English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Vulnerability Management

    Stop being an easy target

    Financial Services

    Can your security keep up with you?

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    PT Industrial Cybersecurity Suite

    PT ICS is an integrated platform for cyberthreat detection and response in industrial systems

    Utilities

    Industrial-grade cybersecurity

    ERP Security

    Take control of your ERP security

    Security Compliance

    Turn policies into protection

    View all →
  • Products
    MaxPatrol 8

    Vulnerability and compliance management system.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Application Inspector

    Source code analysis tool.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    PT Network Attack Discovery

    NDR system to detect attacks on the perimeter and inside the network.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    XSpider

    Vulnerability scanner.

    MaxPatrol VM

    Next-generation vulnerability management system.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures.

    PT MultiScanner

    Multilayered protection against malware attacks.

    PT BlackBox

    Dynamic application security testing tool

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    ATM Security Assessments

    Uncover Your Weaknesses

    Web Application Security Services

    Black Box and White Box Analysis

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Penetration Testing

    A Comprehensive Approach

    Forensic Investigation Services

    Prevent Future Incidents

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    View all →
  • Partners
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • About
  • Events
  • Positive Technologies at GITEX Global 2022 in Dubai

Positive Technologies at GITEX Global 2022 in Dubai

Held on October 10–14
Dubai World Trade Center

From October 10 to 14, 2022, Positive Technologies will participate in GITEX Global—the largest exhibition of information technology and consumer electronics in the Middle East. This year, over four thousand exhibitors from 170 countries and more than 100,000 visitors are expected at the event, which has taken place in Dubai since 1981.

Ivan Brylin, International Business Development Manager at Positive Technologies, says: «The countries of the Persian Gulf and Middle East are a promising market for our products and solutions, and with an ever-increasing number of cyberthreats worldwide, we expect the demand for the advanced information security technologies that our company offers to grow in this region. GITEX Global is a great opportunity to communicate face to face with our existing and potential customers, tell them about the advantages of our products and find the optimal solutions.»

At the exhibition, Positive Technologies’ leading experts will demonstrate the capabilities of the company’s products in a number of use cases:

  • Malware detection in industrial networks. PT ISIM, a hardware and software suite for deep analysis of traffic, detects the presence of an intruder in the ICS networks. Thanks to native integration with PT Sandbox, PT ISIM detects the transmission of a suspicious object in the network and then extracts and transfers it to PT Sandbox for static and dynamic analysis. PT ISIM enables you to adjust the emulation environment (software composition, deception mechanisms) to the specifics of the target industrial company and detect known and unknown malware targeting the ICS components.
  • SCADA password brute force. Someone makes several attempts to enter the password into the WinCC SCADA form. A SOC analyst will notice the suspicious activity thanks to MaxPatrol SIEM, a system for detecting information security incidents.
  • TRACE MODE project spoofing. An intruder or an engineer with access to SCADA make configuration changes leading to an accident. Both legitimate users who violate the regulations and intruders who intentionally modify the project will be detected.
  • Stopping PLCs and writing blocks. An engineer or an intruder with access to SCADA can stop a Siemens PLC and overwrite program blocks, which may lead to an accident. Such actions, regardless of who has committed them, suggest an intruder is present within the ICS network. A SOC analyst needs to investigate and identify the attack source. This is possible thanks to the PT ISIM deep process traffic analysis system and the MaxPatrol SIEM security incident detection system.

We look forward to welcoming all GITEX Global 2022 visitors on October 10–14 at our booth H2-B40 at Dubai World Trade Center.

Other events

  • Held on November 15–18 ADIPEC 2021
  • Held on November 05–06, 2021 Sincon 2021 Conference
  • Held on October 27–28, 2021 Vietnam Security Summit
Share:
Link copied
All events
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
Find us:
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap