Sellers on this week of the RSA conference in San Francisco introduce agency infusion of artificial intelligence embedded on cyber security platforms, fresh AI dams, cloud protection tools and other products that are to overtake cyberspace trends.
Apparently about 42,000 people from 142 countries attendance Annual event – one of the world’s largest cyber security events. Large names, including Sentinelone, Crowdstrike, Akamai Technologies and pioneering stores such as X-Phy Inc. And Bugcrowd, show how they exploit machine learning to protect the organization against cyber attacks.
Acquiring the novel AI Security Tech
Santa Clara, California Palo Alto Networks announced on Monday that she agreed to take over AI and her safety technology to develop and accelerate the AI Ai AI security platform.
After adding Protect AI tools, Palo Alto customers will be able to build AI applications with comprehensive safety, according to Anand Oswal, senior vice president and general director at Palo Alto Networks.
“When applications powered by AI become the basis of companies, they bring the risk of traditional security tools that cannot cope properly,” said Oswal in a statement.
It is expected that the general director of AI, Ian Swanson, its co -founders and company employees will join Palo Alto Networks after the end of the contract, which estimates that the company will take place in the first quarter of 2026.
Answering like an advanced analyst
Sentinelone said on Tuesday that he extended his native agency capabilities, called Purple AI, to the security platforms and data management platforms and lakes to accelerate comprehensive threat detection and reaction.
The company stated that the release of “Athena” automatically supports excessive safety operational teams by automating and accelerating triage and investigations in Deep Security reasoning.
“AI and automation for a long time maintain the promise of the basic transformation of security operations and top-up analysts for detection and reacting-with machine speed-at the threat of even the most sophisticated opponents of the nation-state and cyber criminals,” said Tomer Weingarten, co-founder and general director of the company.
Automatic Triage Purple AI jumps to alerts to determine the identification of the threat to determine priorities.
Combining local and multiple view
Crowdstrike has presented the latest data protection innovations designed to stop exfiltration of encrypted files, generative AI data leaks and erroneous software configuration as a service.
The company said that Falcon data protection closes critical gaps that the attackers exploit to steal confidential data, providing protection in the implementation environment in the cloud at rest and and eliminates the need for separate security tools for end systems and cloud systems.
“In the statement of Elia Zaitsev, director of Crowdstrike technology, in the statement Elia Zaitsev, director of Crowdstrike technology, in the statement of Elia Zaitsev, director of Crowdstrike technology, in the statement Elia Zaitssev, director of Crowdstrike technology, in the statement of Elia Zaitsev, Crowdstrike technology, they Departmented into older data protection, because they are fragmentary in the whole environment, blind to encrypted exfiltration and unable to stop threats, “said Elia Zaitsev, Crowdstrike technology director.
Crowdstrike said that the fresh safety product is the first encrypted tool for preventing exfiltration in the security industry. Checks confidential data in encrypted archives, such as 7zip files, because the attacking one creates and blocks data theft before files are blocked and released.
Stopping the wicked hints and scratches
Akamai, Cambridge, a company dealing with cybersecurity and cloud processing with Massachusetts supporting many industries, introduced on Tuesday multi -layered protection of the AI application against unauthorized asking, expenditures, opponents and on a huge scale.
The company announced that a fresh dam for artificial intelligence protects generative artificial intelligence from quick attacks, harmful results and data exposures to maintain the organization in accordance with privacy regulations, their exploit of generative AI Safe and sound and the protection of their intellectual property.
“Securing the AI application is not only blocking attacks, but the statement in Akamai is about enabling innovation without prejudice to safety or performance,” said Rupesh Chokshi, senior vice president and general director for application safety at Akamai.
The fresh tool can be integrated using the Edge Akamai platform or safe and sound AI applications in any environment via API REST.
Attachment AI
Fortanix said he was watching his Genai, ARMET AI platform at the RSA 2025 conference.
The platform is located at every stage of the AI generative process, from access to data, consumption and vectorization to LLM inference and reaction handling, in secure hardware enclaves to prevent unauthorized access to data and data changes.
“Generative artificial intelligence has the power to transform each industry, but only if you can trust it,” said Anand Kashyap, general director and founder of Fortanix.
Since the enclaves allow you to run the code and data in complete insulation from the rest of the system, developers do not have to choose between innovations and security, the company said.
Detection of deep attacks in real time
The healthcare employee is already experiencing deep wardrobes and must prepare, said Christiarycare Ciso Anahi Santiago before her appearance at last year’s Himss Cyber security forum.
Deepokakes pose a risk of fraud, disinformation and adhesion of attacks, but X-Phy, a developer of autonomous protection of end points, said on Monday that his fresh tool enables enterprises to verify the integrity of content, protecting the brand’s reputation and soothes confidential threats.
X-PPHY presented in the RSA His deep bogus tool in real time, which analyzes facial and voice anomalies using built-in Al algorithms and ensures detection of synthetic media in offline mode, said the company in a statement.
Red team release as a service
RTAAS introduces the scale and elasticity of crowdsourcing to the Red Syndrome to assist security leaders proactively identify fresh attack vectors and reduce the risk by leading, in accordance with Blog post Monday through Bugcrowd.
Because red teams are unused, the company said that it now offers three levels of commitment through its platform.
The basic level includes a simulation of a full spectrum attack and includes a final report with detailed guidelines and repair guidelines. The second level is a mixed approach to organizations that want to test the continuous rating of the red team and offers the addition of test prize tests, the company said. The third level is continuous RTAAS.
“Traditionally, red teams were only possible for large organizations that could either afford the services of security consultants, or had a lot of working force to manage the load load next to everyday operations – and even then the arrangements were too often possible to act,” said Dave Gerry, CEO of Bugcrowd.