I’m going to go to my second RSA conference next week, and I am very happy to explore the center of Moscon and the surrounding city blocks that the conference takes over.
Last year was a bit overwhelming – I’m not sure I never put so much steps at a conference, walking half a thousand between different sessions. So, it’s a lot, but it’s worth it because RSAC is an incredible place to put your finger on the pulse of everything related to security, which means in my case a final point and an e-mail safety.
3 safety points of ending points and emails that I will look for in RSAC
There is a ton to absorb at the RSAC, so to make things less overwhelming, I broke down the three largest subjects that I am looking for with final points and e-mail safety.
1. AI with a real goal
Last year in RSAC, we were all struck by an AI stick, almost like a hazing ritual for beginners. The AI was everywhere, but the message was still, and it was around three things:
- The bad guys also use AI.
- The AI helps detection, with an additional spice of “security has done AI forever”.
- Come see our chatbot ai.
Because of this, the history of the AI was noisy, but nothing really pierced the noise. This year, I expect to see the more concentrated IA messaging. Take, for example, what I wrote a few weeks ago: how the final safety platforms are starting to take advantage of the neural treatment units for an optimized analysis. I hope to see more use cases for IA PCs, or at least more companies that start to use them in this way.
I will also be on the lookout for security messaging which concerns the security of PCs themselves. We may not be there yet, but I am curious to know if the bad actors target the PCs to take advantage of the treatment of local AI. It may not be a big problem right now, but as AI agents are becoming more widespread, I could see that it becomes more important.
https://www.youtube.com/watch?v=myg4ep3au0e
In fact, I expect the stick of AI to turn into an agentic IA stick this year, and I am curious to see how the agentics returns. This is a subject for another article, but the agent has a lot of things for many people. Although I see it as an opportunity for users to execute workloads such as copies of themselves on their own devices or in virtual machines for the automation of tasks, there are other large-scale user uses and perspectives. Each of them has its own security challenges concerning identity, prevention of data loss, governance, conformity, visibility, logging and more.
2. Management of final points and safety convergence
The intersection of the management and security of final points was also a theme last year, with suppliers such as adaptiva and ninjaone working alongside Crowdstrike to educate a crowd focused on the need to align management and safety efforts and the teams. Tanium also had a great presence there in the same way as in the biggest history of tanium.
This year, Adaptiva, Ninjaone and Tanium, among others, talk a lot about the management of autonomous parameters, so I expect the discussion to continue. I can’t wait to speak with more suppliers, because even if I have a good idea of the space from the point of view of the management of the end points, I would like that the resumes of the security of the terminals do not take them.
3. Safety by e-mail
Finally, I will pay particular attention to the safety of emails. This is an area where the issues have been quietly increased in the past year. Although the compromise of phishing and corporate email – also known as the beak – is not new problems, the generator has changed phishing game by facilitating attackers to make more convincing personalized messages.
What was relatively easy to spot – broken English, suspicious formatting, generic intros – is now much more polite, which exerts more pressure on detection tools and the application of policies to take threats before landing. Of course, AI can help you. E -mail security suppliers look at the AI themselves – whether for behavioral analysis, identity detection or user coaching – but approaches tend to vary.
It is a space in which I will soon dig with future research, so I am particularly interested in hearing how sellers position their offers, which capacities resonate with customers and where gaps still exist. Getting these perspectives on the ground will help shape the questions we ask, and I hope they can bring a certain clarity to a market that evolves quickly.
In San Francisco and RSAC
This is what I’m looking for at the RSA conference this year: more clarity, more substance and, hopefully, less noise.
If you are going to be there and have reflections on all of this – at the end point, agentic, management of autonomous ending points or how to do it from North Hall to four seasons without losing your mental health – let’s connect. There is a lot to unpack, and I am sure that we will all leave with a few answers and even more questions, but that is part of the pleasure.
Gabe Knuth is the computer analyst of the end user for Enterprise Strategy Group, who is now part of OMDIA.
Enterprise Strategy Group is part of OMDIA. Its analysts have trade relations with technology suppliers.