TechNet Augusta 2022 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

The deadline to be included in sponsor signage is Wednesday, July 20th.

Fognigma by Dexter Edward  

Herndon,  VA 
United States
https://www.fognigma.com/
  • Booth: ODS 31

Secure, Invisible, Traceless, Fully Post-Quantum Encrypted Networks, Off the Shelf and Ready to Go! Fognigma's post-quantum encryption protects your data from Harvest Now, Decrypt Later and other quantum computing threats. Rapidly deployable, fully scalable, and on-demand, our secure networks have a global reach and are completed with communication and collaboration solutions, with Fognigma's® patented software solution.


 Press Releases

  • New world, new rules

    Two years after the onset of the COVID-19 pandemic, it’s clear that remote work isn’t going anywhere any time soon.

    Companies scrambled in 2020 to pivot to fully remote working environments, and while some have shifted back to in-office or even hybrid environments, the need remains for secure and remotely accessible resources like file servers and videoconferencing solutions for employees scattered across the country, and sometimes around the world.

    This abrupt shift to these decentralized collaboration environments opened created a world of opportunity for hackers. In the past, centralized headquarter environments granted a high degree of control to allow cybersecurity and IT professionals to manage company security more effectively.

    But today’s working world is riddled with new variables – unsecured home networks, IoT devices, the use of personal devices for work, and lack of individual understanding of best security practices and common threats, to name a few. And when 88% of data breaches are caused by human error (according to a study conducted by Stanford University), the risk is too high, especially for a resource like a file server, where large numbers of users are likely uploading and downloading files frequently.

    File servers in particular are a gold mine for malicious actors as much as they are essential to remote work environments. But can you keep them safe?

    Can yesterday’s solutions work in today’s remote world?

    Encryption is the most obvious solution for protecting file servers, but it has its downsides:

    Time and effort. Private key infrastructure (PKI) can be an effective way to protect connections between an individual and another individual, group, or server, but is tedious to set up and maintain. A user must generate their own public and private key pair, store the private key safely, and share the private key with the person or server they’re trying to reach (use that person or server’s public key). Worse, to use the same encryption key on another device, the user would need a secure way to transfer the private key to the new device to ensure it can’t be captured in transit. While this may be a standard practice for familiar users, those unfamiliar with cybersecurity basics may find this method inaccessible. And with remote employees spread far and wide in questionably secure locations (sometimes across the world), IT support can be a costly and time-consuming nightmare for everyone involved.

    Key ownership. Popular file-sharing services like Dropbox claim to use encryption to protect their users’ data, but they hold the encryption keys, and the encryption is broken at their central server. So if their servers are compromised by unauthorized access or insider attacks, any user communications with those servers could be leaked to a third party. In other words, if they’re compromised, so are you.

    The demands of the current remote work climate require a user-friendly solution that provides the best security features available and limits the potential for human error.

    Erebus: The encrypted file server for a remote world

    Erebus is a cloud-hosted secure file storage system that uses built-in patented encryption software (Conclave) to encrypt files and automate management user encryption keys.

    Security features at a glance

    Symmetric and asymmetric (end-to-end) hybrid encryption

    Perfect forward secrecy (PFS) protocol

    Two layers of AES-256 encryption with 2096-bit initial key exchange

    FIPS 140-2 validation

    Immunity from IPv4, IPv6, DNS, and WebRTC attacks

    User-specific encryption at rest

    Fully automatic encryption key management with Conclave

    Erebus uses Conclave encryption technology to automate the management of encryption keys for users and the Erebus server, eliminating the need for cumbersome manual key configuration, and by extension, the possibility of a data breach caused by human error.

    When Erebus access is activated for a user, the software generates a dedicated proxy instance that handles encryption keys between the Conclave server and Erebus server. Users receive the full protection Conclave has to offer, without needing to rely on tedious and complicated encryption configurations. Accessing and using Erebus is as simple as signing in and uploading or downloading files in just a few clicks – while Conclave handles the rest and keeps them protected.

    Secure access and file management

    Whether on a desktop or mobile device, Erebus users never access the file server directly. Instead, a dedicated third-party proxy instance is generated for each Erebus user. These instances act as intermediaries in the connection, ensuring potential snoopers are misdirected and the server is protected. Not even your own users need to know where the server is hosted, adding another layer of protection against human error and insider attacks.

    These user access URLs can be generated, re-generated, or destroyed in just a few clicks. Uploaded files can also be configured so they’re destroyed automatically after a certain amount of time or downloads.

