Risk //

Compliance

4/30/2018
07:15 PM

10 Security Innovators to Watch

Startups in the RSA Conference Innovation Sandbox competed for the title of "Most Innovative."
2 of 12

Acalvio
Product/Service Highlights: Acalvio's Shadowplex is based on the principle of deceiving an attacker, actively engaging a threat actor rather than simply observing their actions. By offering 'alternative realities,' Shadowplex seeks to trick malware, exploits, and attacks into showing themselves and giving up their secrets. In order to scale this activity, Acalvio has developed autonomous deception, which combines deception with AI and SDN technologies.
Year Founded: 2015
Key Executives: Ram Varadarajan, founder, chairman, and CEO, was formerly senior vice president and general manager at CA. Prior to that, he was founder, chairman, and CEO of Arcot Systems. Nat Natraj, co-founder and president, was formerly senior vice president, sales, at Apigee, Calypso, and CA. Raj Gopalakrishna, co-founder and vice president, architecture, was formerly distinguished engineer and senior vice president at CA. Sreenivas Gukal, co-founder and vice-president, engineering, was formerly senior architect at CA Technologies.
(Image: RSAC)

Acalvio

Product/Service Highlights: Acalvio's Shadowplex is based on the principle of deceiving an attacker, actively engaging a threat actor rather than simply observing their actions. By offering "alternative realities," Shadowplex seeks to trick malware, exploits, and attacks into showing themselves and giving up their secrets. In order to scale this activity, Acalvio has developed autonomous deception, which combines deception with AI and SDN technologies.

Year Founded: 2015

Key Executives: Ram Varadarajan, founder, chairman, and CEO, was formerly senior vice president and general manager at CA. Prior to that, he was founder, chairman, and CEO of Arcot Systems. Nat Natraj, co-founder and president, was formerly senior vice president, sales, at Apigee, Calypso, and CA. Raj Gopalakrishna, co-founder and vice president, architecture, was formerly distinguished engineer and senior vice president at CA. Sreenivas Gukal, co-founder and vice-president, engineering, was formerly senior architect at CA Technologies.

(Image: RSAC)

2 of 12
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18913
PUBLISHED: 2019-03-21
Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location with...
CVE-2018-20031
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2018-20032
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon t...
CVE-2018-20034
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2019-3855
PUBLISHED: 2019-03-21
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.