Welcome!

News Feed Item

Dr. Parag Pruthi to Keynote at NYIT in Abu Dhabi

NIKSUN® Inc., the world leader in real-time and forensics-based cybersecurity and network monitoring solutions, announced today that NIKSUN’s Founder, Chairman, and CEO, Dr. Parag Pruthi will give a keynote talk at the New York Institute of Technology (NYIT) Cybersecurity Conference in Abu Dhabi on March 25, 2014.

The NYIT Global Cybersecurity Conference brings together eminent cybersecurity experts to address threats faced by businesses, governments, and individuals. The event attracts leaders from major business and governmental agencies to explore and develop defenses for our increasingly enmeshed world.

In addition to founding and leading NIKSUN, Dr. Pruthi is recognized as one of the foremost experts on cybersecurity, in the world. He has been invited 5 years in a row to the NATO NIAS Symposium to give a keynote speech in front of over 800 leading security practitioners from 28 NATO nations, as well as giving prominent talks at AT&T’s cyber security event and other major conferences. Dr. Pruthi has also been invited by various governments to help draft their nation’s cyber security program, and his expertise has been sought by many to help solve some of the major cybersecurity investigations spanning the globe.

We are pleased and honored to have Dr. Parag Pruthi as a keynote speaker at our NYIT event in Abu Dhabi,” said Dr. Marta Panero, Director of Strategic Partnerships, School of Engineering and Computer Sciences, New York Institute of Technology. “Dr. Pruthi’s key expertise in assisting both governments and the commercial sector in combatting cybersecurity threats is of paramount importance to our audience and will no doubt be well-received.”

Middle East businesses face unprecedented levels of cyberattacks, as global security vulnerabilities and threats against systems, applications, and personal networks have reached their highest-ever recorded level as announced in the Cisco 2014 Annual Security Report.

In the rapidly evolving world of security threats, total global threat alerts increased 14 percent year-on-year from 2012 to 2013. Around the world, a sample of 30 of the world’s largest Fortune 500 companies generated visitor traffic to websites that host malware, with the Middle East’s energy, oil, and gas sector seeing a sharp rise in malware attacks.

The number of cyberattacks has risen over 40 percent in just the past few years at the alarming pace of millions of attacks per day.

“Cyber warfare, cyber espionage, and cyber threats are prominently on the international stage, and the Middle East with its vast energy resources has become a prime target,” said Dr. Parag Pruthi, Founder, Chairman, & CEO of NIKSUN. “The Middle East, being of strategic importance finds itself the subject of many conflicts and must therefore prepare itself hastily. The question is not when they will be targeted by cyberattacks but what minefields and backdoors have already been put in place and are being put in place even as I make these statements. For those having a strategic interest in the region and the cyber capabilities to penetrate sophisticated security measures, the race had already begun many years ago. Cyber defense capabilities including detection and forensics are key to rooting out already laid back doors and bringing to a halt exfiltration of information already taking place.”

For more information, visit NIKSUN.com.

About NYIT-Abu Dhabi

Established in 2005, NYIT-Abu Dhabi is located in the vibrant capital of the United Arab Emirates. The campus lies in the Center of Excellence for Applied Research and Training (CERT) Technology Park, home to international companies such as Intel and Lucent. For more information on the conference, click here.

About NIKSUN, Inc.

NIKSUN® is the recognized worldwide leader in making the Unknown Known. The company develops a highly scalable array of real time and forensics-based cybersecurity and network performance management solutions for government & intelligence agencies, service providers, financial services companies, and large enterprises such as retailers and manufacturers. NIKSUN´s award-winning appliances deliver unprecedented flexibility and packet capture power. The company´s patented real-time analysis and recording technology is the industry´s most comprehensive solution for secure and reliable network infrastructure and services, providing the power to instantly Know the Unknown.® NIKSUN, headquartered in Princeton, New Jersey, has sales offices and distributors throughout the US, Europe, Middle East and Asia-Pacific.

NIKSUN, NetDetector, NetVCR, NetOmni and other NIKSUN marks are either registered trademarks or trademarks of NIKSUN, Inc. in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. For more information, including a complete list of NIKSUN marks, visit NIKSUN’s website at www.niksun.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager - Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, reviewed next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discussed how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in t...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.