Summary of what you can find


Business Internet Security Threat Map

Business Internet Security from Orange protects the information delivered over the internet and the companies’ data against cyber-attacks. The data traffic is scanned for viruses, malware, spam, intrusion attempts and it is cleaned in the cloud, before is reaches the companies’ servers. With a simple management interface, permanent updates and upgrades, embedded professional services and security consultancy and seamless scalability and upgradability, Business Internet Security eliminates the need for expensive, on-premise equipment.

As an add-on to the service, the BIS Threat Map provides real time visualisations of cyber-risks and attacks from and to Romania, with relevant statistics by industrial verticals. This way, companies present in Romania can understand what is the threat level and types of risks they might face and take proactive measures. For more details, visit

Business Internet Security from Orange protects the information delivered over the internet and the companies’ data against cyber-attacks. The data traffic is scanned for viruses, malware, spam, intrusion attempts and it is cleaned in the cloud, before is reaches the companies’ servers and employees. With a simple management interface, permanent updates and upgrades seamless scalability and operated by security professionals from a SoC, Business Internet Security eliminates the need for expensive, on-premise equipment and in-house expertise. Besides real-time reactive response, Business Internet Security includes proactive measures such as manual pen-tests conducted by ethical hackers.

Orange Mobile Wi-Fi

Mobile Wi-Fi is a technology that is exlusively deployed by Orange in Romania and allows for a seamless integration of the mobile network and Wi-Fi. Orange customers are able to connect to Orange hotspots automatically with end-to-end encryption, without the need to manually select a network or input any password, using credentials stored on SIM cards. The technology is embedded in both Apple and Android operating systems.

Wi-fi in Transit

orange-wifiWi-FI in Transit is the only Wi-Fi service in Romania specifically developed for public transportation. It is already helping local authorities deliver high speed mobile connectivity to citizens in Cluj, Alba Iulia, Timisoara, Caransebes, and enables always-on connectivity for international bus travellers. Business Wi-Fi Mobile is also installed in several trains operated by CFR.

ThreatARMOR™ from Ixia

ThreatARMOR™ establishes a new front line of defense in clients’ networks, removing threats and improving security ROI by eliminating unwanted traffic before it hits any existing security infrastructure. It prevents network probes, phishing clicks, and all traffic to and from untrusted countries. This reduces the risk from attacks such as zero-day ransomware mutations along with up to 80% of the malicious connections that threaten the network and generate floods of security alerts.

A single ThreatARMOR security appliance can be deployed on both the inside and outside of a company’s perimeter, identifying infected internal systems and blocking communication with Botnet controllers while reducing inbound firewall load from known bad sites and countries clients don’t do business with. Even encrypted connections from those sites are automatically banned.

ThreatARMOR complements next-gen firewalls by offloading massive-scale blocking so that they can allocate more resources to content inspection, user policies, VPN termination, and other features while generating fewer security alerts.

Threat Intelligence Services from SecureWorks

Cyber threat intelligence is evidence-based information that identifies emerging threats to your organization and helps mitigate your exposure to them. An efficient threat intelligence security team analyzes and prioritizes global and targeted threats, so your organization can proactively prevent security attacks. Take advantage of our threat intelligence gleaned through scale and visibility across ~4,400 client environments around the world. Developed by the SecureWorks Counter Threat Unit™ (CTU) research team, we develop cyber threat intelligence your organization can readily take action on.

In our Security Center of Excellence in Bucharest, Romania, we are building probably the largest and most capable Threat Intelligence capability in the Eastern Europe. We are putting together in the same crucible CTU Researchers, Vulnerability Investigators, Intelligence Analysts, Malware Reversers and Client-facing Threat Intelligence Residents to create a comprehensive end-to-end strategy that is consistent with the Intelligence cycle, embedded within the greater vision of our industry-leading Counter Threat Unit™.


bitdefender-logo-red Bitdefender is a global security technology company that provides cutting edge end-to-end cyber security solutions and advanced threat protection to more than 500 million users in more than 150 countries. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a provider of choice in both hybrid infrastructure security and endpoint protection. Through R&D, alliances and partnerships, Bitdefender is trusted to be ahead and deliver robust security you can rely on.

The company’s most recent innovations – Bitdefender BOX, the breakthrough solution that protects all a user’s connected devices, and Hypervisor Introspection (HVI), a revolutionary framework to secure virtualized environments from advanced targeted cyber-attacks.

