Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

RSA 2015 Preview: Cybersecurity Solutions

CyberTrak from Blue Edge Lab and the Internet Security Alliance

CyberTrak from Blue Edge Lab and the Internet Security Alliance

Viscount's Freedom IP-based building security system

 Viscount's Freedom IP-based building security system 

Classification Suite 4 from TITUS

Classification Suite 4 from TITUS

The Frontline Vulnerability Manager from Digital Defense, Inc.

The Frontline Vulnerability Manager from Digital Defense, Inc.

"Cybersecurity Fundamentals" online course now offered by ISACA

"Cybersecurity Fundamentals" online course now offered by ISACA

The Information Age
CyberTrak from Blue Edge Lab and the Internet Security Alliance
Viscount's Freedom IP-based building security system
Classification Suite 4 from TITUS
The Frontline Vulnerability Manager from Digital Defense, Inc.
"Cybersecurity Fundamentals" online course now offered by ISACA
The Information Age
April 1, 2015

The 2015 RSA Conference provides security professionals access to myriad keynotes, educational sessions and solutions for today’s cybersecurity risks. Whether you’re headed to San Francisco for the conference April 20-24 or you’re observing cybersecurity trends from your office, here is a sampling of some of the trends, products and services showcased at this year’s event.

 

Keep Up to Date with the Latest Cybersecurity Compliance Challenges

This online cybersecurity tool features information on cybersecurity-related mandates and regulatory risk, providing instant online access to critical information about cybersecurity laws, regulations and generally accepted standards in 23 key markets in the Americas, Asia-Pacific, Europe and the Middle East, as well as four sectors in the U.S.

The tool, CyberTrak from Blue Edge Lab and the Internet Security Alliance, provides brief summaries of requirements and assessments on enforcement risk and the degree of activity in the requirement. CyberTrak is designed to help General Counsels, CIOs, CISOs, security leaders, risk officers and legal, technology, IT and procurement departments of multinational enterprises make better risk management decisions and to reduce the expenses of keeping up with changing regulatory requirements. This enables security leaders stay informed about cybersecurity in a cost-effective way, leaving more resources for other aspects of a strong cybersecurity program.

The tool will be updated three times per year, with interim updates when major changes occur. CyberTrak offers guidance in key areas, including regional cybersecurity and data security requirements in major economies around the world, restrictions on monitoring and on deployment of security technology, and protocols for notifying regulators and individuals of a hacking incident of a loss of data.

Learn more about CyberTrak at www.BlueEdgeLab.com

 

Leverage Your IT Infrastructure to Support IP-Based Access Control

Does your current physical access control system leverage network hardware technology without utilizing your enterprise’s IT infrastructure? If so, it could be missing a chance to benefit from existing security services and cybersecurity protections. Viscount’s Freedom IP-based building security system enables security leaders to use the significant security and power of existing IT infrastructure to manage the data these networked systems are using to provide electronic access control.

Microcomputers, such as those in IP-based access control readers, are often left outside the protection of IT departments, which creates vulnerabilities for hackers to exploit. The Freedom system is a next-generation PACS (physical access control system) architecture, which is IT-centric for computing and networking functionality, as well as infrastructure management functionality and network/cybersecurity.

The Freedom architecture provides a path for IT and security professionals to connect and improve enterprise system security together. The IT team can better understand security technology and processes, helping with future adoptions and assisting CSOs to integrate current and new technologies with other business systems to create value.

Learn more about this system and PACS architecture at Viscount.com

 

Protects Sensitive Emailed Data Automatically

Mission-critical or sensitive information is the lifeblood of an enterprise, but keeping it protected in the electronic age is a challenge. TITUS’s Classification Suite 4 – to be released April 21 at RSA 2015 – identifies and protects an enterprise’s information assets using data classification and fine-grained policy control to help gain control over unstructured data.

This system promotes a culture of security, mitigates risk and enables secure collaboration by combining user engagement with guided and automated protection. Customizable alerts in this suite warn users of special information handling considerations or possible impending security violations based on the content of their emails or documents to be sent. The suite also offers a new flexible policy capability that can make complex decisions by comparing multiple factors in a message, including the author, the information, the recipients and more. So, for instance, if an HR employee is attempting to send potentially sensitive employee records to someone outside his or her department, it could raise an alert.

The new version also enables security leaders to set up policies to 1) classify email based on recipients; 2) protect email based on the content or classification of attachments; 3) classify and protect documents based on content, file name or location; and 4) prevent printing of sensitive documents to non-secure printers.

