Hot New Security Products Debuting at RSA Conference 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Next Next

Dell

Dell has announced the launch of the Dell SonicWALL Capture Advanced Threat Protection Service, which enhances organizations’ ability to safeguard against today’s shape-shifting cyber threats. Taking a first-to-market, adaptive, multi-engine sandboxing approach, Dell Security is incorporating the VMRay third-generation Analyzer threat detection analysis engine with the Lastline Breach Detection platform and the Dell SonicWALL Sonic Sandbox threat analysis engine, to deliver a three-layer level of defense that organizations need in order to safeguard against today’s unknown threats.

Every year, the RSA Conference provides a great opportunity for IT security pros to come together to discuss current and future concerns and to get access to the people, content and ideas that enable them to step up their security game and better protect high-value assets. It's also one of the best opportunities all year to preview the latest security products and innovations, and 2016 is no exception.

In this slideshow, we've pulled together a variety of the new security products that vendors are debuting at the RSA Conference 2016. From machine-learning threat intelligence to secure key management and incident response portals, organizations are sure to find something that will fit their needs.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.