Rohit Ghai (President - RSA)

Rohit Ghai (President – RSA)

Credit: RSA

The RSA Conference (RSAC) 2020 gives security vendors old and new a chance to demonstrate their capabilities.

The event has become an attractive venue for start-ups to make their debut. This year’s crop are demonstrating tools for DevSecOps, zero-trust networks, risk intelligence, access control, and more.

The RSAC Early Stage Expo gathers over 50 promising start-ups from all over the world, many of which have so far been in stealth mode. These are 12 of the most interesting, in alphabetical order:

1. Blu Bracket: Code Security Suite

Blu Bracket was founded in 2019 with a focus on providing security solutions for software code. At RSA, the company demonstrated its Code Security Suite, which it claims will provide greater visibility into, and keep an audit of, an organisation’s code.

Companies have the ability to see where their code is located, who has access to it, and to classify sensitive code. The product can also identify if secret information such as passwords are present.

2. BotRx: DeTx and ProTx automated fraud protection

BotRX’s mission is to protect against automated attacks against IoT devices, mobile apps or websites. The DeTx and ProTx solutions shown at RSA provide automated bot detection and mitigation capabilities to prevent identity fraud.

The company’s bot detection network aims to find anomalous behaviour and prevent automated bots attempting to log in using harvested credentials, perform form jacking attacks or crawl for website vulnerabilities.

3. Concentric: Semantic Intelligence

Concentric came out of stealth mode in January 2020 with a focus on discovering and protecting important unstructured data. Its Semantic Intelligence offering automatically discovers and classifies business critical data.

Concentric claims its Autonomous Data Risk Profiles can identify both structured and unstructured data such as intellectual property (IP), personally identifiable information (PII), financial information and source code, and then apply risk scores to it based on the sensitivity of the information and the controls and policies currently applied to it.

4. Cyber Armor: Identity-based zero-trust workload and data protection

Israel-based Cyber Armor aims to bring together workload and data protection across environments by allowing DevOps teams to create zero-trust workloads.

The company claims its service-to-service, identity-based control plane it will be showing at RSA is able to identify workloads based on application code analysis and create cryptographic signatures that only allow authorised workloads to run, access data, and use network resources

5. CyCognito: The CyCognito platform

Launched in November 2019, Palo Alto-based CyCognito aims to help quantify an organisation’s full attack surface by mapping its assets and attack surface on the internet.





Source link

Write a comment:
*

Your email address will not be published.