IT-SA 2018
It-sa originates from the Security Forum of Systems Munich. It has been organized as a separate exhibition in the Exhibition Centre Nuremberg since 2009 and offers visitors an opportunity to specifically discuss controversial IT security topics and offers visitors a wide spectrum of products and solutions for Info-tech security.
The range of themes on offer to visitors at the it-sa include the following topics around IT security:
- Access protection
- Anti-eavesdropping solutions
- Anti-spam solutions
- Anti-virus and malware protection
- Application security
- APT protection
- Archiving/Long-term storage
- Asset management/IT documentation
- Auditing
- Authentication
- Awareness
- Backup
- Bandwidth management solutions
- Banking (IT security solutions)
- Big data
- Biometrics
- BSI IT baseline protection (products and services)
- Business continuity
- Cloud (computing) security
- Compliance/GRC (products and services)
- Computer emergency response team (CERT)
- Content security
- Copy protection/license management
- Counter-intelligence
- Cryptography
- Cyber-physical systems security
- Data deletion
- Data leakage/loss prevention
- Data protection (products and services)
- Data recovery
- Denial of service protection
- Device management
- Digital/Enterprise Rights Management (DRM/ERM)
- Document management
- Document/media protection
- Early warning for IT
- E-government
- Electronic signatures
- Email security solutions
- Endpoint security
- Event management
- Firewalls
- Forensics
- Green IT
- Hardware security
- Health services (IT security solutions)
- High availability
- Identity and access management
- Industrial IT security
- Internet providers
- Intrusion detection/prevention
- Inventory management
- ISMS (ISO-IEC 2700x/BS 7799)
- IT service management and infrastructure library
- Laboratory/certification
- Localization
- Log management
- Mainframe security
- Managed security services
- Media disposal
- Mobile device management
- Mobile security
- Network access control (NAC)
- Network monitoring
- Open source (software and services)
- PCI DSS (products and services)
- Penetration tests
- Public key infrastructure
- RFID
- Risk analysis and management
- Secure printing solutions
- Secure software development
- Security management
- Server-based computing
- Single sign-on
- Smart cards (systems and applications)
- Social Media and Web 2.0
- Storage solutions/security
- Systems/Client management
- Test suites for security products
- Threat analysis
- Token systems
- Trust center (products and services)
- Trusted computing
- Unified threat management (UTM)/security appliances
- USB dongle
- USB storage media
- User (rights) management
- Virtualization
- VoIP security
- VPN/remote access
- Vulnerability and patch management
- Web application security
- Admission protection/access control
- Air-conditioning systems
- Alarm systems
- Data center infrastructures
- Data center security (products and services)
- Fire prevention
- IT security rooms and cabinets
- Locking systems
- Overvoltage protection
- Physical IT security
- Seepage detection/Water leak alarm
- Theft protection
- Time and attendance recording
- Uninterruptible power supplies (UPS)
- Video surveillance
- Academia/Research
- Authorities/Associations/Initiatives/Institutes
- Certification of products and services
- Consulting IT security
- Data center operation
- Education/training/qualification
- Insurance IT security
- Legal advice on IT security
- Planning of data centers and IT infrastructures
- Publications