BEDFORD, Mass.--(BUSINESS WIRE)--RSA® Conference, the world’s leading information security conferences and expositions, today announces the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of new technologies that have the potential to transform the information security industry. Past winners include successful companies such as Sourcefire, Imperva, Waratek, and most recently Phantom.
On Monday, February 13, 2017, each of this year’s finalists demonstrate its technology to conference attendees, as well as a judging panel that includes Asheem Chandna, partner at Greylock Partners; Gerhard Eschelbeck, vice president of security and privacy engineering at Google; Niloofar Razi Howe, senior vice president and chief strategy officer, RSA Corporate; Patrick Heim, head of trust and security at Dropbox; and Paul Kocher, president and chief scientist of Cryptography Research division at Rambus. The finalists also deliver a short presentation to the judges, who determine “RSA Conference 2017’s Most Innovative Startup.”
The finalists (in alphabetical order) are:
Baffle makes data breaches irrelevant by keeping data always encrypted - at rest and in process. This cloud-centric solution transparently encrypts data as it is ingested into databases, automates key management and ensures that enterprise applications can keep operating on that data with no disruption.
Cato Networks provides organizations a software-defined and cloud-based secure enterprise network. The Cato Cloud reduces MPLS costs, eliminates branch security appliances, provides secure internet access everywhere, and securely connects mobile users and cloud infrastructures into the network.
Claroty’s mission is to secure and optimize the industrial control networks that run the world. The Claroty Platform provides extreme visibility, real-time monitoring and anomaly detection for OT (ICS) networks; employing high-fidelity models and advanced algorithms to alert our customers to both cybersecurity and process integrity issues.
Contrast Security is the only company that enables applications to automatically detect and fix vulnerabilities, identify attacks, and defend themselves. Contrast employs security instrumentation to strengthen applications before they deploy, protect them in production and provide visibility throughout the application lifecycle.
Powered by homomorphic encryption and founded by former NSAers, EN|VEIL’s scalable framework lets enterprises operate on data (query/analytics) without revealing the content of the interaction, the results, or the data itself. EN|VEIL is the first scalable commercial solution for securing data in use.
GreatHorn is the cybersecurity solution for cloud communication infrastructure. The company’s platform uses machine learning and automation to secure G Suite, Office 365, Slack, and other collaboration tools from targeted attacks and prevent financial, intellectual property, and regulated data theft.
RedLock has invented a unique approach to cloud security automation that dynamically discovers cloud infrastructure changes, correlates them with configuration, network and user data, and applies machine learning to create a visual map for risk visibility, policy monitoring, and incident response.
UnifyID is the first holistic implicit authentication platform designed for online and offline use. This solution utilizes sensor data from everyday devices and machine learning to seamlessly authenticate users. By combining 100+ attributes, UnifyID achieves more than 99.999% true positive rate.
Uplevel’s adaptive response platform connects incoming alerts, threat intelligence, and open source data with historical attack data to create a dynamic profile of past, present, and potential future events, enabling tactical response to new attacks and strategic strengthening of security posture.
Veriflow brings formal verification to network infrastructure for the first time. Continuously ensuring your network operates as intended, Veriflow predicts outages before they impact users and vulnerabilities before they are exploited, allowing IT teams to deliver secure and resilient networks.
This year, the selection process has been updated to provide a more transparent and thorough review for both judges and finalists. These changes include:
- Judges will now get demos of the products ahead of the February 13 pitching contest.
- Judges will have a debrief with the top two to three finalists before selecting and announcing a winner on February 13.
“This year’s submissions for the Innovation Sandbox Contest represented an incredibly competitive group,” said Sandra Toms, vice president at RSA and curator of RSA Conference. “It’s inspiring each year to see the strength in submissions as it demonstrates how cybersecurity professionals are collaborating to present innovative solutions to help businesses protect themselves. As enterprises continue to look to RSA Conference as an indicator of the industry’s progress and next steps, we are thrilled to be able to provide these finalists an opportunity to showcase their product to both potential customers and the cybersecurity community.”
“We’re excited to be partnering once again with RSA Conference for this year’s Innovation Sandbox Contest,” said Alexandra Ames, Senior Marketing Manager, TechCrunch. “TechCrunch looks forward to the finalists’ presentations to see what new techniques will be brought to the stage to help transform information security and help individuals, enterprises and organizations alike keep their data safe.”
About RSA Conference
RSA® Conference is the premier series of global events where the world talks security and leadership gathers, advances and emerges. Whether attending in the U.S., the EMEA region, or the Asia-Pacific region, RSA Conference events are where the security industry converges to discuss current and future concerns and get access to the people, content and ideas that help enable individuals and companies to win, grow and do their best. It is the ultimate marketplace for the latest technologies and hands-on educational opportunities that help industry professionals discover how to make their companies more secure while showcasing the most enterprising, influential and thought-provoking thinkers and leaders in security today. For information on events, online programming and the most up-to-date news pertaining to the information security industry visit www.rsaconference.com.
RSA Conference logo, RSA, Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.