San Francisco ― The RSA Conference brought down the curtain last week, along with its expo. For this year’s exhibition, more than 600 vendors set up their booths and welcomed their guests. The Readable circled around the expo floor several times, looking for captivating technologies that might become the next generation of cybersecurity. As an editor who has been covering the cybersecurity industry for years and visiting the conference for the fourth time, I have picked some of the most interesting vendors that I found at the expo this year. My selection is all subjective and is not sponsored by any of the selected companies. The purpose of this article is solely to give our readers another perspective into the latest trends in this field. So, please enjoy.
1. Verimatrix
1) Keyword: Mobile
2) Editor’s note: Verimatrix is amazing! Their way of thinking about defense is truly generated from a modern understanding of cybersecurity, which mostly relates to application security. They go beyond traditional parameters that have been limited to the internal network of a company and prevent abnormal activities coming from end-users’ mobile devices and applications. As an anti-piracy leader, whose name is well-known in Hollywood, Verimatrix now defines themselves as a cybersecurity company.
3) Introduction by the vendor: The fastest-growing enterprise security threat today is from mobile. Verimatrix XTD (Extended Threat Defense) shields mobile applications with layered protection and telemetry to empower CISOs, SOC teams, product engineers, and mobile application developers to detect and respond to cyberattacks that originate from any connected device powered by an application. Using artificial intelligence and machine learning combined with a team of data scientists who provide monitoring services, along with our agentless, zero code deployment, we help customers launch quickly, mitigate risks, safeguard consumer data, prevent compliance fines, and protect their valuable reputations.
2. Pentera
1) Keyword: Penetration testing
2) Editor’s note: Pentera is all about being proactive. They offer automated penetration testing for companies to check their security posture. This helps customers identify the weakest points in their network, constantly running the validation process. Pentera thinks like adversaries to inform customers about which parts of a company are most likely to be targeted.
3) Introduction by the vendor: The Pentera Platform automatically uncovers real exposures in the organization’s environment. It challenges the entire IT attack surface by safely emulating the actions of an attacker, providing real-time security validation at scale. Requiring no agents, the platform tests the effectiveness of existing security controls. The result of the tests provides security teams with an understanding of their defenses’ efficacy against modern attacks. With Pentera, organizations can continuously improve their cybersecurity posture by performing validation tests as frequently as needed. Evidence-based test findings are prioritized based on their risk impact, giving organizations the ability to focus remediation efforts on the vulnerabilities that matter the most.
3. LogRhythm
1) Keyword: SIEM (Security Information and Event Management)
2) Editor’s note: SIEM may sound old, but LogRhythm does it on a whole different level. Its comprehensive, integrated platform is designed to reduce the overwhelming burden, which is given to security staff, by eliminating the manual process of monitoring security alerts and responding to security incidents. And their platform is simple, easy, and beautiful.
3) Introduction by the vendor : LogRhythm helps busy and lean security operations teams save the day. There’s a lot riding on the shoulders of security professionals — the reputation and success of their company, the safety of citizens and organizations across the globe, the security of critical resources — the weight of protecting the world. LogRhythm helps lighten this load. The company is on the frontlines, defending against many of the world’s most significant cyberattacks and empowering security teams to navigate an ever-changing threat landscape with confidence. As allies in the fight, LogRhythm combines a comprehensive and flexible security operations platform, technology partnerships, and advisory services to help SOC teams close the gaps.
The cover photo of this article was provided by RSAC