About
Congress results 2019
News
Partners
Agenda
Useful information
Session broadcast
Photo gallery
Threat Zone
ICC 2018
RU
Gallery
HUB 1. Perimetrix
Information-centric security model. Solutions and practical experience of Perimetrix in managing data after classification
" data-download-url="/upload/iblock/3ce/3ceebd6e8acf82b5a4c9ae977b47dc27.jpg" >
" data-download-url="/upload/iblock/d43/d43d34f070555cb55444a77428f124a8.jpg" >
" data-download-url="/upload/iblock/755/755e38702560a762418a211b3b452202.jpg" >
" data-download-url="/upload/iblock/897/8978051d0e542c0dd86355e0a1c53f5e.jpg" >
" data-download-url="/upload/iblock/263/2637b0068391cb4223ed795c3de7af95.jpg" >
" data-download-url="/upload/iblock/30b/30b07f5dfd28a858c01a6d9a770315ba.jpg" >
" data-download-url="/upload/iblock/d22/d22faf299c89505f7e227079ec2089dc.jpg" >
" data-download-url="/upload/iblock/98e/98e18acd987948c9f5aefd238fe4afff.jpg" >
" data-download-url="/upload/iblock/b2e/b2e8712340ff2cae0299cf1900ba128f.jpg" >
" data-download-url="/upload/iblock/2a1/2a17586441016caddcdf0e51b633eb98.jpg" >
" data-download-url="/upload/iblock/ea3/ea3a0d4e521ca171c1f7f5a549f1c780.jpg" >
" data-download-url="/upload/iblock/06c/06ca6e5003dd31b38bdf28a2ab9771f0.jpg" >
" data-download-url="/upload/iblock/985/98515545a6eb350422cfdb77f70ee4ef.jpg" >
" data-download-url="/upload/iblock/299/2994844c460ff1257121f5b028a84e6f.jpg" >
" data-download-url="/upload/iblock/c06/c06d083e30f0bc4a3e6e0c2cdb22a4fd.jpg" >
" data-download-url="/upload/iblock/112/1126e779c188d81a2fb9f96a9a1ea39f.jpg" >
" data-download-url="/upload/iblock/bc5/bc5bf8032bb5afca15309dc27c2e9f4e.jpg" >
" data-download-url="/upload/iblock/7ff/7ffa08e06732aea028e7a0c00a674f08.jpg" >