Exhibitors

Subpage Hero

  

Darkinvader

Hall: N1 - N13 Stand: S175
  • | Cyber Security
  • | Threat Detection & Response
  • | Unified Threat Intelligence

DarkInvader offers External Attack Surface Management (EASM), allowing businesses to predict, plan and prepare for future security breaches. We Make Intelligence Actionable.

DarkInvader’s EASM offers a range of features to help you define your threat landscape and stay ahead of potential threats:

- Attack Surface Intelligence Gathering: Utilising human research and custom search technology, we uncover more risks when compared to automated tools.

- VIP Moinitoring: Safeguard your most targeted team members, disocver threats specifically to those individuals

- Global Threat Intelligence: Create a custom threat intelligence feed, that reduces noise, allowing you to react faster to relevant emerging threats.

- Vulnerability Scanning: Our unique approach identifies potential attack vectors and mitigates threats like SQL injections, ensuring your system's integrity 24/7. 

- Public Asset Inventory & Discovery: Build a dynamic map of your public attack surface for complete visibility of your potential threat landscape.

 

Address

Bracken Workspace
21 The Calls
leeds
LS2 7EH
United Kingdom
Visit website

Contact Exhibitor


Loading
View all Exhibitors

2024 Partners

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Security Education Partner


 

Media Partner


 

2024 SPONSORS

Platinum Sponsors


Diamond Sponsors


Gold Sponsors


Silver Sponsors


Theatre Sponsors


Securing The Cloud Stream


 

Conquering The Evolving Threat Landscape Stream

  

Building A Blueprint For Trust Stream


 

The Future of Cyber Security Stream


 

Fortifying Industry 4.0 Stream


 

GET THE LATEST INDUSTRY NEWS IN YOUR INBOX!