View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

5 key product announcements from RSA Conference

Cybersecurity is tackling everything from analytics to data residency.

By Jimmy Nicholls

When the RSA Conference rolls into San Francisco it brings with it the cream of the cybersecurity industry, many of who are anxious to flog their products amid news of the latest data breaches.

That in mind, CBR has done the hard work for you and picked out some key product announcements from the event. Here’s what you need to know:

1. HP: mobility

After more than six decades in the computing industry, HP is looking to establish itself as the leading provider of IT services, with security considerations likely to feature heavily in the portfolio of Hewlett-Packard Enterprise, one of two companies that will be formed when HP splits.

As such the company is seeking inaugurate a "New School of Cyber Defense", aimed at securing the cloud services and mobile devices that are increasingly part of corporate life.

Among the releases this week is the behavioural visibility tool ArcSight, the mobile app vetting program Fortify, and Threat Central which is used to share threat intelligence. Also available is an update to the encryption tool HP Atalla, which will defend data while it is in transit.

2. Netskope: cloud software

Enterprise software is increasingly deployed on the cloud, both to lower costs and to allow staff to work remotely on projects. But such innovation presents security risks as sensitive information is stored and edited outside of the office.

This in mind Netskope, a cloud security firm, announced it would begin supporting Office365, the software-as-a-service version of Microsoft’s flagship suite Office, in addition to other cloud products.

Content from our partners
When it comes to AI, remember not every problem is a nail
An evolving cybersecurity landscape calls for multi-layered defence strategies
Powering AI’s potential: turning promise into reality

"The greatest concern for IT in today’s app-heavy enterprise environment is knowing exactly what’s in their cloud," said Sanjay Beri, CEO at Netskope. "Netskope is able to monitor, classify, and control data at even the most granular levels to ensure true transparency into cloud app usage trends and patterns."

3. Intel: analytics

The company formerly known as McAfee has recently morphed into Intel Security, having undergone a protracted rebranding effort to shed bad publicity associated with John McAfee, who founded and sold the unit.

Last October the firm oriented itself towards the burgeoning market for analytics and intelligence sharing, launching its Data Exchange Layer (DXL) to help facilitate communication between its product line.

From the keynote with Chris Young, GM of Intel Security, it is clear the company is building on this strategy, updating the DXL alongside the Next Generation Firewall and McAfee Advanced Threat Defense.

4. Rapid7: Data residency

Data residency has become a hot issue in the cybersecurity industry, particularity following the leaks from NSA whistleblower Edward Snowden which suggested that the US had snooped on allies in Europe and neighbours in South America.

As such many countries are demanding that user data be stored where it is collected, a trend Rapid7 want to take advantage of with the latest release of UserInsight, a cybersecurity analytics tool.

Lee Weiner, senior vice president of products and engineering at Rapid7, said: "UserInsight’s new European hosting option responds to the growing demand for an incident response solution that complies with EU data hosting requirements."

5. ThreatMetrix: identity

Authentication is one of the key security problems that the industry must face, especially given that so much cybercrime revolves around imitating people as a means of infecting their systems or defrauding them.

ThreatMetrix’s solution to this is its Digital Identity Network, which gives users a single account that can used in different places online, keeping track of which devices are being used and where in the world the account is being accessed from.

Alisdair Faulkner, chief products officer at ThreatMetrix, said: "ThreatMetrix has built the largest digital identity network that can determine when an individual’s credentials are being used by cybercriminals in real time, which enables businesses to better understand the global footprint of stolen identities."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU