SHARE
Facebook X Pinterest WhatsApp

RSA Security Wrap Up

The year’s RSA security conference — as always — revealed the biggest trends in enterprise security. Lisa Phifer reports. At last week’s RSA Conference, dozens of network hardware, software, and service providers exhibited wares and announced security offerings. Internet-borne crime, cloud service delivery, and compliance concerns continue to push network security onto center stage, forcing […]

Written By
thumbnail Lisa Phifer
Lisa Phifer
Feb 25, 2011
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The year’s RSA security conference — as always — revealed the biggest trends in enterprise security. Lisa Phifer reports.

At last week’s RSA Conference, dozens of network hardware, software, and service providers exhibited wares and announced security offerings. Internet-borne crime, cloud service delivery, and compliance concerns continue to push network security onto center stage, forcing vendors to peer higher into the protocol stack and drill deeper into packets for greater visibility and control. In this roundup, we highlight a few announcements and demos that caught our attention at RSA 2011.

Cisco: Borderless Security Through Context Awareness

RSA is large enough to draw network infrastructure heavy hitters, from Cisco to Juniper, IBM to HP. For example, Security Techonology VP Tom Gillis used his keynote to offer a glimpse into Cisco Systems’ vision of the uber-connected future, where TrustSec-tagged traffic will enable appropriate handling, independent of location.

Dubbed SecureX, this framework represents an evolution of Cisco’s “borderless networks” strategy which continues to rely on embedded security – based not only on packet/flow source/destination but now also this newly-added “context” (when and where available). The idea of context-aware policy enforcement sounds promising. But yet another proprietary solution that can really only reap benefits once traffic enters a homogeneous network seems, well, bounded.

Read the rest about RSA conference at eSecurity Planet.

  SEE ALL
ARTICLES
 

Recommended for you...

New Spyware Masquerading as Messaging Apps Hits UAE Users
How Network Detection & Response (NDR) Works
Sarah Hunt
Oct 1, 2025
Europe Fails to Keep Pace with Rising Cyber Threats
Datamation Staff
Sep 29, 2025
UK Digital ID Card Launch Gets Hostile Reception
Datamation Staff
Sep 29, 2025
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.