www.csoonline.com Open in urlscan Pro
151.101.194.165  Public Scan

Submitted URL: https://t.sidekickopen07.com/s3t/c/5/f18dQhb0S7kF8cp80_V17vHt59hl3kW7_k2841CX6NGW35Qwvd1G7yjDW7vZ0Py6DXdqqf197v5Y04?te=W3R5hF...
Effective URL: https://www.csoonline.com/article/3527436/12-hottest-new-cybersecurity-startups-at-rsa-2020.html
Submission: On March 02 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


cso online
GERMANY
 * United States
 * ASEAN
 * Australia
 * India
 * United Kingdom
 * Germany


Welcome! Here are the latest Insider stories.
 * TIAA boosts cybersecurity talent strategy with university partnership
 * Lessons learned from 2021 network security events
 * Your Microsoft network is only as secure as your oldest server
 * How CISOs can drive the security narrative

More Insider Sign Out
Sign In Register
×

search
 

Sign Out
Sign In Register
NEW Insider PRO Learn More
Latest Insider
 * A security practitioner's take on CISA’s Incident and Vulnerability Response
   Playbooks
 * Malware variability explained: Changing behavior for stealth and persistence
 * Microsoft announces new security, privacy features at Ignite
 * Avery Dennison overhauls DLP program in enterprise-wide effort

NEW FROM IDG
Learn More


Welcome! Check out the latest Insider stories here.
Sign Out
Sign In Register

More from the IDG Network

 * About Us |
 * Contact |
 * Reprints |
 * Privacy Policy |
 * Cookie Policy |
 * Member Preferences |
 * Advertising |
 * IDG Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * Home
 * Security

Feature


12 HOTTEST NEW CYBERSECURITY STARTUPS AT RSA 2020


CYBERSECURITY STARTUP COMPANIES USE THE RSA CONFERENCE TO MAKE THEIR PUBLIC
DEBUT AND SHOWCASE THEIR PRODUCTS. THESE ARE SOME OF THE MORE INTERESTING
STARTUPS COMING OUT OF STEALTH.

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Dan Swinhoe

Editor, CSO | 18 February 2020 11:00


ALLVISIONN / inides / Getty Images



Starting on February 24, the RSA Conference (RSAC) 2020 gives security vendors
old and new a chance to demonstrate their capabilities. The event has become an
attractive venue for startups to make their debut. This year’s crop will be
demonstrating tools for DevSecOps, zero-trust networks, risk intelligence,
access control, and more.

The RSAC Early Stage Expo gathers over 50 promising startups from all over the
world, many of which have so far been in stealth mode. These are 12 of the most
interesting, in alphabetical order:

ADVERTISEMENT



1. BLU BRACKET: CODE SECURITY SUITE (EARLY STAGE EXPO 27)

Blu Bracket was founded in 2019 with a focus on providing security solutions for
software code. At RSA, the company will demonstrate its Code Security Suite,
which it claims will provide greater visibility into, and keep an audit of, an
organization’s code. Companies have the ability to see where their code is
located, who has access to it, and to classify sensitive code. The product can
also identify if secret information such as passwords are present.


2. BOTRX: DETX AND PROTX AUTOMATED FRAUD PROTECTION (EARLY STAGE EXPO 35)

BotRX’s mission is to protect against automated attacks against IoT devices,
mobile apps or websites. The DeTx and ProTx solutions shown at RSA provide
automated bot detection and mitigation capabilities to prevent identity fraud.
The company’s bot detection network aims to find anomalous behavior and prevent
automated bots attempting to log in using harvested credentials, perform form
jacking attacks or crawl for website vulnerabilities.


3. CONCENTRIC: SEMANTIC INTELLIGENCE (EARLY STAGE EXPO 26)

Concentric came out of stealth mode in January 2020 with a focus on discovering
and protecting important unstructured data. Its Semantic Intelligence offering
automatically discovers and classifies business critical data. Concentric claims
its Autonomous Data Risk Profiles can identify both structured and unstructured
data such as intellectual property (IP), personally identifiable information
(PII), financial information and source code, and then apply risk scores to it
based on the sensitivity of the information and the controls and policies
currently applied to it.


4. CYBER ARMOR: IDENTITY-BASED ZERO-TRUST WORKLOAD AND DATA PROTECTION (SOUTH
EXPO 735F)

Israel-based Cyber Armor aims to bring together workload and data protection
across environments by allowing DevOps teams to create zero-trust workloads. The
company claims its service-to-service, identity-based control plane it will be
showing at RSA is able to identify workloads based on application code analysis
and create cryptographic signatures that only allow authorized workloads to run,
access data, and use network resources.




