Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

RSA Conference 2020: Product Announcement Summary (Day 3)

RSA Conference 2020 Announcements

RSA Conference 2020 Announcements

RSA Conference 2020 takes place this week in San Francisco, with nearly 700 exhibitors and more than 40,000 attendees expected.

As the industry’s largest conference, many security vendors leverage the event to launch new products and announce updates and enhancements to their offerings.

To help cut through the clutter, the SecurityWeek team will publish a daily digest summarizing some of the product and service announcements made throughout the week. 

Coverage Summary: Day 3 | Day 2 | Day 1

Intel announced four new security capabilities and provided further information on its previously-announced Compute Lifecycle Assurance supply chain transparency initiative. Intel believes that the next ten years will see more architecture advancements than the last 50 years. The capabilities are application isolation, VM and container isolation, full memory encryption, and Intel platform firmware resilience.

SentinelOne announced the general availability of its container and cloud-native workload protection (CWPP) offering, which provides fully featured autonomous runtime protection, detection and response for cloud workloads. The solution extends SentinelOne’s XDR platform to introduce full visibility, detection, response and threat hunting for containerized workloads.

SCYTHE launched SCYTHE Marketplace, which enables trusted third-party developers to create new capabilities for the company’s attack emulation platform. The created modules can be used by red, blue, and purple teams to emulate certain types of attacks and test their defenses.

Secureworks launched Cloud Configuration Review, a cloud configuration assessment solution and the first in a suite of services building on a partnership with VMware. The platform offers public cloud security and compliance monitoring capabilities, to help detect configuration vulnerabilities, understand the business impact of critical risks, and address challenges associated with public cloud adoption.

Advertisement. Scroll to continue reading.

Google showcased new scanning capabilities in Gmail, which have already helped improve the detection rate of malicious documents by 10%. The technology was designed to help with the detection of adversarial attacks – which usually come in bursts – and has already delivered a 150% detection rate improvement. Only Office documents are being scanned at the moment, but the technology is still under development.

Gurucul announced a cloud-native data science driven platform for automating security controls that includes User and Entity Behavior Analytics (UEBA), Network Traffic Analysis (NTA), log aggregation, SIEM capabilities, SOAR, and threat hunting. Leveraging machine learning and artificial intelligence, the Unified Security & Risk Analytics helps organizations ingest and analyze data from network, IT systems, cloud platforms, applications, IoT, and more, for real-time detection of threats.

Riskonnect and Compliance.ai partnered to provide organizations with the ability to streamline compliance processes and address regulatory updates faster. By integrating Compliance.ai’s regulatory content and change management platform into Riskonnect’s compliance solution, the two companies aim to provide managers with a feed of domestic and global regulatory changes, aggregated from over 720 sources, 110 document types, and 38 document attributes.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem