RSA 2016

Hot security products at RSA 2016

See the latest security wares on display at RSA in San Francisco.

bugBlast Next-gen AppSec Platform
bugBlast Next-gen AppSec Platform

Key features – bugBlast correlates results from vulnerability testing tools with real-time threat intel for a single view of an application’s security; can massively scale to test mega-apps for software, Web and mobile. More info.

Nubo
Nubo

Pricing:  On-Premises: Setup and installation, $9,500 plus $75 per user per year. Cloud: Setup and installation: $1255 plus $85 per user per year.

Key features: Nubo provides s secured remote virtual workspace that delivers a native app experience on all iOS and Android devices. All employee apps and corporate data are hosted and managed in the cloud. This enables corporations to own their data and applications, and employees to own their devices. More info.

Rsam Security Incident Response Platform (SIRP)
Rsam Security Incident Response Platform (SIRP)

Pricing: starting price of $30k per year for SaaS…scales up to $150k+ for large customers based on number of users

Key features: Rsam unveils a new Security Incident Response Platform (SIRP), as part of its Security Operations, Analytics & Reporting (SOAR) solutions, to handle and communicate complex incidents across an organization. More info.

Comodo Advanced Endpoint Protection
Comodo Advanced Endpoint Protection

Key features:  Comodo Advanced Endpoint Protection uses layered default-deny technology to instantly contain and analyze both bad and unknown files, solving the malware problem and keeping networks secure. More info.

OneLogin Desktop
OneLogin Desktop

Key features: OneLogin Desktop transforms how IT organizations approach users and devices. Instead of wasting resources on directory infrastructure, they can focus on tasks like managing users, apps, devices and security policies. More info.

Metadata Engine of GigaSECURE Security Delivery Platform (SDP)
Metadata Engine of GigaSECURE Security Delivery Platform (SDP)

Key Features: The Metadata Engine centrally generates and aggregates contextual information about network traffic and simultaneously sends it to security analytics devices that can leverage the information such as SIEMs, forensics platforms and user-behavior analytics. More info.

Sentinel
Sentinel

Key features: Trusted Circle Message Center allows members to have conversational exchanges, person-to-person interactions with all messaging guided by the pre-set policies for permission and sharing of the Trusted Circle. More info.

AuSM
AuSM

Key features: AuSM (pronounced “awesome”) is an open-source SDN framework that connects via API various network and monitoring tools, integrating into one platform to allow unified business policies to be written and managed across the WAN, data center network and storage systems. AuSM effectively removes staff and time from the equation when it comes to rolling out an SDN deployment and better aligns IT goals with business goals. More info.

Reveal
Reveal

Key features: GuardiCore Reveal is part of the v2.0 release of the GuardiCore Centra Security Platform, which protects data center assets using process-level visibility, threat deception, semantics-based analysis and automated response to detect, investigate and mitigate data center threats in real-time. More info.

CyberArk Privileged Threat Analytics v3.0
CyberArk Privileged Threat Analytics v3.0

Key features: CyberArk PTA v3 adds real-time threat detection and containment to secure against cyber attacks targeting Microsoft Active Directory infrastructure and shut down in-progress attacks including Kerberos attacks like “Golden Ticket.” More info.

Dell SonicWALL Capture Advanced Threat Protection Service
Dell SonicWALL Capture Advanced Threat Protection Service

Key features: Industry-first, multi-engine approach to advanced threat analysis delivers critical layer of defense to protect organizations from the rise of targeted, evasive and zero-day attacks. More info.

SecureAuth IdP v9.0
SecureAuth IdP v9.0

Key Features: IdP v9.0 is the first adaptive and continuous access control solution to incorporate behavioral biometrics, a new risk analysis technology that makes an organization secure while improving user experience. More info.

Kaspersky Anti Targeted Attack Platform
Kaspersky Anti Targeted Attack Platform

Pricing: Depends on many factors, including specifics of a client’s infrastructure, network topology, amount of information to be processed and packaging of the solution together with Security Intelligence Services.

Key Features: Anti Targeted Attack Platform detects targeted attacks and other malicious actions by monitoring network activity, including web and e-mail. It utilizes network and endpoint sensors and  sandbox technology to detect abnormal and potentially malicious activity. Availability of all necessary modules within the solution itself grants full compatibility with customers’ existing corporate security infrastructure. More info.

Kaspersky Security Intelligence Services
Kaspersky Security Intelligence Services

Key features: Kaspersky Security Intelligence Services includes security training, threat intelligence and reporting as well as security assessment services designed for large organizations, governmental agencies, ISPs, Telecoms and Managed Security Service Providers. More info.

Endpoint Protector Data Loss Prevention for Linux
Endpoint Protector Data Loss Prevention for Linux

Pricing: Virtual: $90 per seat down to $38 for more than 1,000 seats.  Hardware: $3,150 for 20 seats, $24,750 for 250 seats

Key features: Endpoint Protector DLP for Linux ensures protection against data leakages for confidential data on organization’s Linux workstations. More info.

Threat Hunter
Threat Hunter

Key features: Threat Hunter lets security professionals proactively identify and respond to adversaries within their networks by enabling analysts to search, pivot, and drill down across multiple dimensions of user activity to find sessions that contain specific risky behaviors. More info.

Customer Authentication
Customer Authentication

Key features: iovation’s Customer Authentication service verifies a consumer accessing an online account using device intelligence. It allows consumers with “known devices” to bypass passwords and immediately access low-risk but confidential sections of their online accounts, enabling consumer websites to maintain robust security while minimizing customer friction. More info.

Barracuda NextGen Firewall S-Series
Barracuda NextGen Firewall S-Series

Key features - The Barracuda NextGen Firewall SC1 appliance includes firewalling, Wi-Fi, and full VPN connectivity to securely connect and centrally manage remote devices or kiosks, such as ATMs or micro-offices. More info.

Skybox Horizon
Skybox Horizon

Pricing: With the licensing of Skybox Security Suite modules – it’s included. Can’t be purchased separately.

Key features: Integrating with the Skybox Security Suite, Skybox Horizon, is a first-of-its-kind security management tool that gives CISOs the unprecedented ability to visualize their enterprise attack surface in its entirety. More info.

u25
u25

Key features: Under 5 inches square, the u25 targets SMB and SOHO, yet delivers the power and features expected from enterprise solutions, including network security, traffic filtering and monitoring, bandwidth optimization and VPN. More info.

bugFraud Web Defense
bugFraud Web Defense

Key features – bugFraud Defense provides pre-, post-, and real-time login protection from hijacked sessions due to MITB or MITM attacks; host- and cloud-based, no software install required to protect end users. More info.

Fortscale 2.5
Fortscale 2.5

Key features: Fortscale 2.5 is autonomous, rule-free User Behavior Analytics UBA technology for cybersecurity. It finds and fights insider threats automatically, with an award-winning solution of unmatched intelligence, autonomy and scalability.

 

War Room
War Room

Key features: War Room is an enterprise app that provides real-time incident and crisis management collaboration in the cloud by aggregating the pieces of information all enterprise stakeholders need to have a comprehensive view of incident details in one shared space. More info.