EXHIBITOR DETAILS

Back to Exhibitor List

ACUTIV

Stand No - SP136, Hall No - Hall 3

United Arab Emirates

Company Profile

Join ACUTIV on the forefront of cybersecurity, where innovation meets protection, and together, let's secure a digital future.

  • Network
  • Hardware
  • Software
  • Data Risk & Compliance
  • People
  • Data Loss (Leakage) Prevention (DLP)
  • Data Security
  • Privacy & GRC
  • Trusted Computing, Cross Domain Security and Multi Level Security
  • Vulnerability Management
  • Asset Management
  • Automotive Cyber Security
  • Embedded Security
  • Industrial Security (ICS/SCADA Security)
  • Internet of Things (IoT) Security
  • IOT/OT SECURITY
  • Communication Network Solutions
  • Data-in-Motion/Transit (Network) Encryption and VPN
  • DDoS Protection
  • Firewall Configuration and Management
  • Firewalls
  • Infrastructure Network & Security
  • Internet Security
  • Intrusion Prevention Systems (and Intrusion Detection Systems)
  • IP Technology
  • NAC (Network Admission Contol)
  • Network - Equipments, components and management
  • Network - Test & Measurement equipments
  • Network Access Control
  • Network Behavior Analysis and Anomaly Detection
  • Network Components
  • Network Firewall (includes Next Generation Firewalls)
  • Network Monitoring and Forensics
  • Network Security
  • Secure File Transfer
  • Secure Networking
  • Security Configuration Management
  • Security Information and Event Management (and Log Management)
  • Security Operations Automation and Orchestration
  • SSL and Digital Certificate Authority and Management
  • Threat Intelligence and Signature Feeds
  • Transport Access Control
  • Access Management & Authentication
  • Authentication (User Authentication, Biometric Authentication and PKI)
  • Biometrics
  • CONSULTING
  • Fraud Prevention
  • IDENTITY
  • Identity and Access Management
  • Identity Theft Detection
  • Password Manager
  • Penetration Testing
  • SECOPS/SIEM
  • Services MDR/MSSP
  • Soar/Automation
  • Anti-Malware, Anti-Spam & Anti-Virus and E-Mail security
  • Application Control
  • Application integration and infrastructure
  • Application Security, Testing & Control
  • Applied Security
  • Automation
  • Automation, Bots
  • Behavior Analytics (User and Entity)
  • Big Data Security
  • Cloud Security
  • Cryptography
  • Cyber Maneuver (Network Masking)
  • Cyber Threat Hunting
  • Data Analytics and Automation
  • Database Security
  • Deception-Based Security
  • Digital Forensic Investigation and Computer Forensics
  • Encryption
  • Endpoint
  • Endpoint Threat Detection and Response
  • File Content Security
  • Malware Detection and Analysis
  • Managed Security Services
  • Managed Services
  • Mobile Data Protection
  • Mobile Device Management
  • Patch Configuration and Management
  • Payment Security
  • Platform Security
  • Software Supplychain
  • Specialized Threat Analysis and Protection
  • Web AppSec