Trusteer, Booth 117

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
1 of 21

Trusteer, Booth 117

Trusteer Pinpoint is clientless, completely transparent to end users and does not require software installation on the endpoint-a pretty neat trick. I'll stop by to see how it works. I'll also be looking at the Trusteer Situation Room product.

2 of 21

LogLogic, Booth 529

I want to see how LogLogic finds the needle in the haystack when it comes to sorting event logs. There are more log management tools in my tour.

3 of 21

Fluke Networks, Booth 556

The handheld Fluke Networks AirCheck is a top-notch WiFi analyzer tool for front-line network techs, seen here sniffing the crowded airwaves at eWEEK Labs.

4 of 21

Fortinet, Booth 823

The FortiGate-3950B consolidated security appliance is for large enterprises and service provider networks. It delivers from 20G bps to 120G bps of firewall throughput. I'll be looking at virtual appliances for all these security products at the show.

5 of 21

Informatica, Booth 854

I want to see what Informatica is doing with enterprise big data and security.

6 of 21

Radware, Booth 856

Radware has a useful report about application security. While I'm there, I'll also look at its Security Event Information Management (SEIM) product.

7 of 21

Stonesoft, Booth 945

The Stonesoft 3200 Series appliance falls into the same group of products that provide network security in a physical form factor. I'll be asking IT managers how much longer they will be purchasing physical devices.

8 of 21

nCircle, Booth 1023

It's been awhile since I looked at nCircle and its vulnerability and configuration scanning products. This will be a good time to see how its jump to the cloud is working.

9 of 21

Tripwire, Booth 1031

Tripwire IT security and compliance tools use automation to protect assets and prove compliance.

10 of 21

Verizon Business, Booth 1129

I'm consistently impressed with the Verizon Business Data Breach Investigations Report. I'll be stopping by to talk with the experts on the significant findings in the latest version of the report.

11 of 21

Websense, Booth 1332

Websense Web security, email and data-loss prevention products will be on display.

12 of 21

Qualys, Booth1431

Qualys provides software as a service (SaaS) security risk and assessment tools, as well as compliance management tools.

13 of 21

Venafi, Booth 1653

Venafi makes enterprise-class digital key and certificate provisioning, discovery and monitoring tools, so you are less likely to see the classic "expired certificate" message pictured above.

14 of 21

Palo Alto Networks, Booth 1638

Palo Alto Networks' firewalls provide high performance. My question is how much longer this type of protection will need to be provided in a hardware form factor.

15 of 21

Splunk, Booth 1825

It's not just about log data. Splunk collects and indexes machine data so IT managers can understand what is happening in the information environment.

16 of 21

Kaspersky, Booth 2025

Kaspersky makes endpoint protection antivirus, anti-spam and malware detection tools. The upstart security company is always worth talking to for IT managers who need the latest protection options.

17 of 21

F5 Networks, Booth 2147

I'll be looking over the latest capabilities of F5's application delivery network and performance products.

18 of 21

Ixia, Booth 2545

eWEEK Labs has long used Ixia test- and load-generation tools to get speeds-and-feeds data for our tests.

19 of 21

Riverbed, Booth 2618

Riverbed WAN optimization technology is making strides in handling virtualized workloads. I'll be checking to see how security figures into the equation.

20 of 21

OATH, Booth 2744

I'll be talking to the folks at OATH about open authentication in a security-conscious world.

21 of 21

Ping Identity, Booth 2751

Ping Identity provides single sign-on, federated identity management and mobile identity management tools through the cloud.

Top White Papers and Webcasts