
Cybersecurity recommendation | 3 | When to set-up an Identity Access Management system (IAM)?
When to set-up an Identity Access Management system (IAM)? The problem: Within my company, should everyone be able to access any kind of data included
When to set-up an Identity Access Management system (IAM)? The problem: Within my company, should everyone be able to access any kind of data included
Protecting the intellectual property of my company The problem: Firewalling is all about preventing malicious access from the outside. However, a large part of unwanted
We welcome our new member Obdo – Own your data ! Obdo is a French alternative platform for the governance of data and digital services developed according
The problem : The internal network of my company is connected to the Internet, this is essential to the development of my activities. On the
Mark Forrest, co-CEO at Cryptshare. “The ECA is a great place for a company like ours to network and gain inspiration to seek new projects
Matthieu Bonenfant, CMO at Stormshield “The ECA Cybersecurity mapping highlights the diversity and the continuous dynamics in the delivery of top-edge cybersecurity technologies by European
Luc D’Urso, CEO at Atempo.Wooxo “The ECA Cybersecurity mapping is very important as no existing one gives a clear view of the key players and
Elmar Eperiesi-Beck, Founder & CEO at eperi GmbH “EUROPE NEEDS A VOICE AGAINST GAFAM While GAFAM (Google (Alphabet), Amazon, Facebook, Apple, Microsoft) products, solutions and
Red Alert Labs is an independent IoT security lab and a cybersecurity consulting agency helping organizations trust IoT devices throughout their entire life-cycle. We offer
Global DIGITAL FUTUREcongress virtual – the online congress fair on the subject of “German Mittelstand” meets International Business Development and Digitalization Would you like to