Find out more about this system at Titus.com

 

Focus on Highest Risk Vulnerabilities

The Frontline Vulnerability Manager from Digital Defense, Inc. provides advanced network endpoint correlations to offer accuracy from scan to scan in order to save organizations valuable time and resources by facilitating security professionals to identify and focus on critical vulnerabilities that pose the highest risk. The system is underpinned by a patented scanning technology that is context aware, which enables the identification of critical flaws that are not detected by other scanning engines.

Instead of delivering mountains of data on vulnerabilities, this system streamlines the project management of analysis and remediation. Digital Defense, Inc.’s Security GPA product allows users to quickly discern their security posture and evaluate historical data from scan to scan to see differences and develop metrics to show the C-Suite.

The new version is mobile-friendly, and can be accessed via browsers, tablets and mobile devices.

Learn more about this system at www.ddifrontline.com

 

Advance Your Cybersecurity Skills and Knowledge

More than 92 percent of organizations hiring cybersecurity professionals this year say it will be difficult to find skilled candidates, according to a new study by global IT association ISACA. In response to this shortage, ISACA is launching a new online course through its Cybersecurity Nexus called “Cybersecurity Fundamentals.”

The course will cover cybersecurity principles, information security within lifecycle management, risks and vulnerabilities, incident response and more.

The course is designed for individuals with zero to three years of cybersecurity experience, and it helps learners prepare for the ISACA Cybersecurity Fundamentals exam and to earn the Cybersecurity Fundamentals Certificate, which is a knowledge-based certificate aligned with NIST’s National Initiative for Cybersecurity Education (NICE).

According to Robert E. Stroud, CGEIT, CRISC, international president of ISACA and vice president of strategy and innovation at CA Technologies: “Course participants will gain key insights into cybersecurity and the integral role of cybersecurity professionals. The interactive, self-guided format provides a dynamic learning experience where users can explore foundational cybersecurity principles, security architecture, risk management, attacks, incidents, and emerging IT and IS technologies.”

Learn more about the course at www.isaca.com/cyber

 

SIDEBAR: The New Tough Tightrope – Mobility, Usability and Cost

  By Anna Zetterholm, Marketing Manager for Keypasco

The security limitations within mobility and users’ wish for usability have pushed service providers to explore secure mobility options. The estimated revenue of mobile services in 2015 is $600 billion, according to Jupiter Research, and this makes the mobile platform a hacker’s first choice for victims. Therefore our focus should be to make those hackers scratch their heads in frustration.

The Information Age has offered us a world of opportunities along its evolution, but as the accessibility of information has grown in high speed it has created a double-edged sword. With opportunities comes risk, and cybercrime continues to increase and drive the industry to constantly seek innovation to secure users. Further complicating this are the driving factors of the end users, which are more in line with usability without many thoughts about security.

This driver is the strongest force behind the move from traditional security-equipped desktop to the less secure mobile devices, and what the latest trends have shown is that mobility is here to stay.

According to Gartner the market trend of mobility is very strong, and by 2020 we will have 7.3 billion smartphones, tablets and laptops in the world and 26 billion connected items through the Internet of Things. This creates a security dilemma.

The combination of security limitations within mobility and the users wish for usability has pushed service providers to explore mobility options, such as eBanking, eCommerce, online gaming etc.

Mobility is a revolution in flexibility, and the only way to secure mobility is to sculpt security in the same mold! A user should be able to do what they want, no matter if that means checking a bank statement in the check-out line or send a private message to your friend, and the service provider should be able to keep the investment and on-going costs to a minimum while employing a solution that rapidly adjusts to new emerging threats. This is the only way for security to move as the market is.

KEYWORDS: cyber risk mitigation cybersecurity solutions cybersecurity training network security security conferences

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • RSA Conference Product Preview

    RSA Conference 2022 product preview

    See More
  • cyber 3 responsive default

    RSA Conference Preview: Using Actionable Intelligence to Keep Up

    See More
  • ISC West 2015 Product preview

    ISC West 2015 Product Preview

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×
CyberTrak from Blue Edge Lab and the Internet Security Alliance
 Viscount's Freedom IP-based building security system 
Classification Suite 4 from TITUS
The Frontline Vulnerability Manager from Digital Defense, Inc.
"Cybersecurity Fundamentals" online course now offered by ISACA

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!