Daily Addendum

Last minute program and exhibitor description updates are noted below.

Friday, April 24th

General Updates:

Moscone Wireless Help Line:
We have instituted a wireless help line for attendees who are having trouble accessing the Moscone wireless.  The WiFi help line can be reached at 415-974-4126 between 8am – 5pm. 

Evaluations Prize Update:
Your input helps us develop valuable, relevant content for future RSA Conferences. Pus, your feedback is provided to speakers after the Conference.  Fill out your evaluations within the mobile app.  All completed evaluations will be entered in a daily drawing for a GoPro Hero 4 camera and a Grand Prize Drawing of a Full Conference pass to RSA Conference 2016 plus a $500 travel voucher.

Session Updates:

Cancelled Session
DSP-F01 9:00 AM - 9:50 AM  Zero Knowledge
Martin McKeay, Senior Security Advocate, Akamai TechnologiesSecurity

New Repeat Session
HT-R04 9:00 AM - 9:50 AM, West 3006, Security Hopscotch
Chris Roberts 

STR-F01 9:00 - 9:50 AM IoT: When Things Crawl into Your Corporate Network
New Co-Speaker: Sam Curry, Chief Technology and Security Officer, Arbor Networks

HTA-F02 10:10 – 11:00 AM
Session Title Update:
Old Session Title: Are You Giving BIOS-Level Attackers a Free Pass?
New Session Title: Are You Giving Firmware Attackers a Free Pass?

LAW-F02 10:10 AM – 11:00 AM Mobility and the Law: Protecting Your M-Info
New Panelist:  Ralph Poore, Director, Emerging Standards, PCI Security Standards Council

LAW-F03 11:20 AM – 12:10 PM Defending against State-Sponsored Cyber Theft of Intellectual Property
Cancelled Panelist:  James Lewis
New Panelist: Stewart Baker, Partner, Steptoe & Johnson LLP

PNG-F03 11:20 AM – 12:10 PM Securing the Grid: Opportunities and Risks in Operational Technology
New Panelist:  Marty Edwards, Director, Department of Homeland Security, Office of Cybersecurity and Communications, The Industrial Control

KEY-F04 1:00 – 2:00 PM  Hugh Thompson and Guests
New Additional Guest Speaker:
Srini Pillay M.D.
Chief Executive Officer
The NeuroBusiness Group (NBG) of Cambridge, MA

Briefing Center Updates:


Learning Lab Update:


Exhibitor Updates:


  • Cryptsoft Pty Ltd changed to Cryptsoft

  • Déjà vu security changed to Peach Fuzzer  

  • Ground Labs PTE LTD changed to Ground Labs

  • Hytrust changed to HyTrust

  • Simeio Solutions changed to Simeio Solutions, Inc.

