TechNet Augusta 2021 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

Fidelis Cybersecurity

Bethesda,  MD 
United States
http://www.fidelissecurity.com

Fidelis Cybersecurity combats the full spectrum of cyber-crime, data theft and espionage. A leading provider of threat detection, hunting and response solutions, Fidelis provides full visibility across hybrid environments, automates threat and data theft detection, empowers threat hunting, and optimizes incident response with context, speed and accuracy. Fidelis is trusted by Global 1000s and Governments as their last line of defense.

The Fidelis Elevate™ platform captures rich metadata from across the threat landscape and combines that content to enable real-time and retrospective analysis, giving security teams the platform to effectively hunt for threats in their environment.

For more information visit www.fidelissecurity.com. Fidelis Cybersecurity is a wholly-owned portfolio company of Skyview Capital.


 Videos

Using Machine Learning to Automate Detection and Response (1)
Fidelis Deception Explained
Fidelis Network Explained

 Collateral

  • The security stack has grown as organizations respond to new threats by bolting on additional cyber security tools, often from different vendors. Many of these products are not fully utilized or provide redundant capabilities, which results in additional complexity with no beneficial effect on security posture. This is a critical problem for many organizations; in fact, a recent Fidelis survey found that less than 7% of respondents were using their full security stack.

    In this white paper, Fidelis Cybersecurity examines how organizations commonly fall into security stack traps, strategies for re-thinking the security stack, and the benefits of a streamlined security architecture based on best-in-practice frameworks.

    Download this paper to learn:

    • Common obstacles to a streamlined, optimized security stack
    • Methods for securing the enterprise network
    • Strategies for fortifying endpoints and devices
    • Indispensable SOC tools
    Join Fidelis experts for a short webinar to learn best practices to re-examine your security posture. Read it here. 
  • With digital transformation and changing corporate environments, attackers have a rapidly expanding cyber terrain to exploit. Once an attacker has accessed a network or endpoint, they gather intel by searching assets for valuable information and clues about where the desired data or location might be. Attackers move laterally across endpoints, network and different devices in order to reach their objective, and it’s during this lateral movement that deception technology can be used to stop attackers and protect organizations.

    With Fidelis Deception, security teams can warp the perception of the attack surface, giving an attacker a “friendly” environment. Security teams can make 100 endpoints look like 10,000 endpoints, changing the economics for the attacker and increasing their risk. By managing the attacker’s experience, Fidelis Deception can help security teams slow down attackers, reduce dwell time, and root out threats before real harm is done.

    SC Media recognized our award-winning technology as a powerful tool to have in your security arsenal in their product review. Download this report to read SC Media’s review of Fidelis Deception.

    Read it here.

  • Security teams cannot defend complex networks without holistic visibility and correlative insight into the environment. In this first part of a two-part review, SANS expert Matt Bromiley evaluates the Fidelis Elevate platform and its unique strengths surrounding network traffic analysis, threat detection and deception.

    Download the paper now to learn how we simplify security teams’ workloads, while improving their ability to detect and hunt for threats. Notable findings from the SANS product evaluation include how Fidelis:

    • Brings true holistic visibility to view the state of security of the entire organization from a single screen
    • Enables single screen investigations from conclusions, derived from the confidence attributes of alert and correlative alert activity
    • Provides immediate alert handling through investigation decision options for each alert
    • Delivers a flexible platform that allows for custom tasks, playbooks and analytics, to meet the organization’s needs
    • Digs deep into network packets and sessions, identifying protocols and applications, and allowing for payload examinations

    Seeing is believing – watch the Webcast where SANS expert Matt Bromiley and Fidelis SVP of Engineering, Jerry Mancini, examine and demonstrate how the Fidelis platform ensures holistic visibility while automatically correlating events and providing context and insight to make investigations faster and simpler than ever.

    “One of our favorite takeaways from using a platform such as Fidelis Elevate was being able to exercise the concept of holistic visibility, meaning the environment is ingested, analyzed and treated as a single unit. Holistic visibility allows for threats to be analyzed and neutralized faster, and lets organizations make confident decisions that truly affect enterprise security.”

    Read it here.


 Press Releases

  • Chris Kubic, former CISO at the National Security Agency, describes how deception technology can change the defensive landscape. “Where deception comes into play is for the unknown threats, the things that are either an attack you haven't seen before or the attacker evolved their technique,” he says.

    Kubic, who is now CISO at Fidelis Cybersecurity, advises organizations to find deception technology that can be integrated with the broader cyber defense in their environment.

    In a video interview with Information Security Media Group, Kubic discusses:

    • The evolution of deception technology;
    • Advice on deploying deception tech and the in-house skills required to best use it;
    • Trends to watch in the deception technology market.

    Kubic has more than 30 years of experience driving information assurance and cybersecurity initiatives at the U.S. Department of Defense as well as the federal intelligence community.

    https://www.bankinfosecurity.com/sizing-up-role-deception-technology-a-15762


 Additional Info

Please select up to up to (4) areas you provide solutions in:
(Cyber): Mission Mapping and Dependency Modeling of Mission Critical Systems, (Cyber): Machine Learning system for identifying anomalous behavior in encrypted data streams, (NS): Army migration of Data Analytics, Machine Learning, and Artificial Intelligence Solutions in Army Enterprise Data Centers (AEDCs)

Send Email

Type your information and click "Send Email" to send an email to this exhibitor. To return to the previous screen without saving, click "Reset".