    Simple and intuitive access control

    Erebus servers can be configured in minutes, and administrators can easily control user access to files and the capabilities within Erebus using groups and permission assignments.

    All data is individually encrypted for each user assigned access to specific files, so as user permissions are modified, the data itself is modified to suit that permission. This ensures that when user access is removed, users will no longer be able to decrypt the relevant data.

  • Bring Your Own Device - Fognigma

    The Risks Of Employees Bringing Their Own Devices

    When the entire world shifted to remote working, many companies did not have bulk technology available to let their employees take home to continue doing their job. This forced many to enforce ‘bring your own device’ or in other terms, they had to let their employees use their personal devices to continue working from home. Although this may seem like a benefit, the cyber security challenges and privacy concerns of using personal devices will cost companies more in the long run.

    Data Leakage

    When employees access company information using their personal devices, especially from anywhere, it increases the possibility of company data being leaked. Mobile devices are the most susceptible to attacks. Additionally, mobile devices and tablets require frequent updates to prevent security loopholes, and if one update is missed and an employee has company data on their device, your company’s data becomes extremely vulnerable.

    Higher Chances of Vulnerabilities

    When employees access data from their personal devices, its nearly impossible for companies to track what data is saved on their devices. With that, if any employee connects to a public or suspicious WiFi signal, loses their phone, or forgets to install an update, whatever company data is on that device is at risk.

    Malware Infections

    Employees are not as careful on their personal devices as they need to be. If any employee unintentionally downloads malicious malware on their device, which is connected to the rest of the company’s network, depending on what type of malware it is, it could end up connecting to other devices on your company’s network. This would allow unauthorized users to gain access to usernames, passwords, and sensitive data posing a huge security risk.

    Protecting Your Network While Allowing Your Employees To Use Their Own Device

    Limit Access

    Giving employees access to everything in the company is a huge security vulnerability. Employees only need access to the stuff they need to do their jobs. To ensure your company’s network security, you need to implement role-based access into your cyber security strategy. This limits employees access to only systems and data required for their job roles.

    Two Factor Authentication

    Nowadays, both passwords and physical devices can be stolen, which is why many companies are implementing two-factor authentication on their employee’s accounts. Two-factor authentication requires users to have two pieces of information to confirm identities before accessing whatever account they are trying to login to. Most two-factor authentication processes have a strong password with a second factor like a code sent via text message or phone. This ensure safety because even if a password were hacked or a device was stolen, the criminal would need the second piece of information to gain access to the account.

    Enable Network Access Controls

    Network Access Control (NAC) only lets devices connect to a network that are up to date on their software. Devices that are not will be denied access. This will save your company from a significant amount of vulnerabilities.

    Lost or Stolen Protocols

    Having a policy in place regarding when a device is lost or stolen will safeguard your data that is stored on that device. Its important to be able to remotely wipe the data that is on the device so that unauthorized users cannot use the device to access corporate data.

    A Trusted Software Solution

    In a bring your own device world, companies need a solution that secures their data no matter where their employees work, and what they are working on. Fognigma’s trusted patented software solution lets organization’s build secure, invisible, adaptable, networks anywhere, on any device, in minutes. Inside a Fognigma Network, users can quickly and easily deploy end-to-end encrypted, traceless communication and collaboration tools such as messaging, video conferencing, file sharing, phone calling, and more. Through Fognigma’s user-friendly interface, office administrators can create and assign users groups, ensuring employees only have access to the resources needed to do their job. Using simple software or hardware, users can instantly secure their connections and safely access company information from anywhere on any device. At the end of the workday, Fognigma Networks and resources can be destroyed in just a few clicks, ready to be redeployed the next day.

    Contact us for more information on how Fognigma can protect your company data, on any device!


 Products

  • Wickets
    Wickets are small, portable misattribution devices that connect to a Fognigma VPN and protects single users and small groups, as well as IoT and other network-enabled devices....

  • Once connected to a Wicket, your device will have the full power of Fognigma's protection. The intuitive Wicket UI lets you easily control all aspects of your devices' connections. Smaller than a wallet, Wickets allow you to take the power of Fognigma protection anywhere. Wickets are the perfect solution for protecting IoT and IP-enabled devices. Automatically connect your VoIP phone to your Fognigma telephony system by attaching a Wicket to your phone. Protect any IoT device or multiple workstations by placing a Wicket between your modem and router. Any device connected to that router's Wi-Fi connection will be protected by the Fognigma network.