ACUTIV
Stand No - SP136, Hall No - Hall 3
United Arab Emirates
Company Profile
Join ACUTIV on the forefront of cybersecurity, where innovation meets protection, and together, let's secure a digital future.
- Network
- Hardware
- Software
- Data Risk & Compliance
- People
- Data Loss (Leakage) Prevention (DLP)
- Data Security
- Privacy & GRC
- Trusted Computing, Cross Domain Security and Multi Level Security
- Vulnerability Management
- Asset Management
- Automotive Cyber Security
- Embedded Security
- Industrial Security (ICS/SCADA Security)
- Internet of Things (IoT) Security
- IOT/OT SECURITY
- Communication Network Solutions
- Data-in-Motion/Transit (Network) Encryption and VPN
- DDoS Protection
- Firewall Configuration and Management
- Firewalls
- Infrastructure Network & Security
- Internet Security
- Intrusion Prevention Systems (and Intrusion Detection Systems)
- IP Technology
- NAC (Network Admission Contol)
- Network - Equipments, components and management
- Network - Test & Measurement equipments
- Network Access Control
- Network Behavior Analysis and Anomaly Detection
- Network Components
- Network Firewall (includes Next Generation Firewalls)
- Network Monitoring and Forensics
- Network Security
- Secure File Transfer
- Secure Networking
- Security Configuration Management
- Security Information and Event Management (and Log Management)
- Security Operations Automation and Orchestration
- SSL and Digital Certificate Authority and Management
- Threat Intelligence and Signature Feeds
- Transport Access Control
- Access Management & Authentication
- Authentication (User Authentication, Biometric Authentication and PKI)
- Biometrics
- CONSULTING
- Fraud Prevention
- IDENTITY
- Identity and Access Management
- Identity Theft Detection
- Password Manager
- Penetration Testing
- SECOPS/SIEM
- Services MDR/MSSP
- Soar/Automation
- Anti-Malware, Anti-Spam & Anti-Virus and E-Mail security
- Application Control
- Application integration and infrastructure
- Application Security, Testing & Control
- Applied Security
- Automation
- Automation, Bots
- Behavior Analytics (User and Entity)
- Big Data Security
- Cloud Security
- Cryptography
- Cyber Maneuver (Network Masking)
- Cyber Threat Hunting
- Data Analytics and Automation
- Database Security
- Deception-Based Security
- Digital Forensic Investigation and Computer Forensics
- Encryption
- Endpoint
- Endpoint Threat Detection and Response
- File Content Security
- Malware Detection and Analysis
- Managed Security Services
- Managed Services
- Mobile Data Protection
- Mobile Device Management
- Patch Configuration and Management
- Payment Security
- Platform Security
- Software Supplychain
- Specialized Threat Analysis and Protection
- Web AppSec