• darkblurbg

Co-sponsored by
AFCEA International
& U.S. Naval Institute

Register Exhibit Sponsor

Slide 1

Government Technology Solutions  

Shingle Springs,  CA 
United States
http://www.gvtechsolutions.com
  • Booth: 648

Profile

gvTechSolutions has been providing emerging security/IA tools to Federal agencies since 1997. If your group is using Web content Filtering, SEIM, NGFW, Gateway Malware Scanning, DLP, Anti-Spam, or IoET technology - that was first introduced to Federal Agencies by gvTechSolutions! Stop by booth 648 to see what the next generation of security is going to be, or how to prevent building a Cyber Castle - a term introduced by gvTech in 2009!


 Products

  • PwnPro & PwnPulse
    Pwn Pro detects all wired, wireless, and bluetooth devices on and in the vicinity of organizations’ premises and alerts for unauthorized, vulnerable, rogue, and suspicious devices and access points....

  • Using our enterprise-proven, sensor-based approach, Pwn Pulse and Pwn Pro detects all wired, wireless, and bluetooth devices on and in the vicinity of organizations’ premises and alerts for unauthorized, vulnerable, rogue, and suspicious devices and access points. In addition to monitoring for changes to authorized devices that could introduce risk, Pwn Pulse alerts you to the presence of unknown, unchecked, and potentially harmful devices. The solution comes pre-configured and our plug-and-play technology means deployment is done in a matter of hours, and minutes after that your centralized console will be detecting: Shadow IT and High-Risk Bring Your Own Everything (BYOX) ◾ Unauthorized Personal Devices in Violation of Policy ◾ Corporate-Sponsored BYOD Hardware ◾ Devices in Default, Misconfigured, or Vulnerable State Vulnerable IOT Devices ◾ Wireless/Mobile Devices Roaming from Corporate Approved to “guest”/unauthorized Wireless Access Points (APs) ◾ Wireless/Mobile Devices Connecting to Open, Unencrypted Third Party Wireless Networks ◾ Vulnerable, Default-state, or Misconfigured Printers ◾ Default-state Wireless APs ◾ Default-state Network Equipment Purpose-Built Malicious Hardware ◾ Purpose-built, Application Specific Devices Designed to Capture Passwords, Credit and Debit Card Numbers, PINs, Keystrokes and Confidential or Proprietary Data ◾ Devices Designed to Breach WiFi Networks, Wireless APs, Wireless/Mobile Client Devices, and Bluetooth Devices ◾ Devices Built to Compromise Cellular Networks ◾ Devices designed to attack or imitate other commonly used RF Technologies