Seven New Security Technologies Coming Out at RSA

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven New Security Technologies Coming Out at RSA-4 Next

Company: CA Technologies

Product: CA Mobile Application Management (CA MAM)

CA Mobile Application Management secures, manages and controls enterprise mobile apps with role-based, context-aware access control policies. Confidently deploy enterprise apps and data to corporate and personal devices using smart containerization powered by app wrapping.

CA Mobile Application Management helps enterprises control third-party mobile apps and vendor access to enterprise technologies and data. Where Target had issues with a third-party vendor getting hacked and then ceding access to Target's data, solutions like CA Mobile Application Management can manage the identity and authentication of those vendors and their applications, preventing breaches through risk assessment and limited access.

With the recent wave of high-profile data breaches, including the Target hack, which exposed the credit card data of millions of people, the threat landscape for enterprises and consumers appears gloomy. Whether it is nation-state attacks, cyber criminals or hacktivists, enterprises and consumers remain a constant target, especially with the growth of mobile devices, which bring even more points of entry for cyber crime.

However, help is on the way. This week, the RSA Conference, the IT security industry's largest event, will take place with leading security companies from around the world discussing new strategies and unveiling new technologies designed to help reduce cyber threats and protect against devastating attacks that can cripple a company or wipe out a consumer’s bank account.

Some of the new products and technology being released at RSA are featured in the following slides.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.