SlideShare uma empresa Scribd logo
1 de 10
Appthority
Appthority
Appthority helps people learn what apps do and what risks they contain




             The Authority in App Security™

“Yes, You Can Have Federal Grade Mobile Data Security
Too!”
                           Appthority © Copyright 2012 All Rights Reserved                   1
          contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority
Most Innovative of RSA Award
Named “The Most Innovative Company of RSA Conference® 2012”




“Appthority and its Appthority Platform won the award based on the current
and future need to secure mobile applications, as well their ability to build an
established partner network and demonstrate robust customer traction.”
– RSA Innovation Sandbox Judging Committee
                             Appthority © Copyright 2012 All Rights Reserved                   2
            contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority team
Appthority
Management team from such companies as




With top notch investors with backgrounds funding successful Enterprise
security companies
                                                  Steve Krausz invested in such Enterprise security
                                                  companies as CheckPoint Software, Imperva, Vontu,
                                                  ThreatMetrix, Trusteer, and CipherTrust



                                                  Ray Rothrock invested in such Enterprise security
                                                  companies as CheckPoint Software, Imperva, Vontu,
                                                  PGP, WholeSecurity, RedSeal, CoreTrace, and
                                                   CloudFlare
                            Appthority © Copyright 2012 All Rights Reserved                           3
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority challenges
Customer
Enterprises can’t create or enforce mobile policy nor comply with
regulatory requirements if they don’t know what risks the apps contain
  • Explosion in apps and exponential growth in malware
  • Existing mobile security expertise scarce within the Enterprise
  • No one knows which apps are safe
  • Legacy security technologies are not keeping up with the
    changes in mobile
  • New apps being released faster than they can be manually
    reviewed
  • Cost to determine if an individual app is safe is prohibitively
    expensive and everyone has a different opinion of “safe”



                            Appthority © Copyright 2012 All Rights Reserved                   4
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority
Why use Appthority in EASE?
Before distributing apps inside the Enterprise, the apps need to be checked
by Appthority
  • Best-in-class behavior-based malware detection
      •   Works on Android and iOS apps
      •   Reduces supply-chain risk from third-party app developers
      •   Superior protection when paired with Mocana- Appthority keeps
          malware away from VPN clients
  • Risk management approach to screening mobile apps
      •   Allows Enterprises to reject or adjust apps that don’t meet Enterprise
          policy
      •   Helps Enterprises understand what the mobile apps are really
          doing and what Enterprise data they have access to
      •   Easy-to-use Appthority App Inspection within EASE


                            Appthority © Copyright 2012 All Rights Reserved                   5
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority Platform
Appthority
Only Appthority can scan iOS apps for malware & risky behaviors seen in
Android
  • Screens mobile apps (Android and iOS) in minutes, in
    the cloud
  • Integrates w/ Enterprise solutions like Apperian and Mocana
  • Detects attributes in apps, such as:
      •   Malware (behavior-based NOT hash-based, detects new & never
          before seen malware)
      •   Location tracking (even without permission)
      •   Ad networks
      •   Data leakage risks
      •   Cryptographic risks



                            Appthority © Copyright 2012 All Rights Reserved                   6
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority in Apperian
Workflow
Simply click the magnifying glass in the Apperian Applications console to
begin inspecting apps with Appthority! Contact your Apperian account
manager for eval access today!




 Best practice: Before distributing apps to employees, ensure you’ve
                               Appthority © Copyright 2012 All Rights Reserved                7
 inspected contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
           the apps!
Appthority
Example inspection report




                      Appthority © Copyright 2012 All Rights Reserved                   8
     contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority and best practices
Summary
Don’t distribute software within the Enterprise, without inspecting what the
software does!
  • All apps should be inspected, for malware and policy
    compliance, prior to:
      •   Distributing the apps into the Enterprise
      •   Adding VPN clients into the apps
  • Appthority helps organizations answer:
      •   Are third-party file sharing systems like DropBox used by the app
      •   Does the app take the contact book off the device?
      •   Does the app location track users (with or without permission)?
      •   Is malware present?
      •   Does the app communicate with known sites that serve malware?



                             Appthority © Copyright 2012 All Rights Reserved                   9
            contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority
Q&A
Wrap-up and Q&A. Questions? Thank you!




                The Authority in App Security™

Thank you!
– Anthony Bettini, Founder & CEO, Appthority

                              Appthority © Copyright 2012 All Rights Reserved                   10
             contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Mais conteúdo relacionado

Destaque

Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
georgb2789
 
Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011
Sergey Manvelov
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных кресел
Andreykireenkov
 
4.3 port.-buford and my room
4.3 port.-buford and my room4.3 port.-buford and my room
4.3 port.-buford and my room
pbwhite
 
Evaluation by lyon owen
Evaluation by lyon owenEvaluation by lyon owen
Evaluation by lyon owen
SHubbard1
 

Destaque (15)

Dian suprihatin pgmi vi-a
Dian suprihatin pgmi vi-aDian suprihatin pgmi vi-a
Dian suprihatin pgmi vi-a
 
The next wave: understanding how IT developments are changing the future of m...
The next wave: understanding how IT developments are changing the future of m...The next wave: understanding how IT developments are changing the future of m...
The next wave: understanding how IT developments are changing the future of m...
 
