close
close

RSA Conference 2025 Highlights, findings and companies to observe

In my opinion, the RSA conference becomes a shop window for the use of modern AI in cyber security. Last year the resounding topic for the event was generative KI. So it was no surprise that this year's event focused on agents -KI.

In this RSAC degree, I will give my thoughts both about the transformative power and the challenges of the employment of agents AI in cyber security protection suites. I will also highlight a handful of announcements that I found remarkable, and share five five media video talks with Cisco and Cohesity, which examine several important topics related to modern AI. Let's start.

Promise and challenge of the agents -KI

Many experts, including me, speak for the dichotomy of security for AI and AI for security. In other words, there is a need to secure the use of AI applications and the workload, as well as the use of the performance of AI in order to reduce the friction of the analysts and to strengthen cyber defense workers. In view of the strong focus of RSAC this year on the agents -KI and their potential effects to strengthen cybersecurity, two things are very obvious to me.

First, the solution providers who avoid AI hype are carefully listening to customer needs and benefiting at short notice as a trustworthy consultant – and harvesting commercial rewards in the long term. Second, radical development of identity access management is required to manage the permissions, the delegation and hierarchy of agents and superagents. The first moving companies that crack the code for this complexity benefit immensely.

The speed at which modern AI applications moves is exciting to observe, and there is great potential to give the scales towards defenders. Ai is a two-edge sword, but the agent-ki-plus automation very much promises to combat the current use of generative KIs by bad actors who use it to dramatically improve phishing and side movement schemes.

RSAC announcements highlights and knowledge

As in previous years, RSAC 2025 served as a stage for many announcements of cyber security infrastructure providers. Four were remarkable for me:

Cisco -Cisco announced new functions associated with its XDR platform, including immediate attack testing, improved forensics and a storyboard function that visualizes complex attack chains more clearly. I like the maturity of the company's endpoint protection suite and think that the additional improvements for the supply chain and the industrial IoT threat defense are promising. In my view, Cisco has been one of his best purchases in recent years. It offers the automated function for red teaming on the company's AI defense platformAnd it supports the newly launched Foundation AI Open Source Argumentation model, which is specially built for the improvement of security applications.

Hewlett Packard Enterprise – HPE announced extended functions for network access control functions. An opsramp integration for more detailed network observability And new SSE -Mesh connectivity -all developed to improve reliability, ensure reliability and to harden. I like the deeper level of automation and dynamic routing functions that should make both the network and safety processes easier. However, HPE gives the option of using its HP Labs research team to get deeper into safety and provide threat information research such as Cisco Talos.

Microsoft -AM Sunday before the official opening of RSAC I accepted a second year before the Microsoft before day and met the executive management during the event. I am still impressed by the The company's continued focus on its safe future initiative. Microsoft claims that it is now employed by over 34,000 engineers who apply with the refinement and innovation of cybersecurity. This commitment to technical resources is stunning and speaks for the commitment of the company for security. In conversation with a handful of smaller providers of security solutions, I also learned that Microsoft Defender benefits from the company's security focus and achieved considerable profits in its ability to ensure AI work -up warning warning, endpoint protection and cyber renovation.

Palo Alto Networks – The activity of Palo Alto Networks at RSAC was significant. This included his announced intent to acquire Protect AI in order to promote its modern AI security ambitions, as well as improvements to the exposure management and e -mail security of AI Cortex. The company has also recorded an increasing introduction of its secure enterprise browser, which offers protective protection. My conversations with the executive management also made it clear that Prism air is one of the most expected cyber security solutions in the history of the company; It includes model scanning, posture management, AI-Red teaming, running-time safety and agent safety. I can understand the enthusiasm of Palo Alto Networks because I think the company has one of the broadest and deepest AI security suites.

Deep conversations with cisco and cohosity

At RSAC this year I had the opportunity to carry out six five media video interviews with Cisco and Cohotity. The first was at Ciscos Tom Gilliswhich leads the company's data center and security company. We have discussed the announcements of the company at RSAC and Gillis' Vision for the integration of agents -KI and their potential effects on the promotion of improved security results.

The second interview was with Vasu Murthywhich leads the entire product development for the summary. We have discussed the company's new recoveryent, which is infused by its Veritas acquisition with intellectual property, together with the long-term vision of Murthy for the product portfolio, and like the Kohärsity about 100-fold exabyt exabytes of corporate data, which worldwide with a zero-drinking architecture and an improved multi-factor authentication dates,, ML-based ransomware and more multi-factor authentication data, more.

To observe companies

At RSAC I also had the opportunity to spend the time with a handful of companies, including Forscout, Infosec Global and Swissbit. Forens Offers cyber risks, compliance and threat reduction functions, which are made possible by asset intelligence, continuous evaluation and continuous control in the entire environments and OT environments. I like that the company uses an open platform that integrates into more than 100 security and IT products. Forecout Research – Vedere Labs also offer Deep Device Intelligence and curates both its unique telemetry and other threat intelligence feeds to enrich its platform.

As a pioneer and guide in cryptographic posture management, Infosec Global The aim is to secure the digital corporate infrastructure by discovering, inventory, renovating and managing cryptographic assets. The Agilesec platform Orchestrates the agile cryptography management through centralized political enforcement in cloud and local environments-even during the transition from traditional cryptography after the quantum. The company informed me that global financial institutions, large technology companies and government agencies are dependent on its own skills and integrations with third parties in order to ensure compliance with the regulations, to strengthen resilience and to achieve the willingness according to the quantum. The crypto conservation management is somewhat created, but the future risks associated with the encryption with the help of Quantum Computing will certainly justify a more precise examination.

Swissbit is a provider of security solutions that combines its strengths in the flash memory and an embedded IoT device design to enable the authentication of digital identity and physical access control. The Swissbit Ishield key offers these functions in a simple and flexible USB key shape factor that actively protects users from online attacks such as phishing, social engineering and account. The latest product edge, Ishield Key 2, is the first Fido security key to be certified FIPS 140-3 Level 3 and ensures hardness security for demanding applications. I like his flexibility that is similar to a Swiss army knife (word game) to address a variety of applications, including badge access, authentication and much more.

The power of the platform

In the larger picture, providers of cyber security solutions double the performance of the platform to ensure simple administration and hardened security. The spread of tools is unsustainable, especially since bad actors cope with the use of generative and ultimately acting KIs for the attack of organizations. Platform approaches can go far to offer a higher value and improved protection through a number of solutions that work better together. In my view, RSAC 2025 has contributed a lot to demonstrate the value of security platforms, and although the hype cycle is now focusing on the agent AI, he has a great long-term promise.

Moor Insights & Strategy offers technology companies, such as all research results and analyst companies, offers paid services. These services include research, analysis, advice, advice, benchmarking, acquisition matchmaking and video and speech sponsorship. Of the companies mentioned in this article, Moor Insights & Strategy currently has a paid business relationship with Cisco, Cohotity, HPE, Microsoft and Palo Alto Networks.

Leave a Comment