Loading Events
This event has passed.

What level are you?

What level are you? How mature is your organization when it comes to cyber security? Do the test today, discover your Security Maturity Level & discuss your results – free of charge – at our Booth (08C123) at InfoSecurity/Data and Cloud Expo 2018!

Through our Security Maturity Assessment, you will get a clear view of which improvements to your cyber security operations should be prioritized and why. It will help you create an actionable cyber security strategy for the coming years.

More info at Booth 08C123 at InfoSecurity: GET YOUR TICKET NOW!

On March 14 & 15, our solution experts Bob Deleeck and Tom Fonteyn will elaborate on two important trends during their presentations:

Why the (Virtual) Secure Workspace is an essential part of your Data Security strategy, and how to convert to it.       
By Bob Deleeck, Secure Workspace Business Developer at SecureLink
Place to be: Theater 4 | 10:15-10:45 | March 14 & 15

Because of the enforcement of GDPR regulations later this year, we need to be more aware of the value of our data and how to protect it. We tend to centralise more and more data into datacentres. In consequence, we see the convergence of security in the following domains: Infrastructure Security, Perimeter Security, Workspace Security, Cloud Security. During this presentation, we will address the impact of security convergence for your users, why a (Virtual) Secure Workspace is essential and how you can convert your workspaces and applications to it.


Effective Security Controls for the Cloud Perimeter
By Tom Fonteyn, Secure Cloud Business Developer at SecureLink
Place to be: Theater 4 | 12:30-13:00 | March 14 & 15

The adoption of cloud technology is no longer in its infancy. Nowadays, we must make sure to keep our security posture on par with the risks this new platform brings. During this session, I will show you how to design your cloud infrastructure from scratch with the right security controls in place.


Thanks to our partners:

Watch the Videos

Cloud Security


The Security Maturity Model

SecureLink Managed Services

Download the Whitepapers