RSA Conference announced the 10 finalists for its annual RSAC Innovation Sandbox Contest. The competition is dedicated to providing innovative startups a platform to showcase their groundbreaking technologies that have the potential to transform the information security industry. Past winners include companies such as Phantom, Invincea, UnifyID and, most recently, BigID.
Dr. Herbert (Hugh) Thompson
On Monday, March 4, the Top 10 finalists listed below will present a three-minute quick-pitch followed by Q&A with a panel of judges to try to win the coveted “Most Innovative Start Up” at RSA Conference 2019 in San Francisco. RSAC Innovation Sandbox judges include industry experts with unique insights into what will set a company up for success: Asheem Chandna, Partner, Greylock Partners; Patrick Heim, Operating Partner and CISO, ClearSky; Niloofar Razi Howe, Cybersecurity Entrepreneur and Investor; Shlomo Kramer, CEO, Cato Networks; and Richard Seiersen, CISO, Author and Advisor. Dr. Herbert (Hugh) Thompson is returning to emcee the contest.
The finalists (in alphabetical order) are:
Arkose Labs solve multi-million-dollar online fraud problems for major global businesses in sectors including online marketplaces, travel, banking, social media, ticketing and online gaming. Its bilateral approach combines global telemetry with a patent pending enforcement challenge that stops fraud without false positives and without friction for users.
Axonius is the leading cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users. Integrated with 100+ management and security solutions, companies like the New York Times use Axonius to ensure that all assets are secure.
Capsule8 is the industry’s first real-time, zero-day exploit detection platform purpose-built for Linux production environments – whether containerized, virtualized or bare metal. Capsule8 automatically detects and shuts down exploits in real-time without adding any risk to production infrastructure.
CloudKnox Security Platform introduces a non-intrusive and automated way to manage human and non-human identity privileges across hybrid cloud environments using Activity-based Authorization. It empowers security teams to proactively address accidental and malicious credential misuse by continuously detecting and mitigating identity risk.
DisruptOps provides continuous control of cloud infrastructure by rapidly detecting and automatically remediating security and operational issues. It makes SecOps possible with efficient, effective and scalable automation and orchestration of cloud security across platforms and services.
Led by world-renowned cryptographers and data science experts, Duality offers SecurePlusTM, a game-changing data privacy solution that enables secure data collaboration, privacy-preserving analytics and AI on data while it’s encrypted – providing insights without exposing the data itself.
Eclypsium defends the firmware and hardware layer of laptops, servers and network infrastructure. The technology proactively finds weaknesses, mitigates risk and defends against threats like firmware implants and backdoors, providing an active defense against the most sophisticated threats on an attack surface generally unseen by traditional security.
Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application. Its AI-powered API Protection Platform is the industry’s first patented solution to prevent the next generation of API attacks, using behavioral protection.
ShiftLeft mission is to make application security fast, exhaustive, customizable, fully automated and devoid of a need for human intervention. ShiftLeft products (Inspect, Protect and Ocular) can be used to analyze, protect and audit software code in an automated and exhaustive manner.
WireWheel helps people protect privacy. Through an intuitive platform to manage privacy programs at scale, companies can quickly and efficiently demonstrate their commitment to privacy and trust. WireWheel supports all phases of a privacy management program, including data inventory and mapping, collaboration, vendor risk management and more.