SlideShare ist ein Scribd-Unternehmen logo
1 von 13
eScan Event
ICSC
eScan participated in UBM India’s 4th Annual ICSC that was held in
Trivandrum as a Gold Partner. The aim of the event was to bring the
security decision makers (CISOs) and solution providers under roof
to network and discuss about the latest trends, shortcoming and
solutions in the security space. eScan received an overwhelming
response in the event.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...IJNSA Journal
 
Is Security Optional20100608
Is Security Optional20100608Is Security Optional20100608
Is Security Optional20100608aljapaco
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
[CNCF Webinar] Securing Cloud Native Communication, From End User to ServiceDaniel Bryant
 
Cloud Sweden Charter English
Cloud Sweden Charter EnglishCloud Sweden Charter English
Cloud Sweden Charter EnglishPredrag Mitrovic
 
Little.story.it.architecture
Little.story.it.architectureLittle.story.it.architecture
Little.story.it.architectureÉric Grall
 
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...Daniel Bryant
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloudAnil Saldanha
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
User Innovation - Xbox Kinect
User Innovation - Xbox KinectUser Innovation - Xbox Kinect
User Innovation - Xbox KinectMichele D'Aliessi
 
Internet of Things (IoT) Cases
Internet of Things (IoT) CasesInternet of Things (IoT) Cases
Internet of Things (IoT) CasesIBTECAR
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographicAtkins
 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of futureAndris Soroka
 

Was ist angesagt? (19)

Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
Is Security Optional20100608
Is Security Optional20100608Is Security Optional20100608
Is Security Optional20100608
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
 
Cloud Sweden Charter English
Cloud Sweden Charter EnglishCloud Sweden Charter English
Cloud Sweden Charter English
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Little.story.it.architecture
Little.story.it.architectureLittle.story.it.architecture
Little.story.it.architecture
 
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
[London HashiCorp] Securing Cloud Native Communication: From end user to serv...
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
A chip to protect IOT
A chip to protect IOTA chip to protect IOT
A chip to protect IOT
 
User Innovation - Xbox Kinect
User Innovation - Xbox KinectUser Innovation - Xbox Kinect
User Innovation - Xbox Kinect
 
Internet of Things (IoT) Cases
Internet of Things (IoT) CasesInternet of Things (IoT) Cases
Internet of Things (IoT) Cases
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
PETRAS - Internet of Things Research Hub
PETRAS - Internet of Things Research HubPETRAS - Internet of Things Research Hub
PETRAS - Internet of Things Research Hub
 
MST
MSTMST
MST
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future
 

Andere mochten auch

Quality Excellence in Healthcare_PHAPI_Baguio_14sept19
Quality Excellence in Healthcare_PHAPI_Baguio_14sept19Quality Excellence in Healthcare_PHAPI_Baguio_14sept19
Quality Excellence in Healthcare_PHAPI_Baguio_14sept19Reynaldo Joson
 
Launch of eScan with Cloud Security in Russia.
Launch of eScan with Cloud Security in Russia.Launch of eScan with Cloud Security in Russia.
Launch of eScan with Cloud Security in Russia.eScan
 
eScan National marketing
eScan National marketingeScan National marketing
eScan National marketingeScan
 
eScan National Marketing
eScan National MarketingeScan National Marketing
eScan National MarketingeScan
 
eScan Product Overview
eScan Product OvervieweScan Product Overview
eScan Product OvervieweScan
 
eScan TAIT - 2013.
eScan TAIT - 2013.eScan TAIT - 2013.
eScan TAIT - 2013.eScan
 
eScan Dealer Meet @ Nadiad, Gujarat India.
eScan Dealer Meet @ Nadiad, Gujarat India.eScan Dealer Meet @ Nadiad, Gujarat India.
eScan Dealer Meet @ Nadiad, Gujarat India.eScan
 

Andere mochten auch (12)

Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Unit 2.5
Unit 2.5Unit 2.5
Unit 2.5
 
Quality Excellence in Healthcare_PHAPI_Baguio_14sept19
Quality Excellence in Healthcare_PHAPI_Baguio_14sept19Quality Excellence in Healthcare_PHAPI_Baguio_14sept19
Quality Excellence in Healthcare_PHAPI_Baguio_14sept19
 
Final Seminar_advt
Final Seminar_advtFinal Seminar_advt
Final Seminar_advt
 
Launch of eScan with Cloud Security in Russia.
Launch of eScan with Cloud Security in Russia.Launch of eScan with Cloud Security in Russia.
Launch of eScan with Cloud Security in Russia.
 
eScan National marketing
eScan National marketingeScan National marketing
eScan National marketing
 
Parent responses K-5 12-2012
Parent responses K-5 12-2012Parent responses K-5 12-2012
Parent responses K-5 12-2012
 
Chapter14
Chapter14Chapter14
Chapter14
 
eScan National Marketing
eScan National MarketingeScan National Marketing
eScan National Marketing
 
eScan Product Overview
eScan Product OvervieweScan Product Overview
eScan Product Overview
 
eScan TAIT - 2013.
eScan TAIT - 2013.eScan TAIT - 2013.
eScan TAIT - 2013.
 
eScan Dealer Meet @ Nadiad, Gujarat India.
eScan Dealer Meet @ Nadiad, Gujarat India.eScan Dealer Meet @ Nadiad, Gujarat India.
eScan Dealer Meet @ Nadiad, Gujarat India.
 

Kürzlich hochgeladen

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Kürzlich hochgeladen (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

ICSC

  • 2. eScan participated in UBM India’s 4th Annual ICSC that was held in Trivandrum as a Gold Partner. The aim of the event was to bring the security decision makers (CISOs) and solution providers under roof to network and discuss about the latest trends, shortcoming and solutions in the security space. eScan received an overwhelming response in the event.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.