Join us to take a closer look at the technologies used to address Cyber and Information Governance concerns within the NHS. Who better to take you through this journey than our new CTO who has first-hand experience of the benefits these solutions provide in a healthcare setting.
This will be the first workshop ran by our new CTO, Phil Howe. Phil spent over 10 years as part of the senior management team within the NHS and we are very excited to have him on board.
We will look closely at the capabilities of the three solutions in question, followed by a Q&A session for each.
We will also discuss their impact in the following areas:
Vectra, Network Visibility – Enabling the trust with the tools to provide real-time attack visibility. The ability to quickly and efficiently identify hidden cyber attackers within a network before they can cause irreparable damage.
Pcysys, Security Validation – The ability to find and prioritise vulnerabilities across the entire IT network . Conducting continuous ethical exploits based on infrastructure vulnerabilities, to identify threat-based weaknesses.
Stealthbits, Data Access Governance – Providing protection to sensitive data along with the credentials that hackers use to steal that data. Covering AD, file systems and shared areas Stealthbits, Data Access Governance – Providing protection to sensitive data along with the credentials that hackers use to steal that data. Covering AD, file systems and shared areas