RSA Conferences are where global cybersecurity vendors come together to showcase their new products and services. This is why it attracts hundreds of thousands of cybersecurity enthusiasts from around the world. This year was no different. Unlike the RSA Conference in 2021 which took place virtually, RSA Conference 2022 was an in-person event.
RSA Conference 2022 took place from 6 June 2022 to 9 June 2022 at Moscone Center in San Francisco USA. Identity and access management, Software as a Service, Security and Operations Center enhancements were some of the major themes dominating this year’s conference.
Let’s check out some amazing new cybersecurity products revealed at this year’s RSA Conference 2022.
Fortinet needs no introduction when it comes to cybersecurity products and services. Extending their lead in this domain, Fortinet unveiled Fortirecon at RSA conference 2022. Fortirecon is basically a digital risk protection service that harnesses the power of machine learning and combines it with automation and human intelligence to give you a clear picture about your enterprise attack surface.
In addition to this, it can also provide adversary centric intelligence as well as advanced brand protection to empower your business to keep cyberattackers at bay. This can help you minimize your risk and resolve cybersecurity issues quickly.
With a never ending stream of new vulnerabilities to fix, your cybersecurity teams can quickly become overwhelmed which ones to target first. This is where Checkmarx Fusion comes into play. It provides you with a unified view and runs security scans across your entire software development lifecycle to help you prioritize security loopholes based on their criticality. Checkmarx Fusion is not a standalone software but rather a part of Checkmarx one, which is a comprehensive application security platform. What really makes Checkmarx Fusion stand out is its ability to run multi-engine scans and helping you with context-based and correlation based risk prioritization.
Hunters security and operations center have been around for quite some time but the new changes made to the latest version have transformed it into an effective weapon against cybersecurity attacks. Apart from optimizing your security and operations workflows, it can now automate the entire security and operations workflow. Equipped with an intelligent threat prioritization technology, you can easily organize vulnerabilities in order of priority, thanks to its risk scores, noise reduction and data infusion capabilities.
Cybersecurity attacks are so commoneplace these days that it is no longer about ‘who will be targeted’, but rather ‘when you will be targeted’. Make sure you are ready for when that happens. Since most organizations lack an incident response plan, they end up taking weeks to recover from a cyberattack.
The Cyber Recovery Solution from Optiv is here to change that for the better. Optiv’s advanced CRS speeds up recovery from cyberattacks and leverages cutting-edge technology to protect your organization from future attacks. Its automated workflows make threat prioritization a breeze. More importantly, it can automatically backup your critical data into isolated storage.
As more and more businesses adopt zero trust architecture, the demand for solutions that facilitate those deployments have also witnessed a rise. Capitalizing on this trend, AppGate has released its latest iteration SOP 6.0. This zero trust network access solution provides granular level controls, allowing users to set low, medium and high sensitivity to each resource and workload. Moreover, users can also evaluate the risk profile of each device at the sign-in stage. You can tweak the access rights and privileges according to the risk scores with SOP 6.0.
Asset vulnerability management by Armis allows enterprise-wide threat mitigation. Be it operational technology, incident command systems or internet of things, Armis asset vulnerability management solution lets you manage the entire lifecycle from start to finish. By using automation, it can also help you minimize the time required for remediation of cyberattacks.
API security has become one of the most discussed topics in cybersecurity circles. As more and more businesses increase their reliance on APIs, the need for API security will continue to go up. Noname has introduced the latest version of their API security platform with a greater focus on regulatory requirements. Users can detect patterns and issues across different regions regardless of the traffic. The latest version also ensures compliance with regulations such as PCI-DSS, PII and more.
Do you want to minimize your enterprise attack surface? Do you want to detect high risk data or data that is not being used? If yes, then SmallID is for you. It is basically a cloud based, pay-as-you-go solution that helps you achieve both these goals. Since it relies on BigID’s machine learning technology for identifying and categorizing data, it makes it easier for your business to fulfill compliance requirements.
Threat detection and response have always been slow and partially implemented. DNS Filter’s Data Expert is here to change that. With this tool, you can automatically extract DNS Filter log data and send it directly to your security monitoring solutions or security information and event management systems. This allows you to easily analyze that data and decide what actions and steps you need to take.
For those looking for an all-in-one solution, Gurucul’s security operation and analytics platform is an ideal choice. It integrates different SOC solutions such as SOAR, IAA and UEBA and more with identity threat detection and response capabilities. It allows you to protect your organization against social engineering attacks, phishing attacks and credential theft as well as supply chain attacks.
Which cybersecurity product did you like the most at RSA conference 2022 and why? Let us know in the comments section below.