Tags

, , , , ,

Gartner Security and Risk SummitToday was the opening day for the Gartner Security and Risk Management Summit in Washington, DC. I spent the morning walking the expo floor, trying to become familiar with the various vendor offerings. After pouring over the conference booklet, I was able to divide the vendors into various categories.

    • Network security
    • Identity management
    • Compliance/Governance
    • Identity Risk
    • Threat protection
    • Mobile security
    • Data sharing/Collaboration
    • Document policy management

Of those, network security and identity management seemed to be the most prevalent vendor types.

What surprised me was the lack of coverage for application security. It seems that very few companies are creating products for DevOps and the management of application security. The products that stood for appsec were those from Appthority, Sonatype and Coverity. I’ll spend some time tomorrow talking to each of these companies and getting an idea of their product differentiation.

In the meantime, paloalto Networks handed out a study, “The Application Usage and Threat Report” and Check Point Software Technologies published a research report, “2013 Security Report“. I’ll be talking to the originators of those studies tomorrow to see what kind of insights they can offer.

Swag hunting is always fun at geek conferences, so I’ll make the rounds to see what people are offering. I found some fun stuff today like silly putty in tobacco chew cans and an iPod sound booster made from rubber… stay tuned. Pictures to follow.