The 12 Hottest Identity And Data Protection Tools Unveiled At RSA 2020

Here's a look at 12 new identity and data protection products at RSA 2020 that make it easier to isolate sensitive data, prevent credit card fraud, securely onboard remote workers and validate users with their unique typing patterns.

Defending Users And Their Information

Vendors attending RSA 2020 have invested heavily in making it easier for customers and partners to isolate sensitive data and processes, gain visibility into unknown usage of customer data, improve data utilization, and secure sensitive data in files that are being leveraged for business intelligence and analytics.

From an identity perspective, companies have developed ways to speed up the creation of user roles, defend against credential theft on workstations and servers, simplify the onboarding of remote workers, and prevent fraud in credit card transactions where the customer isn’t present.

Exhibitors at RSA 2020 are also unveiling methods to facilitate and govern remote sessions, get more visibility and control over content assets, validate users with their unique typing patterns, and eliminate the risk associated the users holding static credentials,

Here's a look at how 12 identity and data protection tools being showcased at RSA 2020 are verifying and validating identity, improving control over sensitive data, and taking on access and authentication challenges.

SailPoint Predictive Identity

Updates to the SailPoint Predictive Identity Platform will give customers a simplified way to define and deliver the right access to users no matter how quickly an organization evolves. The new SailPoint Access Modeling service speeds the creation of roles across the business, utilizing artificial intelligence to identify similar groupings of users and access to suggest potential roles, according to the company.

With this new capability, SailPoint said it will dramatically simplify the deployment and day-to-day management of a role-based identity governance program. This ensures that as any type of user joins or moves within the organization, their access rights will evolve with them automatically and without the overhead of traditional approaches to access modeling, according to SailPoint.

Meanwhile, the new SailPoint Access Insights service tracks access patterns over time, allowing firms to quickly comply with audit requests or generate reports that flag users whose access may require immediate attention. And the SailPoint Recommendation Engine service can deliver a completely autonomous experience, bypassing the need for a human to be involved in granting or revoking access.

CyberArk Endpoint Privilege Manager

Enhancements to CyberArk Endpoint Privilege Manager extend credential theft protection on the endpoint and defend against credential theft on workstations and servers by further reducing attacker dwell time and blocking lateral movement. The new deception feature enables defenders to quickly detect and proactively shut down in-progress attacks, according to CyberArk.

CyberArk helps break the attack chain at the initial point of entry by providing a deliberate and controlled way to track and mislead potential attackers, mitigate the exploitation of privileged credentials, and reduce dwell time.

New research from CyberArk Labs examined characteristics and patterns of emerging credential stealing malware families, which can give attackers the ability to steal secrets from more than 60 different types of applications. CyberArk said it found that attackers utilize this malware to harvest credentials on the endpoint and enable the escalation of privileges and lateral movement.

Menlo Security Cloud DLP

Menlo Security Cloud DLP powered by an Isolation Core redefines how data is monitored and provides the most complete protection with the highest level of visibility and control of company data. The isolation feature allows users to function in a native browser without any compromise to security or user experience, according to Menlo Security.

As websites adopt more dynamic, targeted content, Menlo Security said a DLP solution that relies on network or proxy traffic will have severely degraded data visibility. Bad actors can bypass traditional DLP products with data obfuscation techniques, according to Menlo Security, exposing companies to data breach and compliance risks.

A key feature of Menlo Security’s isolation technology allows administrators to define policies from a single interface and apply them to all users globally, whether they are connecting from the office or remotely. As a result, Menlo Security said customers can now secure digital transformation, eliminate 100 percent of malware, and accelerate cloud applications.

Idaptive Next-Gen Access

Idaptive added endpoint security and passwordless capabilities to its Next-Gen Access platform, helping organizations with a distributed workforce simplify the onboarding of remote workers and ensuring that endpoint devices that do not connect to corporate networks are secured.

Once a new Idaptive Mac or Windows Agent is deployed on the device, Idaptive said users can immediately log in with their IT-provided credentials and complete the enrollment process without being connected to a VPN or corporate network. Prior to this update, Idaptive said remote users had to establish a direct connection to the corporate network via VPN to complete the enrollment process.

User login for both Windows and Mac endpoints can now also be protected with Adaptive Multi-Factor Authentication (MFA). By utilizing Adaptive MFA, Idaptive said companies can require remote and local users to pass additional authentication challenges during the process of logging into their devices, adding an extra layer of protection before access to endpoints is granted.

RSA Adaptive Authentication For eCommerce

RSA Adaptive Authentication for eCommerce Version 20.5 adds new authentication flows to support transactions where the cardholder is not in session and introduces new capabilities that significantly enhance the customer’s checkout experience.

Regulations like the Payments Services Directive 2 (PSD2) in the European Union have driven online merchants to adopt the EMV 3DS protocol for Card Not Present (CNP) transactions, meaning that card issuers need a 3DS Access Control Server (ACS) that can accurately detect fraudulent payments. RSA said its tool can identify indicators linked to known and attempted fraud schemes globally.

RSA Adaptive Authentication for eCommerce prevents more than 95 percent of fraud in CNP transactions while also maintaining a frictionless shopping experience for cardholders. The tool analyzes hundreds of risk indicators to silently authenticate genuine cardholders while challenging only the small number of transactions that are high-risk.

1touch.io Inventa

1touch.io Inventa gives companies complete visibility into their unknown usage of customer data by automating the discovery process and providing them with a comprehensive, accurate, and up-to-date master catalog. The offering leverages network analytics, machine learning, and natural language processing to continuously and accurately catalog a company’s customer data in near real-time.

