
Cybersecurity recommendation | 3 | When to set-up an Identity Access Management system (IAM)?
When to set-up an Identity Access Management system (IAM)? The problem: Within my company, should everyone be able to access any kind of data included

When to set-up an Identity Access Management system (IAM)? The problem: Within my company, should everyone be able to access any kind of data included

Protecting the intellectual property of my company The problem: Firewalling is all about preventing malicious access from the outside. However, a large part of unwanted

We welcome our new member Obdo – Own your data ! Obdo is a French alternative platform for the governance of data and digital services developed according

The problem : The internal network of my company is connected to the Internet, this is essential to the development of my activities. On the

Mark Forrest, co-CEO at Cryptshare. “The ECA is a great place for a company like ours to network and gain inspiration to seek new projects

Matthieu Bonenfant, CMO at Stormshield “The ECA Cybersecurity mapping highlights the diversity and the continuous dynamics in the delivery of top-edge cybersecurity technologies by European

Luc D’Urso, CEO at Atempo.Wooxo “The ECA Cybersecurity mapping is very important as no existing one gives a clear view of the key players and

Elmar Eperiesi-Beck, Founder & CEO at eperi GmbH “EUROPE NEEDS A VOICE AGAINST GAFAM While GAFAM (Google (Alphabet), Amazon, Facebook, Apple, Microsoft) products, solutions and

Red Alert Labs is an independent IoT security lab and a cybersecurity consulting agency helping organizations trust IoT devices throughout their entire life-cycle. We offer

Global DIGITAL FUTUREcongress virtual – the online congress fair on the subject of “German Mittelstand” meets International Business Development and Digitalization Would you like to