U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Archived Content

In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.

S&T's Exhibiting at RSA Conference 2018

The Department of Homeland Security (DHS), Science and Technology Directorate (S&T) Cyber Security research and development (R&D) program develops innovative solutions to meet a broad array of cybersecurity challenges across the U.S. government, international partners, academia and the private sector.  While at RSA, S&T will demonstrate 13 mature transition-ready technologies ready for pilot deployments and commercialization into the marketplace.

Visit S&T's booth and tour the entire exhibit hall by registering for a complimentary exhibits-only pass and entering the special S&T guest code: X8EDEPAR

Transition-Ready Technology for pilots, licensing and commercialization.  RSA 18 San Francisco, April 16 – 20 at the Moscone Center. Visit S&T booth 1839. Follow the conversation at hashtag #RSAC on Facebook, Twitter or Linkedin  dhsscitech DHS S&T Logo

Exhibit Information

Dates: April 16 - 19, 2018

Booth 1839| Moscone Center | San Francisco, CA

Expo Hours

Monday, April 16 5:00 PM - 7:00 PM (Welcome Reception)
Tuesday, April 17 10:00 AM - 6:00 PM
Wednesday, April 18 10:00 AM - 6:00 PM
Thursday, April 19 10:00 AM - 3:00 PM

Technology Demonstrations

  • AI-Analyst—A technology to accelerate cyber-analysis workflow processes.
  • Akatosh—A tool that runs automated, real-time forensic analysis of endpoints after malware-attacks and other cybersecurity incidents.
  • APE—An intrusion-prevention system for Android™ devices.
  • Bastille Networks—A solution that detects and localizes radio-frequency (RF) devices and identifies RF-borne threats, vulnerabilities and active attacks.
  • Code Dx—An automated application vulnerability management tool.
  • Mobile Endpoint Security—An app that automatically detects when a mobile device connects to a new network and runs health checks to ensure the network is behaving properly.
  • PEACE—A tool that protects end-point devices in an enterprise network by intercepting all new network connections and vetting them.
  • ReCon—A system that analyzes network traffic in real time to identify and block or change privacy leaks using machine learning.
  • Red Hat Mobile Application Platform—An integrated platform that enforces end-to-end security for mobile solutions and reduces the cost of maintaining mobile security policies.
  • SecureCAST—A cloud-based service that scores telephone calls in real-time to determine if they are authentic, spoofed and/or part of an attack such as Telephony Denial of Service.
  • Spoofer—A tool that measures and increases the deployment of Source Address Validation across the global internet.
  • StreamWorks—A technology that supports continuous detection of emerging patterns on streaming data.
  • Verified.Me—An identity management tool that separates log-in capabilities from attribute delivery using blockchain.

Get Updates + Follow the Conversation on Social Media

Whether you’re at the conference or in your office, you can stay up to date on S&T's activities at RSA when you follow it on Twitter, LinkedIn and Facebook using the hashtag #RSAC.

Last Updated: 08/02/2024
Was this page helpful?
This page was not helpful because the content