ITSEC AWARD 2012

Exhibitors of Infosecurity Russia are offered to nominate their products and solutions for ITsec Award Diploma getting. The awards are the high point of the Infosecurity Russia show. 

 

Winners to get ITsec AWARD Diploma for their unique expertise, technology, solution, business model, environmental or social benefits and so on. Nomination is to be coordinated with each participant individually. Awardees will be announced at an exclusive ceremony and evening fourchette. This diploma is a good marketing tool for exponents for their further communications

 

The ITsec Award help build awareness of modern technologies and advanced products that can benefit all IT and IS users. By nominating, you help us recognize those products that bring life-improving technologies to the masses.

Let your current and future customers know, that your innovations are the most advanced for today. 

 

APPLICATIONS

In order to make the ITsec Awards nomination process greener and more efficient, we are now accepting applications online.

 

APPLICATION PROCESS 

1) Upload your contact details clearly indicating your company name and info

2) Completely fill out and submit the online application form 


FEES

A non-refundable, 350 Euro application fee is required with each

nomination. This fee covers expenses associated with the evaluation

process. Having a problems with the online form filling in - please inform us

at int@groteck.ru 

 

The deadline to send your application is 1st September 2012.
The Awards Ceremony will take place at Infosecurity Russia 2012 show on 27th September 2012.

Please note: Only Infosecurity Russia 2012 contracted exhibitors will be eligible to make nomination submissions via the online submission form. If you are interested in taking part in the ITsec Award, and are not currently signed up to exhibit at Infosecurity Russia 2012 please contact  the Infosecurity Russia sales team at int@groteck.ru 

 

| Share

Imperva Names Sunil Nagdev as Senior Vice President of Worldwide Services and SupportProfessional track record highlights success building

More

Thales launches BYOK Deployment Service for Microsoft Azure Cloud ApplicationsUnique bring your own key capability enables you to have total control over your keys and sensitive data in the Azure Cloud

More

CyberArk Software Ltd. Files Registration Statement for Proposed Secondary OfferingCyberArk Software Ltd. (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced that it has filed a registration statement on Form F-1 with the Securities and Exchange Commission for a proposed secondary public offering of its ordinary shares. The underwriters will have a 30-day option from the date of the offering to purchase additional ordinary shares. All of the shares will be offered by the company’s shareholders. The company will not receive any proceeds from the sale of these shares.

More

Ixia Study Finds That Hidden Dangers Remain within Enterprise Network Virtualization ImplementationsWhen it comes to virtualization, lack of visibility and monitoring increases vulnerability 

More

Radwares Attack Mitigation System Selected by BlackMesh - Provides Customers Protection Against DDoS Without Impacting Legitimate TrafficLeading cloud hosting company to offer DDoS protection as a service 

More

Check Point Acquires Hyperwise to Deliver Industrys First CPU Level Threat Prevention CapabilitiesAcquisition of Stealth-Mode Start-up Enhances Threat Prevention Portfolio to Stop Attacks Before They Happen

More

Akamai Acquires OctoshapeOctoshape to provide Akamai unique video optimization technology designed to enable superior IP broadcast experiences

More

IBM and Juniper Networks Partner to Build Smarter Networks with Predictive AnalyticsEmailPDFPrintRSS

More

UL LLC Collaborates with Codenomicon to Test Industrial Automation Equipment and Services and Medical Devices for Digital Security VulnerabilitiesUL and Codenomicon have collaborated to develop and perform security testing on network connected devices. Initial testing will be on industrial automation equipment and services and medical devices, with planned expansion into security testing in other industries. Codenomicon and UL will work together to provide Fuzz and Binary Analysis testing services. Fuzz Testing is a mechanism in which the communication protocols of the device under test are subjected to random exception messages to discover coding and security errors. The Binary Analysis identifies known vulnerabilities found in compiled software that could possibly be deployed in a production environment.

More

Palo Alto Networks Launches Global Fuel User Group to Shape the Future of CybersecurityMembers benefit from expert engagement, community, peer-driven events, and educational resources

More