RSAC Expo Guide: Top Security Vendors Technologies Wise @ RSA Conference

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. But, It’s very hard for users to identify the top security vendors for their current security requirement, and requires a lot of effort and time to shortlist the top vendors for a specific domain.

With a vision of helping Security Executives in their security buying journey, FireCompass has done a research on Top security vendors @ RSA Conference technology wise.

 

Vendors in Emerging Markets

Select a category to see the top vendors in emerging markets @ RSA Conference, 2017.

Cloud Access Security Brokers (CASB)                   Endpoint Detection & Response (EDR)

User Behavior Analytics (UBA)                                 Deception technology

 

Vendors in Established Markets

Select a category to see the top vendors in established markets @ RSA Conference, 2017.

Threat Intelligence                                Security Information and Event Management (SIEM) 

Email Security                                        IT Governance, Risk, and Compliance (ITGRC)

End Point Security (EPS)                     Next Generation Firewall (NGFW)

Data Loss Prevention (DLP)               Identity & Access Management (IAM)

Web Application Firewall (WAF)       Application Security Testing (AST)

Secure Web Gateways (SWG)             Enterprise Mobility Management (EMM)

Hope, you find this information useful. Share this with your peers, and keep spreading the good word.

 

Top Blogs

Top 5 Network Forensic tools for Q1 2017

Network Forensics is related to the monitoring and analysis of network traffic for the purposes of information gathering, legal evidence collection also to detect and identify any intrusion. Network investigation deals with volatile and dynamic data. Often network traffic is transmitted and can be lost thus network forensic must be a proactive process rather than just beingRead more about Top 5 Network Forensic tools for Q1 2017[…]

0 comments
emerging vendors in MDR

Top 5 emerging vendors of MDR Solutions (Managed Detection and Response)

Here is the list of top 5 emerging vendors of MDR Solutions (Managed Detection and Response). But before that let us understand what is the difference between MDR and MSS (Managed Security Services).   MDR vs MSS MDR is different from MSS. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts whenRead more about Top 5 emerging vendors of MDR Solutions (Managed Detection and Response)[…]

0 comments

Top 5 Emerging Vulnerability Management Solutions for Q1 2017

Here are the top 5 emerging Vendors of Vulnerability Management Solutions, before talk about vendors let me give you an idea about vulnerability Management Platform.   Vulnerability Management Solutions helps to prioritize and remediate vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.). It correlate and help to prioritize the riskRead more about Top 5 Emerging Vulnerability Management Solutions for Q1 2017[…]

0 comments
top vendors emerging in threat hunting

Top 5 Threat Hunting tools for Q1 2017

Here is the list of top 5 vendors emerging Threat Hunting tools, but before that let us understand what threat hunting exactly refers to.   Threat Hunting? Threat hunting is a proactive approach to identifying adversaries rather than reactively waiting for an alert to go off. This is an iterative process, meaning that it hasRead more about Top 5 Threat Hunting tools for Q1 2017[…]

0 comments
Vendors Providing DNS Security

Top 5 Emerging Vendors providing DNS Security

Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.   What is DNS (Domain Name System)? DNS (Domain Name System) is the most important part of Internet. When entering anyRead more about Top 5 Emerging Vendors providing DNS Security[…]

0 comments
Top Network Advanced Threat Protection Solution (ATP)

Top 5 Network Advanced Threat Protection (ATP) Solutions for Q1 2017

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor. The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it. This articleRead more about Top 5 Network Advanced Threat Protection (ATP) Solutions for Q1 2017[…]

0 comments
Top DDoS Vendors

5 Best DDoS Tools (Distributed Denial of Service) for Q1 2017

Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for legitimate users of the targeted system. The flood of incoming traffic totally overwhelms the system, hence denying service to legitimate users. This article provides you a list of best DDoS tools.   Here are the 5 BestRead more about 5 Best DDoS Tools (Distributed Denial of Service) for Q1 2017[…]

0 comments
Top Privileged Access Management Vendors

Top 5 Privileged Access Management (PAM) Vendors for Q1 2017

A privileged access management technology needs to accommodate for the special needs of privileged accounts to support access management and access-related compliance needs. This article provides you a list of top Privileged Access Management Vendors.   Here are the top 5 Privileged Access Management Vendors to watch out for:   CyberArk CyberArk is the trusted expert in privileged account security. DesignedRead more about Top 5 Privileged Access Management (PAM) Vendors for Q1 2017[…]

0 comments
5 Best Encryption Softwares for Q1 2017

5 Best Encryption Softwares for Q1 2017

Encryption is a process of protecting your sensitive data by converting it into encoded information which could be read only with a key. Endpoint Encryption ensures data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. This article provides you a list of BestRead more about 5 Best Encryption Softwares for Q1 2017[…]

0 comments

Top 5 Unified Threat Management (UTM) Vendors for Q1 2017

Unified Threat Management (UTM) is an all in one security solution that integrates firewalls, anti-viruses, content filtering, spam filtering, VPN protection, anti-spyware and other security system you need to protect your network. It can perform many security functions simultaneously to provide layered protection to all sizes of organization. This article provides you a list of topRead more about Top 5 Unified Threat Management (UTM) Vendors for Q1 2017[…]

0 comments
Top 5 Managed Security Services Providers (MSSP) for Q1 2017

Top 5 Managed Security Service Provider (MSSP) for Q1 2017

Security services of a network are often outsourced to an outside or third party service provider. Such an outsourced security service is called Managed Security Services (MSS) and the service provider provider is called Managed Security Service Provider (MSSP). This article provides you a list of top 5 Managed Security Service Provider (MSSP) for Q1 2017.Read more about Top 5 Managed Security Service Provider (MSSP) for Q1 2017[…]

0 comments
Top 5 Vulnerability Assessment Vendors for Q1 2017

Top 5 Vulnerability Assessment Vendors for Q1 2017

Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. This article provides you a list of popular Vulnerability assessment vendors for Q1 2017.Read more about Top 5 Vulnerability Assessment Vendors for Q1 2017[…]

0 comments

50 Emerging IT Security Vendors To Look Out For In 2017

We have completed our selection of the final list of 50 emerging IT Security Vendors to look out for in 2017 from the 1500+ Vendors globally. Believe me this was not easy & we don’t claim this is exhaustive list as it probably will never be as we might have missed some of the products. ButRead more about 50 Emerging IT Security Vendors To Look Out For In 2017[…]

0 comments

Top 7 Vendors in Cyber Threat Intelligence market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.   Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic andRead more about Top 7 Vendors in Cyber Threat Intelligence market at RSAC 2017[…]

0 comments

Top 5 Vendors in Email Security Market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. Email security gateways prevent malware, phishing attacks, spam and other unwanted emails from reaching their recipients and compromising their devices, user credentials or sensitive data. EmailRead more about Top 5 Vendors in Email Security Market at RSAC 2017[…]

0 comments

Top 5 Vendors in Web application Firewall (WAF) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. WAF is specialized firewall designed to protect  web applications (HTTP applications) from attacks such as cross-site scripting (XSS), SQL injection and other vulnerabilities that may existRead more about Top 5 Vendors in Web application Firewall (WAF) market at RSAC 2017[…]

0 comments

Top 6 Vendors in IT Governance, Risk and Compliance (IT GRC) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users, and practitioners to innovate, educate and discuss around the current security landscape.This blog enlists the top IT GRC vendors at RSAC 2017. IT-GRC solutions allow organizations to effectively manage IT and Security risks while reducing the cost and complexityRead more about Top 6 Vendors in IT Governance, Risk and Compliance (IT GRC) market at RSAC 2017[…]

0 comments