Seven New Security Technologies Coming Out at RSA

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven New Security Technologies Coming Out at RSA-5 Next

Company: AppRiver

Product: CipherPost Pro App

CipherPost Pro App lets businesses extend AppRiver’s powerful cloud-based encryption service to Windows Phone 8. The app integrates with the company’s current Microsoft offerings, including hosted Exchange and Office 365, adding an important layer of security.

AppRiver’s CipherPost Pro for Windows allows users and enterprises to create, read, track and reply to encrypted messages on any smartphone or tablet.

With the recent wave of high-profile data breaches, including the Target hack, which exposed the credit card data of millions of people, the threat landscape for enterprises and consumers appears gloomy. Whether it is nation-state attacks, cyber criminals or hacktivists, enterprises and consumers remain a constant target, especially with the growth of mobile devices, which bring even more points of entry for cyber crime.

However, help is on the way. This week, the RSA Conference, the IT security industry's largest event, will take place with leading security companies from around the world discussing new strategies and unveiling new technologies designed to help reduce cyber threats and protect against devastating attacks that can cripple a company or wipe out a consumer’s bank account.

Some of the new products and technology being released at RSA are featured in the following slides.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.