IT2TRUST INVITES YOU TO THE LARGEST
SECURITY SUMMIT THIS SPING

We have gathered 12 of our strongest security brands and is ready to give you full day where you can get inspiration from 18 exciting sessions – where the demonstration of the technologies will be of the highest priority.

It is my great pleasure to invite you to our annual workshop for security- and networking software. Come and meet your IT2Trust contacts, as well as some of the industry’s most important security vendors face-to-face. Get updated on the latest security-technologies, with a program of your own choice. You can choose between 18 sessions, all will include technology, be business oriented, and also give you a live demo of the solutions.

When you choose to attend our Security Summit 2018, it’s our clear goal to make full use of the time you invest. That’s why you design your own agenda for the day by choosing exactly what sessions are relevant for you. All workshops will include “LIVE” demonstrations of the products and NOT comprehensive and boring PowerPoint presentations. Most sessions will take place in English.

It is FREE to participate at the Security Summit

EVENT VENUE:
FARUM PARK, 12TH APRIL 2018

See for yourself – watch the technologies and products in our LIVE demonstrations hear how you and your business can benefit from them in the everyday life.

SEE COMPLETE AGENDA, SESSION-OVERVIEW AND REGISTRATION AT: WWW.IT2TRUST.COM/SUMMIT18

We look forward to seeing you.
Kind Regards
IT2Trust & Vendors

“IT-SECURTY FROM A HIGHER PERSPECTIVE”

INSPIRATION!

Come and meet some of the leading IT security and Networking vendors face-to-face …
Meet the security experts from Avecto, BitRater, Datalocker, Flowmon, iDENprotect, Ivanti, KEMP Technologies, Neustar, Proofpoint, Skybox Security, Swivel Secure og Tenable Network Security.

At the Security Summit you can experience technologies within: Anti-Virus & Anti-Malware, Advanced Persistent Threat, Application Whitelisting, Application Control, User validation, Cloud Security, Identity Management, Encryption, Network Monitoring, Patch Management, Data Leakage Prevention, Cybersecurity Management, Load Balancing, Vulnerability Management, Mail/Web Scanning and Mobility.