What's on Tap:

Security Demos

2019 OktoberTekfest - Demo Bottle Caps - Varonis
2019 OktoberTekfest - Demo Bottle Caps - Cisco
Palo Alto Networks
2019 OktoberTekfest - Demo Bottle Caps - Proficio
Internetwork Engineering

Demo Bingo Prize: Drone

I've Got 99 Problems But a Breach Ain't One

The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation. With the release of Version 7 of our Varonis Data Security platform, we’re continuing to focus on data protection, threat detection and response, and compliance in today’s hybrid environments. Version 7 makes it easier than ever for our customers to simplify security investigations, achieve compliance, and maintain a secure state for their data by putting actionable information and automation in the hands of IT and security staff.


Demo Bingo Prize: Visit all of Cisco's demos to be entered to win one $500 Ballantyne Hotel gift card

Zero Trust for the Workforce 

Duo Security, now part of Cisco, is the leading provider of Trusted Access security and multi-factor authentication. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide trusted access to all of their critical applications - for any user, from anywhere, and with any device. Stop by our booth to start your Zero Trust journey.


Demo Bingo Prize: Flying Selfie Drone

See Every Asset. Secure What Matters.

When it comes to reducing cyber exposure, an effective vulnerability management approach helps you eliminate blind spots that are often the root of security issues. But with 16,000 vulnerabilities identified in 2018 alone, security leaders know it’s not practical to find and fix every vulnerability. Using the Common Vulnerability Scoring System (CVSS) to prioritize is a good start, but it isn’t enough to address the complexity of today’s attack surface. Security professionals need to be able to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that are most likely to be exploited in the near-term. Predictive Prioritization from Tenable, Inc. is a ground-breaking new process for solving the vulnerability remediation priority problem. It leverages a proprietary machine-learning algorithm along with threat intelligence to predict the vulnerabilities with the highest likelihood of being exploited in the near future. This demo shows you how adding real-life context to your vulnerabilities can help prioritize vulnerabilities so you can focus your remediation efforts on those that matter most.


Demo Bingo Prize: Ring Stick Up Camera

Secure DDI vs The World
How to reduce threat response time, cost, while at the same time enhance your team's productivity?

Today’s cybersecurity professionals face hundreds to thousands of alerts each day, far more than the 10 to 15 they are able to effectively handle. They must also deal with dozens of security tools, manual processes, and staff shortages.

Integrating core network services into the security fabric organizations gain, highly interconnected systems by effectively eliminating silos, optimizing their security orchestration automation and response (SOAR) solutions.

Meet with our security specialist to review concrete ways to interconnect core network services with your security ecosystem, thus reducing time and cost of threat response through automation and API-based two-way sharing with other vendors.


Demo Bingo Prize: Visit all of Cisco's demos to be entered to win one $500 Ballantyne Hotel gift card

Don't Lose Your Chips. Protect Them by Playing a Strong Security Hand.
Cisco Umbrella, Secure Internet Gateway, and AMP

Do you feel like you're one bad hand away from being out of the game for good? Are ransomware, malware, and crypto mining keeping you up at night? Put your fears to rest with Cisco's Advanced Malware Protection (AMP) for Endpoints and Umbrella. Drop by our booth to learn how to prevent threats at the point of entry and ensure that malware cannot communicate back to external sources for further instruction or data exfiltration. Don't let your organization fold due to a breach. Using these tools, you'll learn how to strengthen your hand by improving your security stack.


Demo Bingo Prize: TBD

Award-winning Managed Detection and Response (MDR) Services

Proficio provides 24/7 security monitoring, investigation, alerting and response services to organizations in healthcare, financial services, manufacturing, retail, and other industries. We have been highlighted in Gartner’s Market Guide for Managed Detection and Response Services for the last three consecutive years. Proficio has a global network of Security Operations Centers (SOCs) with facilities in the US, Singapore, and Spain. Proficio invented the concept of SOC-as-a-Service and was the first managed security services provider to offer their clients insight into their security posture through a risk scoring dashboard. We are experts on industry-leading security technologies including Splunk, ArcSight, Elastic, Qualys, Cisco, Palo Alto Networks, Azure, AWS, and ServiceNow.


Demo Bingo Prize: Ring Doorbell

Beyond EDR with Cortex XDR

Cortex XDR is the world’s first cloud-delivered detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Cortex XDR automatically detects threats with behavioral analytics and machine learning and it reveals the root cause of any alert to simplify investigations. Tight integration with enforcement points accelerates containment, enabling you to stop attacks before the damage is done. Stop by our demo today and learn how XDR can unleash the full power of your security.


Demo Bingo Prize: Visit all of the IE demos to enter to win one of four $100 gift cards

Cisco Threat Response & Cisco Defense Orchestrator
Your trump cards in the high stakes game of security

Most organizations employ multiple tools to secure their environment.  But even after putting lots of chips in the pot, they still find that they are unable to view, prioritize, and respond to the multitude of events generated due to the high volume of uncorrelated alerts. Using Cisco Defense Orchestrator and Threat Response, you can manage your security infrastructure from a single pane of glass, verify your security policy is consistently enforced, spot violations in real time, and initiate remediation immediately. The ultimate trump cards!


Keep Your Data Close to Your Vest
How to avoid exposing IoT data

IoT promises to transform how organizations are run by allowing the real-time monitoring and adjustment of almost any business process. However, the sensors monitoring these processes and the data they produce are ripe for exploitation and are frequently introduced without IT involvement. See how the introduction of unregulated IoT can immediately jeopardize your company's network and what you can do to ensure your data remains safe, secure and close to your vest.



Save Your Seat