Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

RSA Conference 2012: Security Vendors Target the Enterprise

RSA Conference News

The RSA Conference is underway, which means vendors announcements a-plenty are on their way.

RSA Conference News

The RSA Conference is underway, which means vendors announcements a-plenty are on their way.

A number of vendors are kicking the week-long conference off today with product announcements touching everything from mobile devices to the cloud. Among them is Hewlett-Packard, which unveiled the HP Security Intelligence and Risk Management (SIRM) platform in a bid to provide a unified view into enterprise security.

RSA Conference News Update“Today’s attacks are so complex and difficult to detect, a traditional approach to security just can’t provide the level of insight necessary to secure the extended enterprise,” said Tom Reilly, vice president and general manager of enterprise security products at HP, in a statement. “The HP Security Intelligence and Risk Management platform offers visibility into diverse security environments as well as contextual intelligence to proactively manage risk from applications to network – and IT governance.”

McAfee also added its name to the list of companies making announcements with the release of McAfee Enterprise Mobility Management 10.0 with enhancements built around ease of administration and security. The latest version of the software includes email sandboxing for iOS, which prevents corporate mail from being forwarded to a personal inbox; Block iCloud Backup for iOS, which keeps the user from moving corporate data from the device to iCloud; and application blacklisting for iOS and Android devices, which allows the administrator to define a set of applications and block access. In addition, bulk provisioning for Android and iOS has been added to expedite authorization of mobile devices to large groups of users.

McAfee also said it is planning to release EMM 10.1 next month with an integrated Secure Container for Android to allow administrators to segregate corporate email, calendar and contacts from personal data via corporate policies.

“Mobile device are continuing to grow rapidly and have become a staple in work life and play,” said John Thode, executive vice president and general manager of McAfee’s consumer, mobile and small business unit, in a statement. “As a result, consumers and organizations need to ensure these devices are protected from device loss, data theft and malware that can be distributed via direct downloads, links, email attachments and text messaging.”

Fellow security firm Sophos also announced plans to target enterprise security, though their eyes are fixed on the cloud. In the latest version of its SafeGuard Enterprise product, Sophos has added SafeGuard Encryption for Cloud Storage, which automatically encrypts files uploaded to the cloud from any management endpoint, as well as SafeGuard Encryption for FileShare, which uses central keys to give access to files to authorized users or groups only.

“In today’s business world, users are everywhere, and data protection needs to be everywhere too,” said Matthias Pankert, vice president of product management at Sophos, in a statement. “With businesses continuing to experience costly and embarrassing breaches, it’s more important than ever to secure data. The latest version of SafeGuard Enterprise provides complete data protection.”

The RSA Conference this year features more than 350 exhibitors. The event will run from today until March 2 in San Francisco.

Advertisement. Scroll to continue reading.

Read More News from The RSA Conference Here.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...