Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.
Here are the top 10 finalists from the Innovation Sandbox event
RSA kicked off this week with the Innovation Sandbox event, where 10 startup finalists showcased their products to compete for the designation of Most Innovative Company at RSA 2013. Here are the top 10 finalists – and the winner of the event. Take note because these companies are likely to stick around for quite some time.
Bromium is a highly anticipated startup featuring Simon Crosby, of Xen virtualization and Citrix fame. Ever since the company announced funding last year, the industry has been waiting for it to come out of stealth mode. Crosby’s virtualization experience and early cloud security leadership led many to expect the company to focus on cloud security. However, Bromium’s products – vSentry and LAVA – manage security for physical and virtual desktops.
Light Point Security
Beau Adkins and Zuly Gonzalez, the founders of Light Point Security, applied the lessons learned in their work with information security for the DoD to create Light Point Web Enterprise. A secure web browsing solution to protect enterprises from web-based malware, Light Point Web Enterprise isolates each employee’s browsing session within a one-time-use, server-based virtual machine that is destroyed immediately after use.
Nok Nok Labs
Led by former PGP CEO Phil Dunkelberger, Nok Nok Labs has raised $15 million since it was founded in 2011. It seeks to make passwords obsolete. Its solution leverages the existing security capabilities on a user’s device, such as a built-in fingerprint sensor, web camera, or integrated security chip, to implement user-friendly authentication to any application.
Led by a bevy of former VMware folks, PrivateCore is using virtualization for encryption. PrivateCore’s vCage is the first software to transparently protect any application while in use on commodity x86 servers. By encrypting data during program execution, vCage’s software-only, full-memory encryption protects data from unauthorized physical access and malicious hardware devices.
Created by Navy SEALs and Silicon Valley cryptography experts, Silent Circle is a global encrypted communications service for mobile devices. What makes Silent Circle unique is that its users hold the keys for encryption, as opposed to the service provider.
With an eye toward the still-growing cloud market, Skyhigh Networks looks to facilitate security management for companies migrating to SaaS, PaaS and IaaS platforms. Particularly where employees' mobile devices are concerned, Skyhigh looks to ease the pain of transitioning to a cloud model for accessing corporate data.
Founded by some ex-BeVocal people, Victrio is a Silicon Valley-based, venture-backed startup that makes a security solution for call centers, primarily in the financial sector. It seems to have both a database of known fraudulent callers and the ability to recognize behaviors indicating fraud. With a very focused customer profile, I think the question will be whether Victrio can leverage this technology for other uses.
Spotflux acts as a private gateway to the Internet for its users, compressing and encrypting their traffic before sending it through its own cloud. While handling the connection, Spotflux identifies malware, trackers, and ads before relaying the data to its customers, and does so without compromising privacy.
Wickr is part of a new class of services that makes each message “a moment in time.” You can encrypt your message so that only the intended recipients can read it, and set it so they can only read it for as long as you want. The folks at Wickr are big believers in privacy and anonymous communication. As a free app, you have to wonder where they’ll make revenue, though.
The winner of the Innovation Sandbox, Remotium runs virtual desktops on mobile devices. Frankly, it is a bit more of a raw startup compared to some of the other Sandbox finalists. However, it is another company using virtual machines to run potentially malicious programs or code in a sandbox, where they can’t do any harm. In this case, that sandbox runs in the cloud and then streams to the endpoint device.
Emerging Leaders 2020