Here are five companies that cybersecurity professionals should consider in their quest to keep their organizations secure. Credit: Michael Kan The madness known as the RSA Security Conference took place last week in San Francisco. The event featured somewhere in the neighborhood of 1,000 vendors and over 40,000 users, making it by far the largest security conference. I put myself in the shoes of the security professionals who were attending to seek out new solution providers that can help them protect their businesses better. The challenge for today’s CISOs and other decision makers is that there are far too many small vendors for you to stop by each booth and get a good idea of what they do and how they can help. I met with as many as I could, and based on my conversations, here are the five companies that security professionals probably don’t know but are worth looking at.A couple of notes: These are in alphabetic order so as to avoid any kind of ranking. They’re different enough that it would be hard for me to say one is better than the other. Also, I understand the show was filled with lots of small vendors that might claim to have a similar or even better solution. If that’s the case, I either didn’t meet with them or they didn’t leave me with that opinion. 5 cybersecurity organizations fighting the good fight BalbixBalbix calls themselves a “predictive breach risk platform.” Its BreachControl product continually collects information from its smart sensors that get deployed at strategic points and monitor networks, devices, and applications. These are quick to deploy and come in physical or virtual form factor. Balbix applies machine learning to the information and displays the information in a Risk Dashboard where the assets will be colored red, yellow, or green. The security team can use this information to prioritize which asset is the most critical and then drill down on why it’s showing the color it is and take steps to correct the issue. Security professionals are often overwhelmed by the enormity of protecting the organization, and Balbix provides a way to prioritizes what’s critical and what’s not.CorelightCorelight uses network information to help security professionals find incidents faster.The company’s sensors plug into network packet brokers, gather data, and analyze the data in its Bro network security monitor. When alerts are triggered in a SIEM, the typical response is to look through massive amounts of PCAP files or NetFlow records. Bro provides an alternative by providing rich information, including logs for things such as capture loss, dhcp, dns, files, ftp, ssl and dozens more.Corelight complements signature-based tools and is ideal for use cases such as filtering out false positives, generation and aggregation of indications of compromise, and visibility into rouge application deployments. One of the most interesting things about Bro is that the company has made it available through an open-source option and developed a community that has developed a number of use cases for it.Cyber Threat AllianceAs the name suggests, the Cyber Threat Alliance (CTA) isn’t a single company. Rather, it’s an agreement between a group of security vendors to share security intelligence. It’s very common for threat actors to share scripts, data, and other information to wreak havoc on their targets faster. And the idea behind the alliance is to fight fire with fire by sharing information between the good guys. In 2015, Fortinet, McAfee, Palo Alto Networks, Cisco, Check Point, and Symantec founded the alliance. Since then the following vendors have joined: InSights, Juniper Networks, NTT Security, Rapid7, RSA, Saint Security, SK Infosec, Sophos, Radware, ReversingLabs, and Telefonica’s ElevenPaths.It’s good to see almost all of the big name security vendors joing the CTA to show it has some teeth to it. The work the CTA is doing is extremely important and provides each of its members a much greater set of data to work with. I urge security decision makers to make CTA membership part of their RFP process in hopes that other vendors join the alliance.Pluribus NetworksPluribus is best known as a software-defined networking (SDN) vendor, but its solution can be used to secure company networks, as well. In fact, many businesses are trying to bridge the gap between security and networking, and Pluribus can be the bridge that brings them together. Through the use of its virtual probes and network programmability, a secure overlay can be created for the security team to use without disrupting the physical underlay. Pluribus can be used to establish a set of rules to automate a number of processes that would take action on anomalistic traffic. The following is an example:Establish baseline at various dates and timesDetect deviations from the baseline using ongoing analyticsInvoke native rules or automate the passing of the traffic to intrusion detection systems for further analysisAutomatically block traffic using network segmentationPluribus is an excellent example of why SDNs matter beyond saving money on hardware. By decoupling the control and data planes, traffic can be analyzed and action taken automatically. Network managers can obviously use this to speed up configuration changes, and security professionals can leverage it for faster identification and remediation of threats.VaronisVaronis is a data security platform that helps secure files and email servers from insider attacks and cyber threats. The company analyzes the behavior of users and machines that access data, alerts on things that are not normal, and enforces a least privilege model. Data security isn’t the most exciting topic, but it’s the source of most data breaches. Setting permissions for file and directory access is impossible to do manually, and Varonis automates this to ensure there are no gaps to protect a company’s most important asset — the data.The implementation of Varonis starts with an analysis of who touches every file or email to understand the baseline and establish a least privilege environment. This means users only have access to the files they need instead of everything, which is quite common. Then, if a user tries to do something they shouldn’t, such as access the accounting server, the action is denied and flagged.Attacks from the inside are far more common than those through the perimeter, and Varonis ensures that the impact of these types of breaches is minimized by preventing users from accessing things they should not. Note: Of the vendors mentioned above, Cisco, Fortinet, Palo Alto Networks, and Juniper are clients of ZK Research Related content feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff 30 Aug 2024 8 mins Technology Industry IT Skills Events news F5, Intel team up to boost AI delivery, security F5 and Intel are working together to combine security and traffic-management capabilities from F5’s NGINX Plus suite with Intel’s OpenVINO open-source toolkit for optimizing AI inference and Intel IPU hardware accelerators. By Michael Cooney 29 Aug 2024 1 min Network Security Artificial Intelligence Security news Cisco snaps up AI security player Robust Intelligence Plans call for integrating Robust Intelligence's AI security platform with Cisco Security Cloud to streamline threat protection for AI applications and models and increase visibility into AI traffic. By Ann Bednarz 28 Aug 2024 1 min Mergers and Acquisitions Artificial Intelligence Security feature What is OWASP? A standard bearer for better web application security The Open Web Application Security Project (OWASP) is an international nonprofit dedicated to providing free documentation, tools, videos, and forums for anyone interested in improving the security of their web applications. By Linda Rosencrance 28 Aug 2024 8 mins Internet Security IT Skills Application Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe