TechNet Indo-Pacific 2019 Sponsorship Opportunities

AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages and Individual Sponsorships.


Waterloo,  ON 
  • Booth: TT128

BlackBerry Cylance develops artificial intelligence to deliver prevention-first, predictive security products and smart, simple, secure solutions that change how organizations approach endpoint security. Cylance provides full-spectrum predictive threat prevention and visibility across the enterprise to combat the most notorious and advanced cybersecurity attacks. Learn more at


  • CylancePROTECT®
    CylancePROTECT® delivers malware prevention powered by artificial intelligence...

  • CylancePROTECT is an integrated threat prevention solution that combines the power of artificial intelligence (AI) to block malware infections with additional security
    controls that safeguard against script-based, fileless, memory, and external device-based attacks. Unlike traditional endpoint security products that rely on
    signatures and behavior analysis to detect threats in the environment, CylancePROTECT:

    • Uses AI, not signatures, to identify and block known and unknown malware from running on endpoints
    • Delivers prevention against common and unknown (zeroday) threats without a cloud connection
    • Continuously protects the endpoint without disrupting the end-user

    CylancePROTECT provides full-spectrum threat prevention covering these common security use cases:

    • Identifying and blocking malicious executables
    • Controlling where, how, and who can execute scripts
    • Managing the usage of USB devices, prohibiting unauthorized devices from being used
    • Eliminating the ability for attackers to use fileless malware attack techniques on protected endpoints
    • Preventing malicious email attachments from detonating their payloads
    • Predicting and preventing successful zero-day attacks