EXHIBITORS & SPONSORS
On behalf of the Organizing Committee, we would like to take this opportunity to express our warmest gratitude to all speakers, sponsors/exhibitors and delegates attending Vietnam Security Summit 2022 in-person that was wrapped up successfully on June 23, 2022 at JW Marriott Hanoi Hotel.
ARCON’s product portfolio includes:
ARCON | Privileged Access Management (PAM)
ARCON | User Behaviour Analytics (UBA)
ARCON | Security Compliance Management (SCM)
ARCON | Endpoint Privilege Management (EPM)
These enterprise-class solutions provide seamless access and have scalable architecture. More than 500+ global enterprises, spanning wide range of industries such as Banking, Finance, Insurance, Telecom, Government,… trust ARCON solutions to safeguard their critical business information….
The conventional way to protect from attackers and threats is to use a firewall to inspect all traffic to and from the Internet, but which still leaves the network vulnerable to attacks from within the network itself.
We created this solution to instantly respond to threats. The AMF Security solution uses our innovative Isolation Adapter technology, adding autonomous intelligence to the network to automatically decide the appropriate reaction for any detected attack. The AMF-Sec controller integrates with most common firewall products, to centralize your security policies and single panel to manage your responded action.
The Allied Telesis Self-Defending Network does not require any special software to be installed on the end-point. Our solution allows the security appliance to monitor a copy of the traffic (I.e. one-armed) so no latency is introduced, and blocks any threats instantly and automatically.
is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions.
Hikvision is committed to serving various industries through its cutting-edge technologies of machine perception, artificial intelligence, and big data, leading the future of AIoT: through innovative AIoT applications, we are dedicated to empowering every individual to enjoy a better future by building an intelligent world that is more convenient, efficient and secure.
For Advising service, FPT IS is proud to be the first Vietnamese company to be issued PCI QSA certification by PCI SSC, allowing FPT IS to advise, assess and grant Payment Card Industry Data Security Standard (PCI DSS) certification. In addition, FPT IS also provides advising services to help organizations and enterprises comply with ISO 27001 on Information Security Management System (ISMS).
For Vulnerability assessment (VA) service and Penetration testing (Pentest) service, FPT IS helps our customers to promptly detect and prevent vulnerabilities causing insecurity to IT systems and applications.
For 24/7 security monitoring service, grasping the trend of 24x7x365 monitoring, FPT IS provides FPT.EagleEye mSOC service with 4 main functions including Record, Detect, Investigate, Act.
Samsung Knox data security solution is the culmination of many years of research and development by globally R&D departments, with real-world testing on billions of mobile devices.
Samsung Knox helps prevent sensitive data from being leaked while employees use smartphones and tablets, blocks all intrusions from malicious software, and provides IT admins with comprehensive tools to manage devices, improve the work efficiency of users
Delinea is a leading provider of privileged access management (PAM) solutions that empower seamless security for the modern, hybrid enterprise. Our solutions put privileged access at the center of cybersecurity by defining the boundaries of access. With Delinea, privileged access is more accessible.
Fortinet provides Industry-Leading Cybersecurity solutions across All Networks, Endpoints, and Clouds.
Fortinet Broad Portfolio of Solutions to Protect Your Digital Attack Surface are as followings:
Zero Trust Access
Security Fabric Management Center NOC / SOC
Threat Intelligence & Attribution: A system for analyzing and attributing cyberattacks, threat hunting, and protecting network infrastructure based on data relating to adversary tactics, tools, and activity
Threat Hunting Framework: Adversary-centric detection of targeted attacks and unknown threats for IT and OT environments
Atmosphere: Block, detonate and hunt for the most advanced email threats with patented email security technology.
Fraud Hunting Platform: Client-side digital identity protection and fraud prevention in real time
Digital Risk Protection: AI-driven digital risk identification and mitigation platform
Smart Lock System: Our smart physical lock system is designed with the highest level of anti-intrusion function, meeting the security standards used in the military. Our smart physical locks do not use batteries, in order to ensure absolute security in situations such as power outages or natural disasters.
Digital Smart Key: Our digital smart key can be set to open one or more smart locks in our physical locking system. Customers can use a single key to open a series of different locking devices such as locks for warehouses, cabins, servers,…
Real-time Smart Security System (ICT Compact Network Locking System): our real-time smart security system uses cloud computing linked with smart physical locking system and digital smart key to bring the most comprehensive security solution for users.
SANS is the most trusted source for Information Security Training, Certification and Research
Multiple delivery options
SANS Cyber Ranges including NetWars and BootUp CTFs
Vietnamese Simultaneous Translation for Line Online events…
Are you interested in taking SANS training in your native language? SANS have a number of courses available to study in multiple languages directly through our local instructors, via our Simultaneous translation option.
Scenario-based Penetration Test: Scenario-based Penetration Test service provided by ECQ helps address the issue of limited threat visibility by simulating attacks from an external, internal, and rogue user point of view. Utilizing the same Tactics, Techniques, and Procedures as of real world advesaries or APT attackers, Scenario-based Penetration Test can be thought of as a lighter approach to Adversary Simulation where attacks are conducted based on each specific scenarios and require shorter execution time.
External: In External scenario, ECQ analyzes all possible attack vectors from an adversary point of view and execute all necessary hacking techniques to establish initial foothold to the target network. ECQ also simulates attacks originating from external branches or partners’ network to help an organization understand better the threats that are coming from a compromised system of a remote branch or third-party vendor.
Internal: Internal scenario penetration test helps an organization evaluate the risks of having a compromised system in the internal network and validate the effectiveness of internal security controls such as SOC/EDR/IDS.
