More

    Seven New Security Technologies Coming Out at RSA

    With the recent wave of high-profile data breaches, including the Target hack, which exposed the credit card data of millions of people, the threat landscape for enterprises and consumers appears gloomy. Whether it is nation-state attacks, cyber criminals or hacktivists, enterprises and consumers remain a constant target, especially with the growth of mobile devices, which bring even more points of entry for cyber crime.

    However, help is on the way. This week, the RSA Conference, the IT security industry’s largest event, will take place with leading security companies from around the world discussing new strategies and unveiling new technologies designed to help reduce cyber threats and protect against devastating attacks that can cripple a company or wipe out a consumer’s bank account.

    Some of the new products and technology being released at RSA are featured in the following slides.

    Seven New Security Technologies Coming Out at RSA - slide 1

    Click through for seven new security technologies that are being unveiled at February’s RSA Conference.

    Seven New Security Technologies Coming Out at RSA - slide 2

    Company: LogRhythm

    Product: LogRhythm Security Intelligence Platform

    LogRhythm’s Security Intelligence Platform features the Identity Inference Engine and a powerful new user experience for Web and tablet interfaces. LogRhythm 6.2 includes additional scalability, performance and data collection enhancements.

    Seven New Security Technologies Coming Out at RSA - slide 3

    Company: WinMagic

    Product: SecureDoc 6.4

    SecureDoc 6.4 is a data security software that encrypts data at rest, and is now enhanced with BitLocker management. Microsoft BitLocker is a commonly used data security feature that encrypts data; BitLocker users deploying SecureDoc 6.4 remove many common encryption headaches, as well as password-reset and user-provisioning challenges. Along with support for the latest enterprise-grade Trusted Computer Group standard self-encrypting drives, WinMagic enables customers to secure data in ways that are compatible with the most advanced storage approaches and common operating systems without experiencing any of the hassles typically associated with encryption.

    Seven New Security Technologies Coming Out at RSA - slide 4

    Company: CA Technologies

    Product: CA Mobile Application Management (CA MAM)

    CA Mobile Application Management secures, manages and controls enterprise mobile apps with role-based, context-aware access control policies. Confidently deploy enterprise apps and data to corporate and personal devices using smart containerization powered by app wrapping.

    CA Mobile Application Management helps enterprises control third-party mobile apps and vendor access to enterprise technologies and data. Where Target had issues with a third-party vendor getting hacked and then ceding access to Target’s data, solutions like CA Mobile Application Management can manage the identity and authentication of those vendors and their applications, preventing breaches through risk assessment and limited access.

    Seven New Security Technologies Coming Out at RSA - slide 5

    Company: AppRiver

    Product: CipherPost Pro App

    CipherPost Pro App lets businesses extend AppRiver’s powerful cloud-based encryption service to Windows Phone 8. The app integrates with the company’s current Microsoft offerings, including hosted Exchange and Office 365, adding an important layer of security.

    AppRiver’s CipherPost Pro for Windows allows users and enterprises to create, read, track and reply to encrypted messages on any smartphone or tablet.

    Seven New Security Technologies Coming Out at RSA - slide 6

    Company: Identity Finder, LLC

    Product: Sensitive Data Manager 7.5

    Sensitive Data Manager (SDM) helps enterprises focus security resources effectively and protect at-risk data. Discover, classify, remediate, monitor and report on sensitive data to meet compliance goals, protect reputation and facilitate business continuity.

    SDM allows users to discover and inventory where all sensitive data is stored, then make decisions knowing what data to destroy, secure or whitelist to classify information and take steps to reduce exposure.

    Seven New Security Technologies Coming Out at RSA - slide 7

    Company: ESET

    Product:  ESET Secure Authentication 2.0

    ESET Secure Authentication 2.0 (ESA 2.0) is an updated version of its potent, software-based two-factor authentication (2FA), safeguarding mobile workforces against data breaches due to compromised passwords and aiding in regulatory compliance with HIPAA, PCI DSS and others. ESA 2.0 has the following new features and benefits: SDK for custom integration scenarios, broader support of business tools such as Microsoft SharePoint and Microsoft Dynamics, the ability to add to Remote Desktop Web Access logins, and a simplified installation process that informs the client of specific problems on the domain before the installation proceeds.

    This simple and highly efficient application makes use of remote end users’ mobile devices to deliver a one-time password (OTP) when they connect to company networks, providing added security to the network and the device. The associated loss or theft of sensitive data, subsequent brand erosion and revenue impact can cripple a business of any size. Adding secure validation to weak and static user passwords and unsecured remote access makes businesses dramatically less of a potential target for cyber criminals.

    Seven New Security Technologies Coming Out at RSA - slide 8

    Company: Appthority 

    Product: Appthority Mobile App Risk Management Service

    Appthority is offering new customizable workflow features for its fully automated app risk management service. The Appthority SaaS-based service now allows IT administrators the flexibility to create and manage mobile app policies by company department, by geography or even by device type – whether company or employee owned. This includes approving and enforcing custom, acceptable use polices at scale, or supporting the creation and implementation of multiple group and role-based policies simultaneously.  

    Increased use of mobile devices, along with the growth of the bring-your-own-app (BYOA) economy, has introduced new threats to the enterprise. The average employee has over 100 mobile apps on their smartphone or tablet, with many of those apps capable of accessing and exposing critical and sensitive corporate and personal data. Appthority’s new workflow enhancements provide enterprise IT with another means to leverage mobility and provide security to prevent data breaches. 

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends, and analysis.

    Latest Articles