SHARE
Facebook X Pinterest WhatsApp

Eight Trends to Follow at RSA

Eight Trends to Follow at RSA   No Title The Cloud ConundrumSecurity has been one of the major inhibitors to cloud adoption within the enterprise to date. When the experts convene this year, expect cloud security discussions to revolve around security enablement technologies, as well as new frameworks to measure and audit the security of […]

Mar 1, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Eight Trends to Follow at RSA

 

2No Title

The Cloud ConundrumSecurity has been one of the major inhibitors to cloud adoption within the enterprise to date. When the experts convene this year, expect cloud security discussions to revolve around security enablement technologies, as well as new frameworks to measure and audit the security of cloud services and solutions.

3No Title

Deploying Security as a ServiceLast year we saw the burgeoning growth of security SaaS deployments. This year, expect the trend to really take RSA by storm. Channel players should expect to see a lot more security as a service offerings, as well as a range of hybrid offerings that mix SaaS with traditional on-premises protections.

4No Title

Securing Social MediaAs Facebook, Twitter and YouTube embed themselves further into the fabric of everyday business operations IT security professionals are struggling to find ways to keep the collaboration clicking along while minimizing the risk of attacks and data leaks posed by these new channels.

5No Title

Keeping up with ComplianceThe compliance discussion has long been a vendor and speaker touchstone, a foundation upon which most security talks build upon. Expect the dialogue to continue this year, with lots of emphasis placed on PCI and data breach notification compliance issues.

6No Title

Consumerization ChaosThe more iPods, smartphones, personal netbooks and other consumer devices your clients’ employees drag into the office, the more difficult it is for you to help control when and how these users access valuable information and infrastructure. Expect a lot of talk to revolve around how to better reign in this chaos.

7No Title

Metrics ManiaHow can IT pros expect to get better at security if they’re not able to measure their efforts? The industry has made some significant progress in this arena over the past several years, but there’s more work yet to do. Just before the show starts in earnest, metrics wonks will meet up for MiniMetricon, a small, day-long event devoted to measuring security effectiveness.

8No Title

Wielding Web Apps the Right WayThe fast development cycle inherent in bringing Web 2.0 applications live has taken its toll on the security of most IT organizations. The web application security contingent hopes to continue its proselytizing about secure development practices and tools that can help minimize web application risks.

9No Title

The Browser BattlefieldWeb 2.0 has also helped drag the security battlefield from the operating system into the browser, which typically acts as the portal for many enterprise and consumer applications that users tap into today. There will be a number of studies out that will highlight the increased attacks hackers are making through the browser and associated applications.

Recommended for you...

Exterro Debuts Agentic AI Tools for Data Risk and E-Discovery 
Jordan Smith
Aug 26, 2025
SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.