This includes structured and unstructured data, data at rest and in motion, known data and, most importantly, unknown data, according to 1touch.io. Inventa also connects to a multitude of data sources, central filesystems, databases, NoSQL and SaaS solutions, and Amazon S3 buckets, helping to solve major cloud security challenges, the company said.

Inventa’s automation provides a comprehensive view of customer data for maximum data quality and accuracy, eliminating the need for manual data collection and saving companies time and money through reduced operational overhead. By delivering a continuously updated master data catalog, Inventa equips companies to better secure their customer data and meet data privacy regulations.

Odo Security Privileged Access Management

Odo Security’s built-in privileged access management tool eliminates the risk associated with users holding static credentials. The centralized OdoAccess platform enables security teams to manage web, SSH, RDP and database access across hybrid-cloud and on-premise infrastructure, the company said, avoiding common security and connectivity issues associated with VPNs.

The privileged access management offering authenticates users to a server using either a short-lived token or a public-private key pair, both of which are issued and managed through Odo, the company said. The keys are rotated periodically and can be manually revoked at any time, Odo said, instantly cutting off all access.

Administrators using Odo can also now provide DevOps engineers with granular access to databases based on dynamic and contextual access permissions, giving security teams control over developer access down to the commands they run. Odo also integrates with cloud providers to automatically enroll servers and their tags to the platform, facilitating easy onboarding and tag management.

Privitar Data Privacy Platform

The latest release of the Privitar Data Privacy Platform gives global organizations the ability to dramatically improve data utilization while protecting customer sensitive data. With Privitar’s powerful data privacy software, enterprises can accelerate data provisioning and leverage their customers’ sensitive personal data to gain data-driven insights over intuition and experience.

Native hive support simplifies Privitar implementation and dramatically improves performance for partitioned data typical of Hadoop data stores, the company said. And enhanced Kerberos support with the Privitar Data Privacy Platform ensures consistency across the enterprise by enabling centralized data governance and privacy policy management across Kerberos Realms, Privitar said.

The Privitar Data Privacy Platform also added support for structured Avro in Kafka for analytics of event-based sensitive data generated in logging, instrumentation and message-based applications. And the platform’s support for shared environments will maximize the utilization of computing resources while reducing administrative setup and maintenance costs, according to Privitar.

ManageEngine Access Manager Plus

ManageEngine Access Manager Plus provides secure connections to remote systems, monitors privileged sessions, and tightens overall access governance, according to the company. With features like jump box support, session recording and live monitoring, the tool allows security admins to facilitate and govern remote sessions that provide users with privileged access to critical business systems.

Access Manager Plus leverages simplified, direct connections to remote data centers and automatically authenticates via jump box support for Windows and Linux platforms. The offering records all sessions and archives them as video files for post-session review and controls remote connections through session shadowing and termination capabilities, according to ManageEngine.

The product establishes a request-release mechanism to scrutinize access requests before approval, granting users and contractors access to remote systems only upon ticket status verification, ManageEngine said. The standard engine of Access Manager Plus starts at $495 a year for five users and unlimited connections, and the free edition supports up to two users and 1,000 connections.

Baffle Data-Centric File Protection

Baffle Data-Centric File Protection secures sensitive data inside files that companies are leveraging for business intelligence and analytics. The product protects personally identifiable information (PII) or other sensitive information inside source data files to enable anonymized or de-identified analytics for companies looking to derive intelligence from their data, according to Baffle.

As a result, Baffle said source data is protected as it lives inside cloud services such as Amazon Simple Storage Service (S3) and as it is ingested into data warehousing and analytics environments. The Baffle approach facilitates privacy-preserving analytics, which the company said allows businesses to securely share and monetize data in an environment of increased privacy regulation.

Baffle Data-Centric File Protection encrypts, tokenizes, anonymizes or de-identifies data to prevent data leakage while allowing organizations to continue to process data in the face of increasingly stringent privacy laws, the company said. The product is sold as an enhancement to Baffle’s Advanced Data Protection, and will be generally available in the first quarter of 2020.

GreatHorn Account Takeover Protection

GreatHorn Account Takeover Protection identifies compromised accounts and blocks takeover attempts by validating users with their unique typing patterns. Administrators can automate responses to authorization failures by inserting a warning barrier to the recipient, removing the message upon send, or simply logging the event for later analysis, according to GreatHorn.

This new feature authenticates users by analyzing keystroke dynamics – such as speed, pressure and timing between key press and release – and alerts security teams about failed attempts within the GreatHorn dashboard. This provides context for faster incident response, according to the company.

Most email offerings rely on binary or perimeter-based analysis to prevent email attacks, but GreatHorn said these methods fail to identify when a legitimate account has been compromised. By using machine learning to capture a user’s unique typing pattern on both desktop and mobile devices, GreatHorn can identify compromised accounts in a way that’s easy to implement, difficult to bypass, and not disruptive.

Egnyte Content Services Platform

The next generation of Egnyte’s content services platform delivers a unified approach to content governance, privacy, compliance, and workflow automation for today’s digital businesses. The platform leverages machine learning and artificial intelligence to give companies unprecedented levels of visibility and control over their content assets through a simple turnkey offering, Egnyte said.

Egnyte has combined its content governance and collaboration offerings into a single, flexible approach that allows companies to maintain compliance and enforce policies across all existing file offerings. At the same time, the new offering makes it easier than ever to collaborate through content-rich workflows with colleagues and business partners, and quickly access large files from remote locations.

Cloud-based machine learning and automation are critical to helping business leaders address security and productivity through a unified approach.