  • Somansa changed to SOMANSA

  • ViAscope changed to VIAscope

  • Wild Packets changed to Wildpackets


AccelOps - additional booth # added: N3224

Entrust Datacard - additional booth # added:  N3003

IEEE Computer Society – booth change to #N4314

Illumio – booth change to #N4311

Liberman Software - additional booth # added: S1523

Proofpoint – no longer at booth #S2533

Vormetric - additional booth # added: S515

Resolution1 Security - cancelled booth

IDGIZE - cancelled booth


Exhibitor Name Booth Number Description
Accuvant + FishNet Security S1243 Accuvant and FishNet Security joined together to create the nation’s premier information security solutions provider, offering IT security and risk products and services to help enterprises combat the growing cyber threat. Combined, the companies have served over 10,000 clients, operate in 60 locations across North America, and have partnerships with all the leading security product manufacturers.
ADLINK S128 ADLINK Technology is enabling the Internet of Things (IoT) with innovative embedded computing solutions for edge devices, intelligent gateways and cloud services. ADLINK’s products are application-ready for industrial automation, communications, medical, defense, transportation, and infotainment industries.
Advantech S621 Advantech Networks & Communications Group provides the broadest range of communications infrastructure platforms in the industry scaling from 1 to over 300 Intel® cores, consolidating packet, application and control processing onto a single platform architecture and one code base.
AHA Products Group S2718 AHA Products Group develops and markets superior ICs, boards, and IP cores for improving the efficiency of network appliances, storage, and communications systems.  AHA has been setting the standard in FEC and Lossless Data Compression for many years, and now supports Crypto Acceleration.  AHA’s solutions are flexible and cost effective for today’s growing bandwidth and reliability challenges.
American Bar Association, Section of Science and Technology Law    S600  
American Portwell Technology, Inc. S520 Portwell, Inc. is a major worldwide supplier of specialty computing application platforms and services. Member of Intel® Applied Computing Platform Providers (IACPP), but also an associate member of Intel® Embedded Alliance, as well as Advanced Telecom Computing Architecture (ATCA) and an executive member of PCI Industrial Computer Manufacturing group (PICMG).
Aruba Networks N4325 Aruba Networks® designs and delivers Mobility-Defined Networks™ that empower a new generation of tech-savvy users who rely on their mobile devices for every aspect of work and personal communication. Known as #GenMobile, they demand to stay connected to everything all the time, no matter where they are.
Arxan Technologies S627 Arxan provides the world’s strongest application protection solutions. Our unique patented guarding technology 1) Defends applications against attacks, 2) Detects at run-time when an attack is being attempted, and 3) Responds to detected attacks to stop them, alert, or repair.
Big Switch Networks    S2713 Big Switch Networks is the market leader in bringing hyperscale data center networking technologies to a broader audience. The company's Big Tap Monitoring Fabric is a next-generation SDN solution to monitor existing networks, and the flagship Big Cloud Fabric is the industry's most advanced bare metal switching fabric intended for new data center pods such as private cloud, big data, and VDI.
Bluink Ltd. S122 Bluink is the developer of Injector, an app and bluetooth dongle that turns your smartphone into a universal authenticator.
Login with long-string random passwords, OTP, of FIDO U2F password free authentication, all with a tap on the app, or natural speech.
Cavium S2726 Cavium is a leading provider of highly integrated semiconductor products that enable intelligent processing in enterprise, data center, cloud and wired and wireless service provider applications.
cPacket Networks Inc. S544 cPacket is the leader in Pervasive Network Intelligence. cPacket’s solutions simplify network monitoring, performance optimization and trouble-shooting in distributed network environments. Granular real-time inspection and diagnostics are enabled by unique Algorithmic Fabric chip and innovative hardware-software architecture.
Cray S740 Cray builds innovative systems and solutions enabling researchers to meet existing and future simulation and analytics challenges. Leveraging years of experience developing the world’s most advanced supercomputers, Cray brings you a comprehensive portfolio of high performance computing, storage, and data analytics solutions delivering unrivaled performance, efficiency, and scalability.
ECI Telecom S1946 ECI Telecom delivers Next Generation Packet Optical and Carrier Ethernet solutions to service providers and customers with a need for mission critical networks worldwide. ECI provides efficient platforms and solutions that enable customers to rapidly deploy cost-effective, revenue-generating services among them Cyber security solutions.
Emerging Threats S2533 Over 500 organizations in more than 40 countries trust cyber threat intelligence products from Emerging Threats to protect them from today’s advanced cyber attacks. Emerging Threats - acquired by Proofpoint in March 2015 - is committed to providing our customers with the most timely, accurate and meaningful cyber threat intelligence available. For more information, visit
Enigmedia N4322 We provide Secure Communications, thanks to our new proprietary encryption patent. Encrypted calls, audio calls and instant chats.
