All Blog Posts Tagged 'Emerging' (41)

Top 5 Emerging Vulnerability Management Solutions for Q1 2017

  • Vulnerability Management Solutions helps to prioritize and remediate vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.). It correlate and help to prioritize the risk (some do this by…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Threat Hunting tools for Q1 2017

Here is the list of top 5 vendors emerging Threat Hunting tools, but before that let us understand what threat hunting exactly refers to.

Threat Hunting?

  • Threat hunting is a proactive approach to identifying adversaries rather than reactively waiting for an alert to go off. This is an iterative process, meaning that it has to be continuously carried out in a loop, beginning with a hypothesis. It involves a security analyst who keeps an…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 emerging vendors of MDR Solutions (Managed Detection and Response)

  • Here is the list of top 5 emerging vendors of MDR Solutions (Managed Detection and Response). But before that let us understand what is the difference between MDR and MSS (Managed Security Services).

 

MDR vs MSS

  • MDR is different from MSS. Managed Security Service Providers (MSSPs) monitor network security controls…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

  • We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending RSAC 2018, April 16 to 20 in San Francisco.
  • BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo like a pro.  

Emerging IT Security…

Continue

Added by CISO Platform on November 29, 2019 at 12:30pm — No Comments

Top 5 Vendors in Identity & Access Management (IAM) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.

Identity and Access Management is the practice of managing digital identities through-out their life-cycle, managing access rights to enterprise resources and auditing of user access rights, use/misuse of digital identities. The entire process is…

Continue

Added by pritha on November 29, 2019 at 12:30pm — No Comments

Top 6 Vendors in Secure Web Gateways (SWG) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.

 

Web Security Gateway Vendors provide solutions to protect web-surfing PCs from infection and enforce company and regulatory policy compliance. These gateways must, at a minimum, include URL filtering, malicious-code detection and filtering,…

Continue

Added by pritha on November 29, 2019 at 12:30pm — No Comments

Top 6 Vendors in EPS market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. This blog enlists the top End point Security vendors at RSAC 2017

 

Endpoint security solutions are suite of products that apply centralized policy based controls to endpoint devices ie, workstations, servers, mobile devices, and other end…

Continue

Added by pritha on November 29, 2019 at 12:30pm — No Comments

Top Cyber Security Companies at RSA Innovation Sandbox 2018

RSA Innovation Sandbox Contest for the past 12 years has been awarding most innovative information security companies and products.  Let’s have a look at those companies who emerged as innovative cyber security startups at RSA Conference 2018.

BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at…

Continue

Added by CISO Platform on November 29, 2019 at 12:00pm — No Comments

Top 6 Vendors in IT Governance, Risk and Compliance (IT GRC) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users, and practitioners to innovate, educate and discuss around the current security landscape.This blog enlists the top IT GRC vendors at RSAC 2017.

IT-GRC solutions allow organizations to effectively manage IT and Security risks while reducing the cost and complexity of compliance. IT and Security GRC management solution are focused on…

Continue

Added by pritha on November 28, 2019 at 6:00pm — No Comments

Top Cyber Security Companies at RSA Innovation Sandbox 2018

  • RSA Innovation Sandbox Contest for the past 12 years has been awarding most innovative information security companies and products.  Let’s have a look at those companies who emerged as innovative cyber security startups at RSA Conference 2018.
  • BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo like a pro. Do check it…
Continue

Added by CISO Platform on November 28, 2019 at 5:44pm — No Comments

Top 5 Vendors in Email Security Market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.

Email security gateways prevent malware, phishing attacks, spam and other unwanted emails from reaching their recipients and compromising their devices, user credentials or sensitive data. Email security refers to the collective measures used to…

Continue

Added by pritha on November 28, 2019 at 5:30pm — No Comments

Top 7 Vendors in Cyber Threat Intelligence market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.

 

Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and…

Continue

Added by pritha on November 28, 2019 at 5:30pm — No Comments

Top 5 Vendors in Web application Firewall (WAF) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. WAF is specialized firewall designed to protect  web applications (HTTP applications) from attacks such as cross-site scripting (XSS), SQL injection and other vulnerabilities that may exist in. It is able to detect and prevent unknown attacks by inspecting…

Continue

Added by pritha on November 28, 2019 at 5:30pm — No Comments

Top Emerging Cyber Security Vendors To Look Out For In 2018

  • Looking for Top Emerging Companies in the Cyber Security Industry?  FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have missed some of the products. But still we gave our best to give you the top guns who are uniquely innovative in their area of expertise.
  • Lets have a look at 50 Emerging Cyber Security Vendors for year…
Continue

Added by CISO Platform on November 28, 2019 at 5:00pm — No Comments

50 Emerging IT Security Vendors To Look Out For In 2017

We have completed our selection of the final list of 50 emerging IT Security Vendors to look out for in 2017 from the 1500+ Vendors globally. Believe me this was not easy & we don’t claim this is exhaustive list as it probably will never be as we might have missed some of the products. But still we gave our best to give you the top guns who are uniquely innovative.

 

Emerging IT Security Vendors:

Here is the…

Continue

Added by pritha on November 28, 2019 at 3:30pm — No Comments

Cyber-hijacking Airplanes

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Attacking the Internet of Things

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

The Dangers of Insecure Home Automation Deployment

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 2:30am — No Comments

Elevator Hacking: From the Pit to the Penthouse

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 2:30am — No Comments

Attacking the Traveling Salesman

Added by CISO Platform on August 14, 2014 at 2:20am — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service