By Cassandra Balentine
Cybersecurity is a common concern across many vertical markets. Each year, the RSA Conference addresses key issues and trends and hosts the partners and solutions that offer protection.
RSA Conference 2017 took place from February 13 to 17, 2017 in San Francisco, CA. The event brings together the top information security professionals and business leaders to discuss emerging cybersecurity trends to formulate best strategies for tackling current and future advancements.
Keynotes included, Mark McLaughlin, chairman/CEO, Palo Alto Networks; Matt Moynahan, CEO, Forcepoint; Zulfikar Ramzan, CTO, RSA; Dame Stella Rimington, formerly director general of the Security Service (MI5); Brad Smith, president and chief legal officer, Microsoft; Terence Spies, HPE distinguished chief technologist, Hewlett Packard Enterprise (HPE); Dr. Hugh Thompson, CTO, Symantec; Dr. Neil deGrasse Tyson, astrophysicist, author, and TV personality; David Ulevitch, VP, Cisco’s Security Business Group; and Christopher D. Young, SVP/GM, Intel Security.
In addition to speakers, the event brought new opportunities including a space for emerging startups—Early Stage Expo; the introduction of RSAC AdvancedU, a series of educational programs that teach cyber-awareness for children and provides outreach to college students; more Learning Labs, two hour sessions targeting senior security information practitioners; Peer2Peer Sessions, interactive gatherings for attendees with similar interests to network and explore topics; and the Sandbox interactive experience to test attendee’s infosec skills.
Exhibits and Sponsors
RSA isn’t alone in spreading the word on IT security concerns. Event sponsors include Intel Security, Microsoft, RSA, Cisco, Forcepoint, HPE, Palo Alto Networks, Qualys, Symantec, Akamai, FireEye, Fortinet, IBM, Ixia, SonicWall, Sophos, Splunk, TeleTrust, Trend Micro, and Tripwire. Additionally, exhibitors brought their latest and greatest to the table. Here we highilght offerings from event sponsors and exhibitors.
5nine Software is a global Hyper-V virtualization security and management provider. It offers the first and only agentless security and management solutions for Microsoft Hyper-V. The software is designed to reduce costs, increase productivity, and mitigate security risks. Over 100,000 users rely on the solution to migrate, manage, and secure virtual infrastructures.
Acalvio provides Advanced Threat Defense solutions to detect, engage, and respond to malicious activity inside the perimeter. The solutions are patented innovations in deception and data science. The company enriches its threat intelligence by data obtained from eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.
Akamai provides cloud services for delivering, optimizing, and securing online content and business applications. At the core of the company’s solutions is the Akamai Intelligent Platform, which provides extensive reach, coupled with unmatched reliability, security, visibility, and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand and enabling enterprises to securely leverage the cloud.
Avocado Systems, Inc. understands that applications and data are vulnerable to cyberthreats—no matter how strong perimeter security is. vRASP drives a new era in real-time application security in data center and clouds, enabling always-on self-protection with built-in security deployed across the applications, eliminating expensive add-ons, reducing performance bottlenecks, and simplifying IT complexities.
BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. The company focuses on providing companies with the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Its platform unifies effective technologies for addressing internal and external risk, privileged account management, and vulnerability management.
BlackBerry secures, connects, and mobilizes the enterprise. To manage today’s enterprise of things, BlackBerry provides a software platform that enables and manages security, mobility, and communications between and among hardware devices, programs, mobile applications and the internet of things (IoT).
Organizations worldwide use Black Duck’s products to automate the process of securing and managing open source software, eliminating the pain related to security vulnerabilities, compliance, and operational risk. The company is headquartered in Burlington, MA, and has offices in San Jose, CA, as well as Beijing, Frankfurt, Hong Kong, London, Seoul, Tokyo, and Vancouver.
CA Technologies helps customers succeed in a future where every business—from apparel to energy—is rewritten by software. From planning to development to management to security, CA it creates software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations leverage the technology that changes the way we live—from the data center to the mobile device. The company’s software and solutions help customers thrive in the new application economy by delivering the means to deploy, monitor, and secure their applications and infrastructure.
Check Point Software provides protection against all types of threats, reducing security complexity, and lowering total cost of ownership. The company remains focused on customer needs and developing solutions that redefine the security landscape today and in the future.
Cloudera delivers the modern platform for data management and analytics. The world’s leading organizations trust Cloudera to help solve challenging business problems with Cloudera Enterprise, a fast, easy, and secure data platform built on Apache Hadoop and the latest open source technologies.
CSPi assists organizations facing regulatory pressures with cyber threat detection and solutions. Its Myricom nVoy Series are visibility and data capture solutions that filter, capture, isolate, and perform forensics on data of interest. The solution is easily integrated and fully leverages existing IDS, NGFW, SIEMs, and tools such as Splunk, Bro, Suricata, and Wireshark.
F5 is developed to enable applications to run faster, smarter, and safer for businesses, service providers, governments, and consumer brands. The company delivers cloud and security solutions that allow organizations to embrace the application infrastructure they choose without sacrificing speed and control.
