Hot New Security Products Debuting at RSA Conference 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Next Hot New Security Products Debuting at RSA Conference 2016-3 Next

LSE

With its LSE LinOTP Authentication Provider, LSE is expanding the portfolio of existing authentication provider products for Microsoft Windows and Linux operating systems to OS X®. This token solution enables implementation on a cross-platform and cross-technology basis. The new product improves the login security with a One-Time Password solution (OTP). LSE LinOTP backend supports all existing OTP implementations, such as mobile apps (Google Authenticator, FreeOTP) and tokens (i.e., OATH, Yubikey). The configuration is done via an integrated OS X® Environment native configuration dialogue.

Every year, the RSA Conference provides a great opportunity for IT security pros to come together to discuss current and future concerns and to get access to the people, content and ideas that enable them to step up their security game and better protect high-value assets. It's also one of the best opportunities all year to preview the latest security products and innovations, and 2016 is no exception.

In this slideshow, we've pulled together a variety of the new security products that vendors are debuting at the RSA Conference 2016. From machine-learning threat intelligence to secure key management and incident response portals, organizations are sure to find something that will fit their needs.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.