close

Endpoint Security Media

That’s a Wrap. Until Next Year, RSAC.

My experience at the annual gathering of what seems like the entire IT security industry is different than most. Each year at the RSA Conference in San Francisco IT-Harvest reserves one of the biggest hotel suites in the city and outfits it as a video studio. Our flawless team of videographers at haul in several carts of equipment, push all the furniture into a corner, hang an elaborate backdrop, and set up for a three-camera shoot. While everyone else is busy meeting, going to sessions, presenting, and walking the show floor, I am ensconced in our suite from 8 AM to 6 PM recording video interviews with industry executives, technologists, and thought leaders. Over the last six years we have recorded .  I use them in and embed them in my writing. If you are new to the IT security industry you could get up to speed quickly by watching these. They are hosted at .

Here is the complete list of 29 video interviews conducted at RSAC 2016. We will be uploading them over the next several weeks.

. John Peterson is an old friend. We have interviewed him . He joined us to talk about Comodo, which in addition to being the largest issuer of SSL certificates, offers PKI solutions for enterprise and endpoint protection for the desktop.

. I met Junaid Islam, CTO,  for the first time as I interviewed him about Vidder’s PrecisionAccess. Think white listing for access control. Users and their devices are authenticated before being granted access to only allowed applications.

. Untangle’s CEO, Bob Walters, explained how this UTM vendor is successfully executing on a go to market strategy for SMB; a rare approach in the UTM space where everyone wants to be an enterprise player.

Former Deputy Under Secretary for Cybersecurity for DHS, Mark Weatherford, talked to me about VArmour’s security for workloads in the cloud.

. Amrit Williams, CTO of CloudPassage, and fellow alumnus of Gartner, talked about cloud security and protection across multiple platforms.

. James Chappell, CTO and co-founder, introduced the concept of cyber situational awareness, an all-encompassing take on threat intelligence as it pertains to each customer.

. Andrew Rubin, CEO, returns to talk about how Illumine enforce policies across all workloads via a lightweight software agent that is installed in the operating system of any server, VM, or container. It collects network flows and workload information, and programs the native stateful firewall in the host (iptables in Linux, Windows Filtering Platform) to enforce inheritable protections.

, the SAP security platform is described by Mariano Nunez, co-founder and CEO.

. Stuart McClure dropped by to update us on his machine learning informed endpoint protection solution. After two years, Cylance is gaining traction across many enterprises.

is the re-branded GreenSQL.  I talked to the newly appointed CEO, Dan Dinnar, about enterprise adoption of cloud database firewalls.

. Casey Corcoran, VP Strategy, described how FourV’s risk management platform calculates risk factors, in real-time, from the flood of existing security and IT systems data.

. Lance James, Chief Scientist, barely took a breath as he described the value proposition and power of mining the Deep&Dark web for threat intel.

.  Tim Prendergast visited our studio to talk about Evident.io’s easy to deploy cloud policy management platform.

. John Czupak and Ryan Trost tag teamed an interview to talk about Threat Intelligence Platforms (Read more about TIPs in the IT-Harvest Threat Intel Market Research Report just published.)

. Once again we talked to John Maddison, Senior VP at Fortinet about their extraordinary growth.

. Thorsten Held, Managing Director, introduced me to whiteCryption’s software HSM. A critical component of trusted communications.

. Datacard bought Entrust at an opportune time. I talked with CEO Todd Wilkinson about the growing market for digital certificates for identity.

. Jason Hart, VP and CTO, had a wide ranging discussion about hardware HSMs and the wide breadth of enterprise security products at Gemalto.

. I talked with Klaus Gheri, VP Network Security, about a new product Barracuda introduced to tie remote facilities back to the head office securely.

is executing on its strategy to branch out from being purely an OEM provider of URL and reputation feeds to dozens of security vendors. Lior Kohavi  returned to give us an update on Cyren’s stand alone product for advanced malware defense in the cloud.

. John Petrie, CISO, talked about the company’s progress since the acquisition by NTT Docomo and future plans to consolidate MSSP services under a global umbrella.

. Matt Dirks, the CEO of Bomgar, explained how the company saw an opportunity to expand from a secure remote desktop for customer support to privileged user management.

. Ken Hunt, a youthful CEO of one of the oldest security companies, described Vasco’s two-factor authentication and digital signature solutions for financial institutions and other industry verticals.

. It was a pleasure talking to Ray Rothrock, CEO of RedSeal, once again. He introduced the concept of digital resilience and how RedSeal is building it into their risk management dashboards.

. It is well worth watching the series of interviews I have conducted with Dan Holden, Director of ASERT, Arbor’s research team. This year, as always, we had a free ranging discussion on the past year’s developments in the threat space and trends he sees in the industry.

. I talked with Sanjay Raja, Senior Director of Product Marketing. We had a great conversation about RSA’s product coverage and future plans.

. This year I talked once again with CEO and Founder Gidi Cohen. Skybox is looking to expand its position in the risk management space aggressively with the help of a recent infusion of $96 million. Ravid Circus chimed in on the technical side.

. John LaCour, Founder, talked about advanced techniques for hardening an enterprise against the scourge of phishing attacks.

. Joakim Thoren, CEO, introduced me to Versasec’s complete line of smartcard enabling products.

You can imagine that my head was packed full after three days of intensive talks with so many technology vendors. I think I was in a fog by the time I stumbled onto the show floor to see as many exhibitors as possible. I did take 15 minutes to present the results of just completed research on the entire IT security vendor space for RSA TV. Much more on that to come.

Watch this space where we will be posting each of the videos as they come out of post-production. That will give us enough content to talk about until BlackHat when we will be recording more!


endpoint security disable     endpoint security companies

TAGS

CATEGORIES