Security, et al

Randy's Blog on Infosec and Other Stuff

«  Elephants and Irony at #R... | Auditing File Shares with... »

In search of great technology at #RSAC among all the noise #filtering

Wed, 26 Feb 2014 15:13:44 GMT

Dominant impression: "If you can’t say it, you don’t know it."  So many booths; so little idea of what they do. I know they don’t do everything.

None of us do. Not even the titans of the infosec industry. So one of us: either yours truly or the infosec marketing collective mind is belaboring under a fundamental misconception. And it would be so nice if one of us were disabused of it. This sounds ludicrous as I write it but are companies consciously trying to hide the space in which they play? I can see that there are some disadvantages to be pigeon-holed or typecast. Those are negative terms. But isn’t "targeted" and "qualified" the other, positive, side of that coin?
Here’s a few exhibitors where you can walk up, understand what they offer at a glance and get some real information from someone that understand what their company does and offers. These certainly aren’t the only companies with great technologies but these make it easy for you find them:
  • LogRhythm - Powerful SIEM with a massive investment in "knowledge engineering" and log normalization
  • Lumension - Awesome endpoint security.  Cut every head of the endpoint security medusa with on agent and a single pane of glass
  • STEALTHbits -  Powerful yet affordable technology for data access governance
  • ManageEngine - Affordable, easy-to-use SIEM and other cool solutions like privileged password management
  • SolarWinds - Affordable, easy-to-use SIEM with normalization
  • Dell Software - Staggering array of IAM and GRC technology

email this digg reddit dzone
comments (0)references (0)

5 Indicators of Endpoint Evil
Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
Severing the Horizontal Kill Chain: The Role of Micro-Segmentation in Your Virtualization Infrastructure
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond

Comments disabled

powered by Bloget™


Recent Blogs


Additional Resources