DarkTrace, a world renowned cyber security company, has inked a commitment towards the forthcoming Cloud and Security Summit 2020.
The Cloud and Security Summit comes as the digital revolution begins to take root in Kenya. The country’s digital imprint is on the verge of making considerable strides through the advent of new and upcoming technologies. The event is themed; Safe and secure online services. Happening on the 19th and 20th at the Serena Hotel, starting at 8am.
As the world of cloud becomes receptive to the advantages of new technologies, and particularly Cloud, Darktrace’s pioneering technology, the Enterprise Immune System, applies AI to the cyber defense challenge for the first time, and has proven itself successful in detecting cyber-threats that existing, legacy systems cannot.
The Cloud and Security summit promises to highlight some of the most innovative advancements in cloud computing and the security implications that come with its adoption.
Amongst the attendees will be IT and Cyber Security experts comprising of Cyber Governance and Compliance Teams, CISOs, CIOs, CTOs and IT Architects in the public and business enterprises. Sharing experiences that are intended to debunk cyber security and myths around cloud and security.
DarkTrace, Founded in 2013 by mathematicians from the University of Cambridge and government cyber intelligence experts in the US and the UK, Darktrace is recognized today as the world’s leading AI company for cyber security.
With deep expertise in mathematics and machine learning, as well as operational experience defending critical national assets, the founding team started Darktrace to empower organizations to defend their systems against the most sophisticated cyber-threats.
Darktrace’s Cyber AI Platform offers a cloud-native security solution that protects workloads and services across hybrid and multi-cloud environments, as well as all major SaaS applications. Delivering unique, enterprise-wide security, Darktrace detects and responds to cloud-based attacks that others miss, from malicious insiders and external attacks, through to critical misconfigurations that can expose the business to future compromise.
Write to us email@example.com