Seven New Security Technologies Coming Out at RSA

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven New Security Technologies Coming Out at RSA-5 Next

Company: AppRiver

Product: CipherPost Pro App

CipherPost Pro App lets businesses extend AppRiver’s powerful cloud-based encryption service to Windows Phone 8. The app integrates with the company’s current Microsoft offerings, including hosted Exchange and Office 365, adding an important layer of security.

AppRiver’s CipherPost Pro for Windows allows users and enterprises to create, read, track and reply to encrypted messages on any smartphone or tablet.

With the recent wave of high-profile data breaches, including the Target hack, which exposed the credit card data of millions of people, the threat landscape for enterprises and consumers appears gloomy. Whether it is nation-state attacks, cyber criminals or hacktivists, enterprises and consumers remain a constant target, especially with the growth of mobile devices, which bring even more points of entry for cyber crime.

However, help is on the way. This week, the RSA Conference, the IT security industry's largest event, will take place with leading security companies from around the world discussing new strategies and unveiling new technologies designed to help reduce cyber threats and protect against devastating attacks that can cripple a company or wipe out a consumer’s bank account.

Some of the new products and technology being released at RSA are featured in the following slides.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.