EXHIBITOR DETAILS

Back to Exhibitor List

First Video Communication FZ LLC

Stand No - D156, Hall No - Hall 6

United Arab Emirates

Company Profile

With over 20 years of cross-domain expertise, FVC is driven by a passion for creating value in everything we deliver. Supported by more than 100 dedicated team members, our strength comes from collaborating with 350 world-class partners across 50+ countries, serving 300+ enterprise customers. And we’re just getting started. Founded in 2000, FVC is a leading Value Added Distributor (VAD) in the Middle East and Africa (MEA), with dedicated offices in the UAE, Saudi Arabia, Egypt, Kenya, Morocco, and the UK. Our growing presence in 17 countries is further supported by a network of over 500 channel partners, offering a comprehensive portfolio of industry-leading solutions. Empower Your Cybersecurity Strategy with FVC and Leading Technology Partners Discover Cutting-edge Solutions for Enhanced Security and Efficiency .

  • Data Risk & Compliance
  • Data Security
  • Hardware
  • Network
  • People
  • Data Loss (Leakage) Prevention (DLP)
  • Data Protection
  • GDPR Compliance
  • Governance
  • Third Party Risk Management
  • Security Incident Management and Response
  • Trusted Computing, Cross Domain Security and Multi Level Security
  • DSPM
  • Email
  • PRIVACY & GRC
  • VULNERABILITY MANAGEMENT
  • Asset Management
  • Automotive Cyber Security
  • Cyber Physical
  • Endpoint Protection and Anti-virus
  • Industrial Security (ICS/SCADA Security)
  • Communication Network Solutions
  • Encryption
  • DDoS Protection
  • Firewall Configuration and Management
  • Infrastructure Network & Security
  • Intrusion Prevention Systems (and Intrusion Detection Systems)
  • IP Technology
  • NAC (Network Admission Contol)
  • Network - Equipments, components and management
  • Network - Test & Measurement equipments
  • Network Access Control
  • Network Behavior Analysis and Anomaly Detection
  • Network Firewall (includes Next Generation Firewalls)
  • Network Monitoring and Forensics
  • Network Security
  • Secure File Transfer
  • Secure Networking
  • Security Information and Event Management (and Log Management)
  • Security Operations Automation and Orchestration
  • SSL and Digital Certificate Authority and Management
  • Threat Intelligence and Signature Feeds
  • Access Management & Authentication
  • Identity and Access Management
  • Identity Theft Detection
  • Password Manager
  • Penetration Testing