21 Best RSA Conference 2019 Cybersecurity Solutions
The city of San Francisco, USA, hosted the traditional RSA Conference, one of the major events in the cyber security market in the world. At the conference, large companies in the industry seize the opportunity to advertise or display new offers. The CSO has made a selection of the main products that are being exhibited at the fair. The solutions are listed alphabetically by vendor name.
ArecaBay: Force Field
Force Field allows developers or security teams to deploy micro-sensor software that acts as network sniffer. Collectively, ArecaBay calls them a network engine. They do not require code change in the application at run time. Once deployed, a company can perform a three-step process to ensure the integrity of the API: discover / test, monitor, and protect all APIs.
Arxan: Rapid Protection and Threat Detection
Arxan has added new rapid protection and threat detection capabilities to its mobile, hybrid, and web application protection solutions. This new feature allows code protections and threat detection sensors to be injected into an application during the DevOps process after code development.
Attivo Networks: The Informer
Informer is a fraud-based real-time forensics offering that extends Attivo's ThreatDefend Detection and Response platform. The new tool provides insight into an attacker's activity to accelerate intelligence-driven response and correction, enhancing the ability to quickly gather, understand, and disseminate opposing intelligence.
Bloombase: StoreSafe Intelligent Storage Firewall 4.0
This latest version of StoreSafe Intelligent Storage Firewall provides automatic detection and sorting of valuable assets for an organization in traditional storage systems and next-generation cloud storage services. It delivers transparent application crypto protection and auto rekey data at rest. This allows organizations to block digital assets in storage, thereby mitigating data threats.
DataSense is an artificial intelligence-based platform for enterprise data protection and compliance. Cognigo claims that the product's natural language processing (NLP) contextualisation feature can differentiate sensitive and non-sensitive data based on the language context, which is useful for automatically discovering data that falls under the protection of privacy regulations, such as GDPR.
Comodo Cybersecurity: Managed Detection & Response (MDR)
The Comodo MDR is the hub of security operations as a service (SOCaaS). It provides a team of security researchers who monitor IT systems for signs of compromise and vulnerability scrutiny. The service relies on Comodo's endpoint and SIEM management technologies and Comodo Threat Lab threat intelligence. The MDR service will work with organizations to prioritize and remedy problems.
Cyxtera: AppGate SDP IoT Connector
The AppGate SDP IoT Connector helps protect unmanaged devices by restricting lateral movement and reducing an organization's attack surfaces using zero confidence principles. Part of Cyxtera's AppGate platform, the IoT Connector allows granular control of how and when devices connect to a network and what network resources they can connect to.
PortBlocker is an endpoint protection agent that helps protect USB devices on users' workstations, preventing data breaches or malware delivery through the USB port. It integrates with DataLocker's SafeConsole central management platform to deploy and manage remotely. PortBlocker allows only USB devices in the whitelist to be mounted. It also logs USB activity and reports from the SafeConsole management server for auditing.
Eclypsium: Eclypsium Platform v1.0
The Eclypsium platform monitors the firmware of known and unknown threats and signs of device tampering during travel and the supply chain. It also helps manage risk and firmware updates on laptops and Mac and PC computers, servers, and network devices. The Eclypsium platform supports both cloud and local deployment models.
Idaptive: Next-Gen Access Cloud
Idaptive's Next-Gen Access Cloud is designed to support the identification and access management (IAM) of an organization's zero-confidence approach. It verifies and validates people, devices, and services, while learning and continually adapting to millions of risk factors. Idaptive claims that the Next-Gen Access Cloud is the only solution that combines unique authentication, adaptive multifactor authentication, context analysis and behavior of terminals and mobile devices, and machine learning.
ImageWare Systems: Digital Identity Platform
ImageWare Digital Identity Plataform delivers end-to-end identity proofing, authentication, and lifecycle management solutions. It is available as a cloud SaaS and for local systems. Although the platform has ready-to-use options, the APIs enable custom solutions. Proof of identity allows organizations to validate individuals' digital identities. Identity authentication offers a broad set of biometric methods and other multifactor authentication methods. The platform also provides a framework for the development of digital identity ecosystems between organizations.
Nominet: Nominet NTX
Nominet NTX monitors cybernetic threats at the DNS level, a major blind spot that cybercriminals seek to exploit. Nominet says that it uses acoustic field concepts to find anomalies between the noise of DNS traffic. NTX analyzes billions of real-time data packets to identify and eradicate malicious activity.
Owl Cyber Defense: Recon1U Defense
The Owl ReCon1U is a data diode cybersecurity solution designed to reduce the attack surface of an organization in cases where bi-directional communication is required. The company claims it provides greater security assurance than traditional firewalls. ReCon1U combines the security benefits of hardware-enhanced cybersecurity solutions with secure two-way bi-directional communication.
PasswordPing: PasswordPing for Active Directory
The PasswordPing for Active Directory is a tool to detect credentials compromised: your Active Directory service protects corporate networks Active Directory unauthorized and fraud access examining user accounts in search of compromised known credentials, so they can be blocked.
SaltStack: SaltStack SecOps
SaltStack SecOps enables security professionals and IT operations teams to define a compliance policy together, examine all systems, detect and correct problems. It relies on the event-driven automation of SaltStack. SaltStack SecOps includes access to a repository of standard compliance profiles for the major Unix and Windows operating systems and container environments running Docker and Kubernetes.
SecBI: Automated Threat Detection and Response
SecBI's Automated Threat Detection and Response is a solution for Managed Security Service Providers (MSSPs). It automates the search for threats by analyzing network traffic and the response to the breach. The service creates a comprehensive view of each incident by combining alerts, events, and logs into a single narrative that shows all affected entities and the kill chain.
SureCloud: Third Party Risk Management (TPRM)
TPRM automates the third-party risk management process and integrates with broader IT risk management processes and data privacy programs. It helps you create a centralized third-party record, automatically create and send multiple assessments, and consolidate all responses. A dashboard and reporting structure provide a comprehensive view of these vendors and the risk they can pose to your organization.
Unisys: Stealth 4.0 Unisys: Stealth 4.0
Stealth 4.0 has enhancements to address the growing threats associated with cloud adoption, mobile devices, and the Internet of Things. Its integration with event management and LogRhythm security incidents (SIEM) gives the Stealth 4.0 what Unisys calls "dynamic insulation," to separate devices or users quickly at the first sign of commitment.
Vade Secure: Vade Secure for Office 365
Vade Secure for Office 365 detects advanced phishing, spear phishing and malware attacks. It integrates with the email environment and increases the security of Office 365 with predictive AI-based email defense. The tool does not require employee training or an additional interface.
Veridium: Veridium InMotion for VeridiumID
Veridium InMotion for VeridiumID is a software platform for mobile biometric authentication. Veridium's User Behavior Analysis (UBA) framework identifies human behavior patterns and analyzes them to detect anomalies that may indicate threats. Matching behavioral data captured on smartphones with users' biometrics can increase the reliability of authentication, making it difficult to falsify fingerprints or faces by malicious actors to gain access to corporate accounts.
Xton Technologies: XTAM Hybrid Access Security Broker
XTAM Hybrid Access Security Broker is an access control software for corporate networks and cloud infrastructures. After systems are locked behind a firewall, organizations can use the XTAM Hybrid Access Security Broker to limit access to trusted personnel only by using Active Directory logins, single sign-on (SSO), or multifactor authentication (MFA). It also provides monitoring, video recording and notifications required for auditing and compliance.