥєՐ͍Չ٥ԁMٕɱ)Q́ɥɽɽٕ́ѥѼѥѥ)͍ɥ́ݡɔݕͥєѥم)ɔՍѼѽȁѕɅѥ́ɽх)QɽՍЁ啐ȁе)ɽ٥́ɕͥٔL)ٕɅѡɽ՝٥Ʌѥ̰Ո͕)хѥѥ٥ͥ䁥Ѽͽѥѕ)ѥȁх̸)ܹѕэ)5ϊd%Q`܁х)%9Q11%9Q %<(