Hot New Security Products Debuting at RSA Conference 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Next Hot New Security Products Debuting at RSA Conference 2016-18 Next

Centripetal Networks

Centripetal Networks is releasing the latest version of RuleGate® Network Protection System (NPS) 2.7, a fully integrated threat intelligence-based defense platform. The platform dynamically updates threat intelligence from more than 40 sources, normalizes the intelligence, and applies it to the network to alert, block or redirect malicious traffic. The platform includes the Advanced Cyber Threat™ (ACT) service, the RuleGate® network appliance and QuickThreat®, Centripetal Networks’ real-time threat intelligence analytics application. The newest features give organizations the ability to prioritize threats based on business enterprise security policies to ensure the most urgent threats are dealt with first.

Three important features include:

  • Intelligent Packet Capture – PCAP data focused on the threat and made available directly to the cyber analyst.
  • SSL Inline Content Inspection – deployment option provides visibility into encrypted traffic with inline inspection and filtering of SSL-encrypted traffic and no loss of network performance.
  • Multi-Dimensional Indicators – multi-dimensional indicators factor in 5-tuple network information in combination with IP, domain or URL indicators to form more precise identification.

Every year, the RSA Conference provides a great opportunity for IT security pros to come together to discuss current and future concerns and to get access to the people, content and ideas that enable them to step up their security game and better protect high-value assets. It's also one of the best opportunities all year to preview the latest security products and innovations, and 2016 is no exception.

In this slideshow, we've pulled together a variety of the new security products that vendors are debuting at the RSA Conference 2016. From machine-learning threat intelligence to secure key management and incident response portals, organizations are sure to find something that will fit their needs.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.