Micron Technology

Micron Technology

Micron Technology is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Storage Data Security - Protect your data from breaches and other intrusive, costly security threats with rock-solid Micron SSDs — like our self-encrypting drives (SEDs) that guard your data at rest, helping to prevent unauthorized access.

Embedded Memory Solutions - Memory Solutions for the Internet of Things and beyond.

Mobile Memory Solutions - low-power, high-performance memory products for mobile devices.

Contact Information

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

CyberOwl

CyberOwl

CyberOwl's early warning system uses a probabilistic framework to systematically aggregate uncertain and disparate security events to provide real-time visibility of threats to every asset.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

Protergo

Protergo

Protergo is the first integrated provider of cybersecurity solutions in Indonesia. We proactively protect our clients from cyber threats.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

Haiku Cyber Range

Haiku Cyber Range

Haiku is the new approach towards cyber security training. Accessible, affordable, and relevant cyber security training, built by hackers for would-be hackers as well as network defenders.

OnDefend

OnDefend

OnDefend delivers information security solutions that improve overall security posture, reduce risks and defend against continually evolving and persistent cyber adversaries.

Strikeforce Technologies

Strikeforce Technologies

StrikeForce Technologies is a unique Cybersecurity Company for businesses & consumers that provides, “Out-of-Band Authentication” and “Endpoint Protection” using keystroke encryption.