In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.
The Department of Homeland Security (DHS), Science and Technology Directorate (S&T) Cyber Security research and development (R&D) program develops innovative solutions to meet a broad array of cybersecurity challenges across the U.S. government, international partners, academia and the private sector. While at RSA, S&T will demonstrate 13 mature transition-ready technologies ready for pilot deployments and commercialization into the marketplace.
Visit S&T's booth and tour the entire exhibit hall by registering for a complimentary exhibits-only pass and entering the special S&T guest code: X8EDEPAR
Dates: April 16 - 19, 2018
Booth 1839| Moscone Center | San Francisco, CA
|Monday, April 16||5:00 PM - 7:00 PM (Welcome Reception)|
|Tuesday, April 17||10:00 AM - 6:00 PM|
|Wednesday, April 18||10:00 AM - 6:00 PM|
|Thursday, April 19||10:00 AM - 3:00 PM|
- AI-Analyst—A technology to accelerate cyber-analysis workflow processes.
- Akatosh—A tool that runs automated, real-time forensic analysis of endpoints after malware-attacks and other cybersecurity incidents.
- APE—An intrusion-prevention system for Android™ devices.
- Bastille Networks—A solution that detects and localizes radio-frequency (RF) devices and identifies RF-borne threats, vulnerabilities and active attacks.
- Code Dx—An automated application vulnerability management tool.
- Mobile Endpoint Security—An app that automatically detects when a mobile device connects to a new network and runs health checks to ensure the network is behaving properly.
- PEACE—A tool that protects end-point devices in an enterprise network by intercepting all new network connections and vetting them.
- ReCon—A system that analyzes network traffic in real time to identify and block or change privacy leaks using machine learning.
- Red Hat Mobile Application Platform—An integrated platform that enforces end-to-end security for mobile solutions and reduces the cost of maintaining mobile security policies.
- SecureCAST—A cloud-based service that scores telephone calls in real-time to determine if they are authentic, spoofed and/or part of an attack such as Telephony Denial of Service.
- Spoofer—A tool that measures and increases the deployment of Source Address Validation across the global internet.
- StreamWorks—A technology that supports continuous detection of emerging patterns on streaming data.
- Verified.Me—An identity management tool that separates log-in capabilities from attribute delivery using blockchain.