Gemalto is a digital security provider. The company brings trust to an increasingly connected world through services that authenticate people, transactions, and devices; and encrypt data anywhere. From payments and digital banking to enterprise security and the IoT, Gemalto’s solutions enable its clients to deliver secure digital services for billions of individuals.
HPE Security helps the industry understand the increasing complexity of today’s IT environment and the sophistication of attackers. The company is dedicated to helping its customers build security into their applications and data as well as build robust security operations capabilities to help them monitor for and respond to inevitable breaches.
IBM Security, with 6,000 dedicated professionals in more than 130 countries, delivers intelligent, integrated security technology and services to out-think cybercriminals, discover advanced threats, and prevent breaches. The company focuses on the most critical needs of its clients, optimizing security program, stopping advance threats, safeguarding critical assets; and securing cloud and mobile.
Imperva provides cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, CounterBreach, Incapsula, and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives—in the cloud and on premises, and comply with regulations.
Juniper’s Software-Defined Secure Network gives users end-to-end network visibility that secures the entire network—physical and virtual. It leverages cloud economics to find and stop threats faster, transforming networks into a single, holistic defense domain where every element becomes an enforcement point. The company co-innovates with customers and partners to deliver automated, scalable, and secure networks with agility, performance, and value.
KDM Analytics’ cyber security risk measurement products, Blade Risk Manager and Blade TOIF, quantify a system’s exposure to cyber-attacks and help prioritize risk management tasks. Use the company’s automated top-down, bottom-up analysis to focus risk management budget and resources; vulnerabilities to fix, attacks to defend against, threats to eliminate, and the riskiest components to inspect and protect.
Microsoft is building a platform that holistically looks at security across all critical end-points of today’s cloud and mobile world. Platform investments serve four categories, identity, applications and data, devices, and infrastructure—with a comprehensive approach inclusive of the technologies its customers use. Microsoft’s products act on the intelligence that comes from our security-related signals and insights, and it fosters a vibrant ecosystem of partners who help raise the bar across the industry—helping customers move faster to detect threats, and respond to security breaches across the largest of organizations.
Mimecast makes business email and data safer for 21,800 customers and their millions of employees worldwide. Founded in 2003, the company’s next-generation cloud-based security, archiving, and continuity services protect email and deliver comprehensive email risk management.
Onapsis provides comprehensive solutions for securing business-critical applications. The company’s patented solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Headquartered in Boston, MA, Onapsis serves over 180 Global 2000 customers.
Proofpoint protects people, data, and brands from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, its platform secures the way people work today—through email, mobile applications, and social media. The solution reduces business’ attacks by managing this data and protecting it as it is sent, stored, and archived. And when things go wrong, Proofpoint equips security teams with the intelligence, insight, and tools needed to quickly respond.
Radware is an application delivery and security solutions for virtual and cloud data centers. Its solutions deliver full resilience for business-critical applications, maximum IT efficiency, and complete business agility to over 10,000 enterprise and carrier customers worldwide while reducing costs.
RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud, and cybercrime.
SAS addresses extreme data challenges, simplifies complex analytics, and helps customers across industries make better decisions faster. Its software helps security teams enhance defenses, reduce risk, and improve productivity. Scaling the power of human observation and decision making through analytics, SAS security solutions provide accurate detection of suspicious activity and unprecedented network visibility.
Splunk Inc. provides a software platform for real-time operational intelligence. The company’s software and cloud services enable organizations to search, monitor, analyze, and visualize machine-generated big data coming from websites, applications, servers, networks, sensors, and mobile devices. More than 12,000 enterprises, government agencies, universities, and service providers in over 110 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance, and reduce costs. Splunk products include Splunk Enterprise, Splunk Cloud, Hunk, Splunk Light, and premium solutions.
Symantec Corporation helps businesses, governments, and people secure important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud, and infrastructure. The company operates large civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats.
Trend Micro Incorporated helps to make the world safe for exchanging digital information. Its innovative solutions for consumers, businesses, and governments are powered by the XGen blend of cross-generational threat defense techniques that applies the right technology at the right time, and provides layered security for data centers, cloud environments, networks, and endpoints.
Veracode, a pure-play application security vendor in the Gartner Magic Quadrant, delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so businesses can confidently innovate with the web and mobile applications they build, buy, and deploy as well as the components they integrate into their environments.
Verint provides Actionable Intelligence solutions, transforming the way organizations combat complex cyber threats. Verint Threat Protection System is the first unified, intelligence-driven platform that detects breaches across the attack chain, automates cyber investigations, and revolutionizes the way cyber analysts work.
As enterprise software evolves, security concerns and risks adapt as well. It is as important as ever for businesses to understand current threats and invest in solutions that protect their data against breaches and misuse. Conferences like RSA, and vendors like those mentioned above, are dedicated to spreading the word and combatting security issues.
Feb2017, Software Magazine