TechNet Cyber Sponsorship Opportunities


Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the marketing and sponsorship opportunities available at TechNet Cyber 2020 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.

Have an idea for a sponsorship you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!

Crystal Group, Inc.

Hiawatha,  IA 
United States
https://www.crystalgroupvirtualtncyber20.com/

Visit our 3D Tradeshow Booth to see our full line of Cyber Security products: https://www.crystalgroupvirtualtncyber20.com/ Crystal Group is a leading rugged computer hardware manufacturer that specializes in advanced design, engineering, integration, configuration management, lifecycle planning of custom rugged servers, embedded, networking, displays, power supplies, and data storage devices for high reliability in harsh environments. All products meet/exceed IEEE, IEC, and MIL-STD-810, 167-1, 461, MIL-S-901. NIST compliant and AS9100D certified.


 Press Releases

  • Crystal Group’s recent NIAP Common Criteria certification of its rugged firewall means customers gain achievable, repeatable and testable security requirements

    https://www.crystalrugged.com/Crystal-Group%e2%80%99s-Rugged-Firewall-Attains-NIAP-Cybersecurity-Certification/


     


 Products

  • Rugged Cyber Security Solutions
    Keep critical, confidential data secure in the most extreme conditions. By combining leading-edge data at rest protection with our trusted, rugged computer hardware, our cybersecurity capabilities can protect against attempted breaches....

  • Crystal Group designs in vital security features from the start to meticulously integrate leading-edge rugged hardware Roots of Trust with encryption software from certified partners. With a foundation of essential features, including Trusted Performance Modules (TPM 2.0), FIPS 140-2 SAS solid state drives, intrusion detection, tamper evidence and instant data destruction, we can protect your critical data from attempted breaches at the edge, when it matters most.