Open Visibility Platform™: Packet data is an incredibly sophisticated area that any SOC and NOC massively use to identify security threats – Niagara Networks’ visibility solutions collect, inspect and deliver the right packet data to threat detection/prevention tools. Our award-winning Open Visibility Platform™ is designed to be open, exposing numerous points for technological integration and extensibility, and offers organizations the agility to host any virtualized security applications and monitoring tools.
Synopsys – Software Integrity Group
Black Duck Source and BinaryAnalysis
Media Delivery Solutions
Cloudbric WAF+ : is a fully managed, smart web security service to protect any business or organization from web threats. Our Security as a Service (SECaaS) solution implements not only WAF functionality, but also four other necessary functions to make your web-based solutions secure against attacks.
Cloudbric ADDoS : Advanced DDoS Protection is a cutting-edge DDoS attack protection and mitigation service. While Cloudbric WAF+ offers an essential DDoS detection service, Cloudbric ADDoS features a higher level of DDoS protection. Cloudbric ADDoS collects, analyzes, and distributes intelligence regarding DDoS attacks between edge locations in real-time across the world.
DLC delivers Accredited Training & Certification in the SABSA Framework for Enterprise Security. Our training portfolio enables students to deliver business-driven security solutions in their organizations and take the next step on their career path towards security leadership.
syslog-ng – high performance log management
SafeGuard – Store, Manage, Record and Analyze Privileged Access
Yubico – next generation 2 factor authentication for cyber users
Tectia Quantum-Safe and Zero-Trust Editions
PrivX: privileged access management
SSH tectia/server: encrypted communication
Universal Key Manager
GoAnyWhere – Automate & secure file transfers to protect sensitive data
Graylog – leading log management
Lucy – Security awareness training
The network monitoring system – Hanel NMS
Hanel NMS effectively solves network monitoring problems.
Hanel NMS helps administrator to monitor the system, device hardware information, network bandwidth, network problems, help early diagnose possible problems, system performance and responsiveness, thereby offering options to optimize, upgrade and minimize problems affecting network operation.
Hanel NMS allows users to configure email or SMS for pre-set event-based alerts. Ideally, Hanel NMS also provides accurate data and reports based on the database.
Managed Security Service (MSSP), provided by NetNam, ensures the ability to monitor and detect early threats, thereby developing responding plans to minimize damage to the IT system, and helping customers reduce the burden of budgets and human resources. netSecure: Monitoring and responding to security incidents Pentest as Service: Assessing information security Security Defense Services: Protecting applications and security systems Managed Security Services: Managing device and security system Network & Application Monitoring: Monitoring network infrastructure and applications
Main Item 1 : ZombieZERO Inspector
ZombieZERO Inspector is a network-type product for APT defense that is installed in the network section, email section, and network linkeage section, and is a solution to detect and respond to new/variant malicious codes flowing into the inside based on behavior.
Main Item 2 : ZombieZERO EDR
ZombieZERO EDR is an agent-type product (software) for APT defense installed on endpoints, and is a solution to detect and respond to new/variant malicious codes that can be executed on endpoints (PCs or servers) which is the users section.
Main Item 3: SECaaS (Security as a Service)
ZombieZERO SECaaS is the cloud service for ZombieZERO EDR. It prevents information leakage with the malware detection and blocking functions of ZombieZERO EDR. and the functions of a secure sockets layer private virtual network (SSL VPN) that prevents data leakage.
Solutions of Micro Focus are specifically designed to improve performance, improve efficiency, and optimize costs for customers. Micro Focus provides a wide range of products such as Source Code level application vulnerability detection, SIEM, SOAR, SOC, ITOM, and ITSM solutions…
Progress provides powerful and reliable network monitoring solutions. The Kemp LoadMaster application load balancing solution is highly appreciated by users, improving the availability and optimizing the system’s resources. Featured products: Application Load Balancing – Kemp LoadMaster; Network monitoring and analysis solution – Flowmon; Network monitoring and management solution – IPSwitch…
Active XDR (Active Extended Detection and Response): the solution to help you detect any hidden risks and defend in the most effective way.
BAS (Breach and Attack Simulation): With the BAS solution, we will provide the industry’s largest ecosystem of technology alliances to be available 24/7 for the most potential threats.
APT (Advanced Persistent Threat): This solution provides timely information and allows experts to accurately grasp the system situation, helping to prevent maximum cases of Hacker intrusion and promptly causing consequences for the system.
SOC tools: Includes powerful tools in building SOC systems (According to Gartner’s standards): NDR, EDR, BAS.
NPMD: New generation network performance monitoring and analysis technology based on Netflow/IPFIX standard.
WAPPLES is a web application firewall (WAF) that performs AI-based logical analysis to HTTP and HTTPS traffic, protecting web applications, APIs, and mobile apps from attacks. By safeguarding applications from both known and zero-day vulnerabilities, WAPPLES is an effective solution against sensitive data exfiltration, website defacement, malicious bots, and DDoS, helping organizations meet regulatory compliance.
iSIGN+ is an appliance type SSO solution that can be easily installed, operated, and supported on existing servers. iSIGN+ is an SSO/EAM solution that enables secure access to multiple services with a secure SSO (Single Sign On) and manages user rights via role-based access control.
Sophos Managed Threat Response (MTR) provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully-managed service.
Threat Notification Isn’t the Solution – It’s a Starting Point
With Sophos MTR, your organization is armed with a 24/7 team of threat hunters and response experts who will:
Proactively hunt for and validate potential threats and incidents
Use all available information to determine the scope and severity of threats
Apply the appropriate business context for valid threats…
Machine-Accelerated Human Response
Built on our Intercept X Advanced with EDR technology, Sophos MTR fuses machine learning technology and expert analysis for improved threat hunting and detection, deeper investigation of alerts, and targeted actions to eliminate threats with speed and precision.