EventSentry S2635 EventSentry is a comprehensive SIEM and compliance solution. Included is real-time windows event log monitoring, correlation of various Windows security events, a built-in compliance package for real-time alerts of critical events and forensic analysis of collected data through powerful search. Capabilities also include system health and file integrity monitoring. Users get easy-to-read reports, award-winning customer service and a customizable solution.
EZchip S2044 EZchip is a fabless semiconductor company that provides high-performance data-path processing solutions for a wide range of applications for carrier, cloud and data center networks. EZchip’s broad portfolio includes network processors, multicore processors, intelligent network adapters and high-performance appliances.
Fortscale S221 Fortscale provides a proven user behavior analytics solution to quickly mitigate security threats from bad actors operating inside a company network. With deep big data expertise, superior analytics, unrivaled machine learning capabilities and global user profiling, Fortscale delivers the industry’s most accurate, scalable and extendible UBA solution.
Fox-IT S2038 Fox-IT prevents, solves and mitigates the most serious threats as a result of cyber-attacks, fraud and data breaches with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide
Garner Products S938 For over 50 years, Garner Products, Inc. has specialized in the design and manufacture of high quality data elimination equipment that prevent the potentially devastating consequences of data breaches. Garner offers slide-through and drawer style degaussers along with hard drive and solid state destruction equipment to satisfy a variety of applications.
Ground Labs S240 We are a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss. Our flagship products, Card Recon, Data Recon and Enterprise Recon, have helped more than 2,500 organisations discover sensitive PII and cardholder data in documents, databases, emails, log files and many other locations. For more info:
IONU Security, Inc.    S2812 Rethinking Data Security. Yesterday’s technology can’t address today’s endpoint and data protection challenges. A mindset focused on stopping the attack will never create a solution that addresses the real issue, which is making your data “Attack Proof”. Other providers are trying to keep intruders out. A battle they are waging with yesterday’s technology and losing.
Infobyte LLC S2637 Infobyte LLC. founded in 2001, provides specialized services in offensive security. It is the first company to offer Red Team Services in Latin America. R&D, is the backbone of the company and our researchers have given talks at the world´s biggest conferences. Some of our most important developments include the evilgrade framework and Faraday, the first IDE for real-time collaborative pentests.
Interface Masters Technologies S2824 Interface Masters’ expertise lies in 1GbE, 10GbE, 40GbE and 100GbE networking solutions that integrate with monitoring, inline networking, IPS, UTM, WAN acceleration, and other mission-critical IT and security appliances. Product lines include PacketMaster® Network Packet Broker, specialized internal server adapter cards, switches, external intelligent Network TAP and Bypass and failover systems.
Ionic Security S1745 Ionic Security enables the digital enterprise by taking a comprehensive approach to securing data in today's borderless enterprise by providing access control, sensitive information monitoring, data encryption and policy management, without proxies or gateways or changes in user behavior.
Key Source International S1044 KSI designs and manufactures specialized input devices including keyboards for government and healthcare security. Our desktop solutions speed workflow and enhances the user experience. KSI delivers a fully integrated solutions that features biometrics, contact-less smart card, NFC and auto locking desktop for secure log-off. Sealed matrix and cleaning button allows you to disinfected it anytime.
Luxar Tech, Inc. S2645 Luxar develops industry-leading high speed and low latency solutions to network visibility and data center interconnect markets. For more information, go to
miniOrange Security S2742 minOrange is a premier IT Security Product development and consulting organization, offering number of products and solutions in Authentication and Identity Access management.Our Single Sign-on solution ensures seamless access to all enterprise resources, Once Authenticated with Strong Authentication or Fraud Prevention solution as per defined policies.
Napatech S833 Napatech is the world leader in accelerating network management and security applications. As data volume and complexity grow, the performance of these applications needs to stay ahead of the speed of networks in order to do their jobs. We make this possible, for even the most demanding financial, telecom, corporate and government networks.
NPCore S125 NPCore is a network and end-point security company and established in 2008 for developing specialized malware detection and response solutions in the anti-virus centric security market.  NPCore has developed “Zombie ZERO” for TWO-LEVEL defense on APT attack which positions itself as a market leader and advances with leading product technologies among the competition with global security companies.
NSFOCUS Information Technology Co., Ltd. S832 NSFOCUS is a global provider of cyber security solutions and services, specializing in distributed denial-of-service detection and mitigation
NuData Security N4315 NuData Security offers fraud detection and prevention software to detect automated and human attacks using multiple layers of fraud detection. NuData also has a database of metadata (e.g. reputation data, history) on billions of IP addresses, device fingerprints, email addresses and phone numbers, and their linkages. NuData protect against manual and automated account creation and takeover.