5. CYCOGNITO: THE CYCOGNITO PLATFORM (EARLY STAGE EXPO 43)

Launched in November 2019, Palo Alto-based CyCognito aims to help quantify an
organization’s full attack surface by mapping its assets and attack surface on
the internet. The CyCognito platform to be demonstrated at RSA uses a bot
network to scan IP ranges, web applications, keyword and code fragments,
deployed software and TLS configuration. It then applies risk scores to each
potential attack vector based on ease of discovery and exploitation and the
potential impact on the business.




6. DASERA: SAFER DATA QUERIES (RSAC LAUNCH PAD EVENT)

Part of RSA’s RSAC Launch Pad event, Dasera wants to enable safer internal use
of sensitive data by employees. The Sunnyvale, California, company says its
analysis engine can automatically find, flag and rewrite unsafe queries in data
warehouses to help employees query data safely.


7. GOLD COMET: SECURE MESSAGING (EARLY STAGE EXPO 08)

Gold Comet provides private communications solutions. The Virginia company
launched last year and says the browser based encrypted Gold Comet Messaging
system on display at RSA allows users to send and receive messages only from
persons in their contacts list, and new contacts are added via a verification
system that includes a challenge question.


8. LEVELOPS: APPLICATION SECURITY PLATFORM (EARLY STAGE EXPO 38)

Santa Clara startup LevelOps aims to improve security across the entire software
development lifecycle. The DevSecOps tool it is presenting at RSA does this by
discovering and tracking development and operational artifacts in one place. The
company says it can track and map releases, products and services across teams
and organizations including code, tickets and design documents. Security teams
can them automate and disseminate security requirements for each artifact.

ADVERTISEMENT


9. LUMU: CONTINUOUS COMPROMISE ASSESSMENT (NORTH EXPO 4315)

LUMU aims to help organizations identify potential compromises on their network.
The Lumu platform being shown at RSA collects and correlates network metadata
from sources including DNS queries, Netflows, proxies, firewalls and spambox
filters with threat intelligence, and can help organizations isolate confirmed
instances of compromise.


10. OUTTHINK: HUMAN RISK INTELLIGENCE PLATFORM (SOUTH EXPO 1647F)

Based in London and an alumnus of the UK LORCA and CyLon incubators, OutThink
describes itself as a “human risk intelligence platform.” It claims the SaaS
platform it's showing at RSA provides real-time analysis and continuous risk
scoring of employees based on factors such as knowledge level, willingness to
comply and use of technology, and then provides advice on how to tailor security
training to that user.




11. SOLUBLE: DEVOPS SECURITY (RSAC LAUNCH PAD EVENT)

Soluble aims to help automate DevSecOps processes and ensure greater security at
the outset of a project. The company says it can provide developers
pre-configured access and policy controls to new services from a drop-down menu
when creating new services. Kubernetes-based operators apply these controls
across databases, buckets and third-party services and provides an audit trail
and service map for visibility.


12. ZERO NETWORKS: ACCESS ORCHESTRATOR (NORTH EXPO 5358)

Part of the RSAC Launch Pad event, Zero Networks wants to automate zero-trust
network security and access. The Israeli company says it can automate the
creation and enforcement of network access rules to enable companies to
configure their zero-trust architecture deployments. Remote APIs control users
and machines, while its cloud-based service defines and enforces policy
automatically.

ADVERTISEMENT
Next read this
 * 7 hot cybersecurity trends (and 2 going cold)
 * 22 cybersecurity myths organizations need to stop believing in 2022
 * A 2022 checklist for protecting Microsoft 365 users and data
 * Active Directory security updates: What you need to know
 * 6 ways hackers hide their tracks

Related:
 * Security
 * Network Security
 * Application Security

Dan Swinhoe is UK Editor of CSO Online

Follow
 * 
 * 
 * 
 * 

Copyright © 2020 IDG Communications, Inc.

The 7 best password managers for business


CSO Online CSO provides news, analysis and research on security and risk
management Follow us
 * 
 * 
 * 
   

 * About Us
 * Contact
 * Reprints
 * Privacy Policy
 * Cookie Policy
 * Member Preferences
 * Advertising
 * IDG Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2022 IDG Communications, Inc.

Explore the IDG Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World