Bit Sentinel – Cyber Security Services

BIT SENTINEL provides services to private companies from European countries since 2015. Main services are related but not limited to offensive & defensive cyber security services such as penetration testing, code review, Cyber Attacks Recovery, Social Engineering (remote/physical), incident response, vulnerability management, PCI DSS security services etc for Web Application, Software Application, Mobile Application, Network Infrastructure, Wireless Infrastructure, Workstations.

Real-time Cybersecurity and Visibility for Industrial Control Networks from Enevo Group

The Nozomi Networks solution is built on a base of proprietary, foundational technologies that thoroughly learn, model and analyze your industrial control network and process.

Once the learning phase is completed, our products automatically start monitoring your system, rapidly detecting cyberattacks, cyber risks and process anomalies.
A suite of application modules helps you visualize, monitor and take actions that improve cyber resiliency, reliability and the productivity of your teams.

Our central management platform delivers consolidated OT visibility across multiple plants or SCADA networks.

Both scalable and open, our architecture supports distributed systems and integrates with security and automation infrastructure.

Delivered in a range of physical and virtual appliances, the Nozomi Networks solution installs non-intrusively with no downtime or network disruption.

Asseco SEE – We get ready for the threats of the future

Asseco SEE, one of the most important IT solutions integrators on the Romanian market, recently decided to upgrade its security solutions portfolio as a way to help its clients reach better results in the fight against cyber threats.
Citing, among other sources, several research studies on the market, the company says that 2017 and the years to follow will know an increase in cyber threats against companies and individual IT users. Such threats include malware, ransomware and botnets, attacks against confidential data, cyber spying, mobility and cloud computing, Internet of Things, internal threats and threats coming from third parties connected to targeted companies.

“The business needs tied to security will certainly intensify,” Bogdan Vigaru, Security Business Development Manager, Asseco SEE, says. “There are some clear needs to cover. Among them one can include blocking and preventing cyberattacks, proactive network monitoring, information, data and internal resources protection, consolidating current infrastructures against attacks, protecting mobile devices and, last but not least, implementing a future oriented security strategy. If all the above will be timely addressed, they will be able to ensure an easier itinerary of preparing the conformity for organizations targeted by EU’s General Data Protection Regulation (GDPR), to be implemented starting with 2018”.

The upgraded security solutions provided by Asseco SEE target the same verticals the solution integrator targets for years with its IT solutions. Among them one can include manufacturing, finance and banking, oil & gas, utilities, transportation, healthcare, services and tourism. “Most of these verticals already employ the newest, most performing and widely acknowledged technological solutions,” Vigaru adds. “That is why companies activating in such verticals should be the first to acknowledge the magnitude of the danger and to implement, as soon as possible, sound protection strategies.”

In order to satisfy potential security demands from customers, Asseco SEE developed special competencies in many areas of the large field called IT security. Consequently, the company developed competencies for Citrix, one of the most important vendors of security solutions, in networking and network workflow balancing (an area where Citrix provides a solution suite called NetScaler) as well as in Mobile Devices Management, an area where Citrix provides a management platform called XenMobile and currently is market leader.

Another important vendor partner for Asseco SEE is McAfee, one of the best known names in terms of security solutions. The solution integrator developed specific skills for products and solutions related to data encryption and protection, an area where Asseco SEE gained competencies and certifications from McAfee.

Network access is another extremely important area in terms of security offerings for customers. Here Asseco SEE developed competencies and received certifications in connection with Fortinet, another important global security solutions provider. The competencies developed can be found in terms of enterprise firewall as the main access gate in a company network, as well as in terms of wireless secure access, a very important area in terms of working with outside mobile devices inside a company network. In both areas, Fortinet developed solutions Gartner place among the most performing on the market.

Last, but not least, IBM, another Asseco SEE traditional partner, offers solutions related to security analytics and security intelligence. Once IBM recently launched cognitive computing for security, one might expect solutions provided by Asseco SEE in this area connected to the use of Artificial Intelligence (AI) in data protection to grow in terms of relevance.

“All the above mentioned vendors rank among the most important for us, but they are not the only ones,” Bogdan Vigaru adds. “We made a special mention for them because solutions they provide virtually cover the largest current scale of a company needs. Besides, they are traditional partners for Asseco SEE and in relation with them we developed the best competencies and gained the highest certifications available.”
Currently Asseco SEE’s vendor range also includes names like CheckPoint, Avanti, PaloAlto Networks, ForcePoint, Symantec, Juniper Networks, Microsoft, Cisco or TrendMicro. Added to all these, Asseco SEE also develops its own security solutions, which expand authentication and multiple factors authorising resource security, as well as protection against frauds.

Sponsors & Partners

They help us make this conference possible.

Stay Updated - Join Our Newsletter