Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Big Data and Analytics
    • Big Data and Analytics
    • Cloud
    • Cybersecurity
    • Innovation

    RSA Innovation Sandbox Opens a Portal into Cybersecurity’s Future

    Written by

    Chris Preimesberger
    Published May 14, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      SAN FRANCISCO — RSA Security’s annual conference, staged recently at Moscone Center in San Francisco, is the largest of its kind in the world. The Innovation Sandbox it hosts each year is the closest thing to a “Shark Tank”-style reality TV show for cybersecurity startups, and it is always a popular subset of the main event.

      The Sandbox provides a barometer for trendy security approaches. Attendees watch 10 entrepreneurs pitching their wares on a 3-minute clock before a large audience and panel of tough judges, and it is entertaining. More importantly, Innovation Sandbox allows conference attendees a peek at incubating technology that may impact the careers of many future security professionals.

      Paul Shomo, Senior Technical Manager of Third-Party Technologies at OpenText, was one of the professional observers at this year’s event. Shomo has spent more than 15 years as a software engineer with experience working in security and forensics, networking and storage; he also has spent several years managing strategic partnerships and advising on M&A activity.
       
      He joined OpenText after it acquired Forensic Investigations and endpoint security provider Guidance Software last year.

      Shomo offered eWEEK some observations about the startups selected to present at the Sandbox at the 2018 RSA event. The following is an adaptation of his account of the competition.

      Innovation Sandbox 2018

      The trend of automating manual labor with orchestration technologies was on display at Innovation Sandbox, as well as threat detection inside the cloud and for the internet of things (IoT). If history is any judge, a handful of these companies will be acquired or become major brands.

      Cybersecurity now exhibits an impact at the level of geopolitics. Its digital tentacles reach into our personal lives, threatening privacy and our employer’s well being. We all need to keep up with this industry, yet it’s one of the most technical and ephemeral areas of IT. If your ambition is to stay on the bleeding edge, RSA’s Innovation Sandbox is the closest thing to a portal into the future.

      Innovation Sandbox’s competition is similar to a “Shark Tank”-style reality show. Each entrepreneur gives a 3-minute presentation before a panel of judges. The testy interactions between passionate entrepreneurs and opinionated judges make this show exciting.  

      Wellspring of Future Trends

      Industry experts pick the 10 finalists, and the trends seen across these chosen few are predictors of our collective future. The trend of replacing human labor with orchestration technologies were present throughout. At RSA, most competitors dropped references to machine-learning algorithms or artificial intelligence techniques to aid the location of threats.

      The second major trend involves the many efforts to gain visibility into closed-off environments such as IoT devices and a variety of cloud environments.  

      Detecting Threats on the Network vs. Installing on Endpoints

      • Instead of forcing their way onto traditional endpoints, which are already full of installed third-party agents, these startups tap into the network. The first startup, Awake, records network traffic to collect threat intelligence and focus on what’s important. Awake founder and CEO Michael Callahan sounded the alarm that attackers are now hacking with legitimate software such as Twitter for Command and Control and Team Viewer for Remote Access. Awake enables forensic queries into its data to detect patterns of suspicious behavior hiding within the norm.
      • Acalvio falls under the category of deception technologies. These technologies set the bait to lure hackers to hit deployed sensors. When their threat detection goes off, these type of deception technologies exhibit few false positives. One judge pushed back that deception is already a crowded field. CEO and founder Ram Varadarajan retorted that their proprietary sensors differentiate Acalvio. These sensors appear as digital mirages of easily managed virtual machines.
      • BluVector also does detection and response using network traffic. Unlike the others, BluVector provides visibility into the endpoints using an agentless technology. A judge hinted that they believed BluVector did too much. CEO Kris Lovejoy noted that the company’s self-adapting technologies emerged from 10-year-old Defense Advanced Research Projects Agency (DARPA) research, and that other engines were licensed from third parties. BluVector’s probability engine not only provides users a Hunt Score but also integrates with existing threat hunting tools and infrastructure.   

      Visibility into the Cloud to Detect and Respond

      So much of enterprise computing is in the cloud. Gaining visibility into these environments for threat detection presents a challenge. The cloud often employs heterogeneous architectures, is encrypted, or is only visible as a black box one can see through the APIs of web giants such as Google or Amazon.

      • ShieldX’s detection and response targets multi-cloud architectures. It is able discover and group cloud assets without installing agents. Founder and CEO Dr. Ratinder Paul Singh Ahuja described the company’s Deep Packet Inspection (DPI) of network traffic. ShieldX wields technology to prevent “east-west lateral movement” of hackers across assets. 
      • StackRox CTO and Co-Founder Ali Golshan promotes technology that provides visibility at the app level. It sees into both cloud containers and native environments. StackRox employs scans for vulnerabilities and misconfigurations and then orchestrates enforcement and configuration.

      New Take on the Internet of Things (IoT) Security

      • IoT device manufacturers develop firmware in proprietary and minimalist environments. It’s often quite difficult to deploy third-party security software inside these devices. For this reason, Refirm Labs bypasses the need to run inside IoT, and it requires zero access to a manufacturer’s proprietary source code. Instead Refirm Labs scans the manufacturer’s firmware image before it deploys it into hardware. Its technologies detect new “zero day” vulnerabilities, encryption keys and visible passwords.

      Hackers Target People and Data, Security Should Start Here

      • Malware and vulnerabilities used to dominate the security narrative. Now we’re seeing a shift toward data-centric and people-centric security. CyberGRX CEO Fred Kneip said that 56 percent of reported breaches involve a third party. CyberGRX employs a rules engine to identify, prioritize and mitigate risk from third party vendors.  
      • Hysolate introduced something called virtual air gapping by using multiple VMs with seamless connectivity and user experience–all on a single endpoint. Users can operate carefree in their internet VM. As CEO and co-founder Tal Zamir explained, “in the Internet VM, you can do whatever you want. It has full internet access and local admin rights.” When operating on sensitive tasks, users work in Hysolate’s Sensitive VM. It’s locked down and limits connections to only within circles of privileged assets. 

      There Can Be Only One 

      • Runner-up Fortanix is a secure key and crytpographic service delivering runtime encryption. Fortanix CEO Ambuj Kmar explained that its technology protects data in use, even when the infrastructure has been compromised. Memory is a free for all, with hackers and forensic tools often scraping out passwords and private data. With Fortanix’s runtime encryption, even data held in memory remains private.
      • This year’s winner and No. 1 innovator was BigID (pictured). Privacy matters enough to make billionaires blush; just ask Mark Zuckerberg. It’s not surprising the winner’s slogan said: “Our big idea is that privacy matters.”

      As BigID CEO Dimitri Sirota puts it: “Privacy is difficult because you have to figure out not just whose data you have, you have to understand the context of that information.” This winning startup delivers ML to find, map and match identity data. BigID’s appeal to investors is obvious, due to the impending General Data Protection Regulations (GDPR), which goes in effect May 25.

      The trends that were on display at Innovation Sandbox will form our future. Also keep an eye out for this crew of security luminaries. If Innovation Sandbox’s history is any judge, a handful of these companies will become acquired or built into major brands. 

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.