AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
Wildflower International Ltd, is a small, woman owned, HUBZone business, honored to have served the United States Federal Government and its National Laboratories for over 30 years. We have long-term experience delivering technology products and services, and a proven record of accomplishments. Our program and supply chain methodologies are a commitment to delivering the highest quality. Our products and services are available via SEWP-V, ITES-3H, GSA, ICPT, SCMC, MEUAS IV, and DHS FirstSource II.
Juniper Networks has developed a means of encrypted traffic analysis (ETA) that leverages AI and machine learning to identify encrypted threats without the need to break the encryption. ETA takes relevant data extracted by the SRX series firewall combined with behavior analysis provided by the Juniper Advanced Threat Protection (ATP) Cloud to provide insight and visibility into the underlying traffic. Based on metadata analysis via machine learning in the ATP Cloud, connections are classified as malicious or benign, identifying the hallmarks of botnet and malware command and control traffic. This is accomplished without the need to decrypt traffic and requires no new hardware, sensors or collectors.
The solution is scalable with network size and enables greater network visibility, confidence and the ability to respond more quickly via automated remediation. This is accomplished via the SRX firewall that extracts information from the initial transport layer security handshake. Questionable certificates are sent to the ATP Cloud, which then queries the certificate against certificates used for known malicious activity and sends them back to the SRX for blocking. File transfer protocol events are then correlated with user and device information and added to the infected host feed. This information is managed via a tailorable screen that provides analysis and can be configured to meet the user’s relevant security needs.
In summary, what sets the Juniper Networks Encrypted Traffic Analysis solution apart from other solutions is that it is relatively inexpensive. An SRX firewall and Juniper ATP Cloud license is open standard/nonproprietary, operates in a multivendor environment and doesn’t require additional sensors or collectors.
Juniper’s Encrypted Traffic Analysis solution is a subset of a larger, comprehensive connected security portfolio that is used extensively in international commercial banking, health care and the U.S. federal government.
https://events.afcea.org/Augusta20/CUSTOM/pdf/Encrypted%20Traffic%20Insights.pdf
A hardware/software hyperconverged hybrid cloud solution that is delivered to help customers meet industry and government cybersecurity compliancy goals.
The solution is delivered through the utilization of VMware Validated Design guidance with pre-defined solution blocks of technology from Dell Technologies and its industry leading partners.
https://events.afcea.org/Augusta20/CUSTOM/pdf/DTTHC%20-%20Dell%20Technologies%20Trusted%20Hybrid%20Cloud%20Technical%20Overview.pdf
The Five Pillars of Zero-Trust Architecture
The Zero Trust architecture consists of five pillars. Trust must be established in each pillar to decide whether to grant or deny access. By establishing trust across the five pillars, visibility is expanded which supports end-to-end analytics. Visibility and analytics are a critical part of the Zero Trust architecture, and they help to establish a deeper and broader footprint in each pillar.
https://events.afcea.org/Augusta20/CUSTOM/pdf/Dell%20Technologies%20-%20ZeroTrust.pdf
Dell Technologies has developed a cloud-based architecture that can be deployed both in Public, Private, and Hybrid scenarios that utilizes the same core architecture and components that can meet both compliance and operational cybersecurity requirements. The solution utilizes best of breed hardware and software from the Dell Technologies family allowing customers to run on-demand configurable pool of shared computing resources within their own architecture.
https://events.afcea.org/Augusta20/CUSTOM/pdf/Dell%20Technologies%20Trusted%20Hybrid%20Cloud.pdf
Contact this Exhibitor