Trusteer Pinpoint is clientless, completely transparent to end users and does not require software installation on the endpoint-a pretty neat trick. I’ll stop by to see how it works. I’ll also be looking at the Trusteer Situation Room product.
2LogLogic, Booth 529
I want to see how LogLogic finds the needle in the haystack when it comes to sorting event logs. There are more log management tools in my tour.
3Fluke Networks, Booth 556
The handheld Fluke Networks AirCheck is a top-notch WiFi analyzer tool for front-line network techs, seen here sniffing the crowded airwaves at eWEEK Labs.
4Fortinet, Booth 823
The FortiGate-3950B consolidated security appliance is for large enterprises and service provider networks. It delivers from 20G bps to 120G bps of firewall throughput. I’ll be looking at virtual appliances for all these security products at the show.
5Informatica, Booth 854
I want to see what Informatica is doing with enterprise big data and security.
6Radware, Booth 856
Radware has a useful report about application security. While I’m there, I’ll also look at its Security Event Information Management (SEIM) product.
7Stonesoft, Booth 945
The Stonesoft 3200 Series appliance falls into the same group of products that provide network security in a physical form factor. I’ll be asking IT managers how much longer they will be purchasing physical devices.
8nCircle, Booth 1023
It’s been awhile since I looked at nCircle and its vulnerability and configuration scanning products. This will be a good time to see how its jump to the cloud is working.
9Tripwire, Booth 1031
Tripwire IT security and compliance tools use automation to protect assets and prove compliance.
10Verizon Business, Booth 1129
I’m consistently impressed with the Verizon Business Data Breach Investigations Report. I’ll be stopping by to talk with the experts on the significant findings in the latest version of the report.
11Websense, Booth 1332
Websense Web security, email and data-loss prevention products will be on display.
Qualys provides software as a service (SaaS) security risk and assessment tools, as well as compliance management tools.
13Venafi, Booth 1653
Venafi makes enterprise-class digital key and certificate provisioning, discovery and monitoring tools, so you are less likely to see the classic “expired certificate” message pictured above.
14Palo Alto Networks, Booth 1638
Palo Alto Networks’ firewalls provide high performance. My question is how much longer this type of protection will need to be provided in a hardware form factor.
15Splunk, Booth 1825
It’s not just about log data. Splunk collects and indexes machine data so IT managers can understand what is happening in the information environment.
16Kaspersky, Booth 2025
Kaspersky makes endpoint protection antivirus, anti-spam and malware detection tools. The upstart security company is always worth talking to for IT managers who need the latest protection options.
17F5 Networks, Booth 2147
I’ll be looking over the latest capabilities of F5’s application delivery network and performance products.
18Ixia, Booth 2545
eWEEK Labs has long used Ixia test- and load-generation tools to get speeds-and-feeds data for our tests.
19Riverbed, Booth 2618
Riverbed WAN optimization technology is making strides in handling virtualized workloads. I’ll be checking to see how security figures into the equation.
20OATH, Booth 2744
I’ll be talking to the folks at OATH about open authentication in a security-conscious world.
21Ping Identity, Booth 2751
Ping Identity provides single sign-on, federated identity management and mobile identity management tools through the cloud.