Outlier Security, Inc. N3032 Outlier provides endpoint threat detection, incident response and remediation across enterprise networks. The system is agentless, SaaS and performs analytics on digital evidence collected from endpoints to automatically find new and unknown threats and indicators of compromise. Outlier offers immediate deployment, no impact on end users, and lowest TCO as compared to agent-based systems.
Peach Fuzzer   Peach Fuzzer, the world’s leading fuzz testing platform, provides security-testing solutions to organizations around the globe. Peach Fuzzer discovers and buckets vulnerabilities in hardware and software systems, applications, embedded devices, and network protocols. The Peach Fuzzer platform is extensible and modular: a flexible system that can fuzz any automated security-testing
Pixalate, Inc. S826  
RedSeal S1107 RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that certifies their evolving networks are secure and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, prioritizes needed actions, and provides critical information to quickly remediate issues.  More at
Security Scorecard, Inc.    S2619 SecurityScorecard helps organizations manage and mitigate risk inherited through third party partner ecosystems.  Using a live, SaaS based dashboard, organizations can visualize the security posture of vendors, cloud providers, subsidiaries, outsourcers and other third parties.
SilverSky now part of BAE Systems S1707 The expert provider of cloud security solutions delivering the industry’s only advanced Security-as-a-Service platform from the cloud, simplifying how growth-minded companies secure their most important information. Now part of BAE Systems, we offer an extended portfolio of products & services, enhancing our ability to provide security solutions to protect & enhance businesses in the connected world.
Sonatype, Inc. S339 Are you in AppSec? How were you impacted by Heartbleed, Struts, and the myriad of other open source vulnerabilities? Visit Sonatype to get ahead of the next one: comprehensive bill of materials | automation of security policies | insight to help developers choose safer components | ongoing monitoring & alerts | all designed for today’s agile/DevOps environments.
SOTI Inc. S143 SOTI is a pioneer in enterprise mobility management. SOTI provides a single solution with unified console management for all devices and all deployment types, including BYOD (bring your own device), CYOD (choose your own device), COPE (corporate-owned, personally-enabled), as well as dedicated purpose (e.g. rugged devices).
Staminus Communications  S342 Powered by a global network dedicated to DDoS mitigation and patent-pending mitigation technologies, Staminus helps enterprises, ISPs, independent businesses, financial institutions, and gaming companies protect their services from DDoS attacks.
StrikeForce Technologies, Inc. S1227 StrikeForce Technologies helps to prevent cyber security online. Its products help protect consumers and their families while banking and shopping online, and businesses in “real time” against data loss and breaches. StrikeForce Technologies, Inc. (SFOR) is headquartered in Edison, N.J., and can be reached at or by phone at (732) 661-9641 or toll-free at (866) 787-4542.
TapLink S639 TapLink’s mission is to restore trust in passwords. Password database breaches impose direct remediation costs, reputation damage and expose users to fraud. The company’s patented technology, called Blind Hashing, prevents offline attacks by making password databases impossible to steal. TapLink is completely invisible to end-users, easy to integrate and has a very low impact on back-end systems.
TeleSign Corporation S527 TeleSign is the leader in Mobile Identity solutions, helping customers secure more than 3.5 billion end user accounts worldwide and prevent registration fraud, while improving user experience and managing costs.
The Open Group  S326 The Open Group is an international vendor- and technology-neutral consortium upon which organizations rely to lead the development of IT standards and certifications, and to provide them with access to key industry peers, suppliers, and best practices. The Open Group provides guidance and an open environment in order to ensure interoperability and vendor-neutrality.The Open Group is an international vendor- and technology-neutral consortium upon which organizations rely to lead the development of IT standards and certifications, and to provide them with access to key industry peers, suppliers, and best practices. The Open Group provides guidance and an open environment in order to ensure interoperability and vendor-neutrality.
Trusted Knight S140 Trusted Knight is a security software company focused on defeating sophisticated stealth malware.  Our patented Protector products "break" the way this malware operates and stops criminals from stealing your data without being reliant on detection. Even if your systems are already infected, Protector blocks the harvesting of your information.
UK Trade & Investment Defence & Security Organisation S112 The Defence and Security Organisation within UK Trade and Investment (UKTI) provides the essential Government-to-Government dimension to company-led marketing campaigns in the export of Defence and Security equipment.  Drawing on the wider UKTI experience of trade promotion and working closely with the UK Ministry of Defence and wider Government-to-Government relations
Visa, Inc. S828  
Zenedge LLC N3220 Zenedge provides organizations a managed white-glove cybersecurity service to help secure their web sites and web applications against vulnerabilities and Distributed Denial of Service (DDoS) attacks.



This document was retrieved from on Fri, 28 Oct 2016 17:35:24 -0400.
© 2016 EMC Corporation. All rights reserved.