Welcome!

Virtualization Authors: Adine Deford, Pat Romanski, Liz McMillan, Elizabeth White, Roger Strukhoff

News Feed Item

Finalists Announced for RSA Conference’s Innovation Sandbox Program

RSA® Conference, the world’s leading information security conferences and expositions, today announced the ten finalists for its annual Innovation Sandbox competition. The Innovation Sandbox program at RSA Conference is dedicated to encouraging out of the box ideas and the exploration of new technologies that have the potential to transform the information security industry.

On Monday, February 25, each of this year’s finalists will exhibit their technology to all attendees, as well as a judging panel that includes Asheen Chandna, Partner at Greylock Partners; Paul Kocher, President of Cryptography Research; George Hoyem, Investment Partner at In-Q-Tel; Alastair Goldfisher, Editor at Venture Capital Journal; and Gerhard Eschelbeck, CTO & SVP at Sophos. The finalists will also deliver a short presentation to the judges who will determine the Most Innovative Company at RSA Conference 2013.

The finalists for RSA Conference 2013 Most Innovative Company (in alphabetical order) are:

  • Bromium
    Bromium vSentry™ is a centrally managed security solution for physical and virtual desktops which eliminates costly remediation by automatically discarding malware. Bromium LAVA™ (Live Attack Visualization & Analysis) provides detailed insights into attack origin, techniques and targets.
  • Light Point Security
    Light Point Web Enterprise is a secure web browsing solution to protect enterprises from web-based malware. It isolates each employee’s browsing session within a one-time-use server-based virtual machine that is destroyed immediately after use.
  • Nok Nok Labs, Inc.
    Nok Nok Labs’ solution leverages the existing security capabilities on a user’s device such as a built-in fingerprint sensor, web camera or integrated security chip in order to user-friendly strong authentication to any application, using any authentication method on any device.
  • PrivateCore
    PrivateCore’s vCage is the first software to transparently protect any application while in use on commodity x86 servers. By encrypting data during program execution, vCage’s software-only full-memory encryption protects data from unauthorized physical access and malicious hardware devices.
  • Remotium, Inc.
    Remotium is a mobile security technology that secures corporate assets for the BYOD trend. Remotium solves a host of security problems by using a unique virtual-instance technology that runs mobile applications on public or private clouds and streams the visualization elements to the mobile devices.
  • Silent Circle
    Created by Navy SEALs and Silicon Valley cryptography experts, Silent Circle is a global encrypted communications service offering a comprehensive suite of simple yet secure tools for your mobile devices - encrypted video, phone, text and email.
  • Skyhigh Networks Inc.
    Skyhigh Networks allows every business to safely and simply leverage cloud services (SaaS, PaaS, and IaaS) by addressing the pain it has with the viral, uncontrolled adoption of cloud services by its employees, especially from personal mobile devices.
  • Spotflux Inc.
    Spotflux is a cloud based solution for device security and privacy. By protecting and scrubbing internet connectivity using real time analytics, Spotflux protects PCs, smartphones and tablets with little to no impact on responsiveness or battery life.
  • VICTRIO, INC.
    Victrio provides powerful new security to financial call centers - it detects fraudsters during calls by silently screening their voice/audio against a fraudster database sourced by historical fraud calls. Once profiled, a fraudster can't elude Victrio screening.
  • Wickr, LLC
    Wickr is a free app designed to send self-destructing messages and media while leaving no trace. Users send free, anonymous and secure media, including text, photo, video, voice and PDFs to other Wickr users.

“Security professionals must battle with balancing current vulnerabilities while prepping for future threats,” said Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conference. “Each of these entrepreneurs are bringing an innovative way of thinking about how to provide new technology solutions to solve the present and upcoming problems for information security professionals.”

About RSA Conference

RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. Since 1991, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at www.rsaconference.com.

RSA and the RSA Conference logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.