Slide blog
Slide blogSlide blog
Slide blog
 
Fleming college
Fleming collegeFleming college
Fleming college
 
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MDSo You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
 
Infectious // September // 2010
Infectious // September // 2010Infectious // September // 2010
Infectious // September // 2010
 
Small Art Promotion Update
Small Art Promotion Update Small Art Promotion Update
Small Art Promotion Update
 
CMA Sponsor PRG
CMA Sponsor PRGCMA Sponsor PRG
CMA Sponsor PRG
 
Ejemplo aplica zoom
Ejemplo aplica zoomEjemplo aplica zoom
Ejemplo aplica zoom
 
Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных кресел
 
Faridabad(1)
Faridabad(1)Faridabad(1)
Faridabad(1)
 
4.3 port.-buford and my room
4.3 port.-buford and my room4.3 port.-buford and my room
4.3 port.-buford and my room
 
Evaluation by lyon owen
Evaluation by lyon owenEvaluation by lyon owen
Evaluation by lyon owen
 

Mais de Apperian

Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
Apperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
Apperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
Apperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
Apperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
Apperian
 

Mais de Apperian (20)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Federal Grade Security with Appthority

  • 1. Appthority Appthority Appthority helps people learn what apps do and what risks they contain The Authority in App Security™ “Yes, You Can Have Federal Grade Mobile Data Security Too!” Appthority © Copyright 2012 All Rights Reserved 1 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 2. Appthority Most Innovative of RSA Award Named “The Most Innovative Company of RSA Conference® 2012” “Appthority and its Appthority Platform won the award based on the current and future need to secure mobile applications, as well their ability to build an established partner network and demonstrate robust customer traction.” – RSA Innovation Sandbox Judging Committee Appthority © Copyright 2012 All Rights Reserved 2 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 3. Appthority team Appthority Management team from such companies as With top notch investors with backgrounds funding successful Enterprise security companies Steve Krausz invested in such Enterprise security companies as CheckPoint Software, Imperva, Vontu, ThreatMetrix, Trusteer, and CipherTrust Ray Rothrock invested in such Enterprise security companies as CheckPoint Software, Imperva, Vontu, PGP, WholeSecurity, RedSeal, CoreTrace, and CloudFlare Appthority © Copyright 2012 All Rights Reserved 3 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 4. Appthority challenges Customer Enterprises can’t create or enforce mobile policy nor comply with regulatory requirements if they don’t know what risks the apps contain • Explosion in apps and exponential growth in malware • Existing mobile security expertise scarce within the Enterprise • No one knows which apps are safe • Legacy security technologies are not keeping up with the changes in mobile • New apps being released faster than they can be manually reviewed • Cost to determine if an individual app is safe is prohibitively expensive and everyone has a different opinion of “safe” Appthority © Copyright 2012 All Rights Reserved 4 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 5. Appthority Why use Appthority in EASE? Before distributing apps inside the Enterprise, the apps need to be checked by Appthority • Best-in-class behavior-based malware detection • Works on Android and iOS apps • Reduces supply-chain risk from third-party app developers • Superior protection when paired with Mocana- Appthority keeps malware away from VPN clients • Risk management approach to screening mobile apps • Allows Enterprises to reject or adjust apps that don’t meet Enterprise policy • Helps Enterprises understand what the mobile apps are really doing and what Enterprise data they have access to • Easy-to-use Appthority App Inspection within EASE Appthority © Copyright 2012 All Rights Reserved 5 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 6. Appthority Platform Appthority Only Appthority can scan iOS apps for malware & risky behaviors seen in Android • Screens mobile apps (Android and iOS) in minutes, in the cloud • Integrates w/ Enterprise solutions like Apperian and Mocana • Detects attributes in apps, such as: • Malware (behavior-based NOT hash-based, detects new & never before seen malware) • Location tracking (even without permission) • Ad networks • Data leakage risks • Cryptographic risks Appthority © Copyright 2012 All Rights Reserved 6 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 7. Appthority in Apperian Workflow Simply click the magnifying glass in the Apperian Applications console to begin inspecting apps with Appthority! Contact your Apperian account manager for eval access today! Best practice: Before distributing apps to employees, ensure you’ve Appthority © Copyright 2012 All Rights Reserved 7 inspected contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com the apps!
  • 8. Appthority Example inspection report Appthority © Copyright 2012 All Rights Reserved 8 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 9. Appthority and best practices Summary Don’t distribute software within the Enterprise, without inspecting what the software does! • All apps should be inspected, for malware and policy compliance, prior to: • Distributing the apps into the Enterprise • Adding VPN clients into the apps • Appthority helps organizations answer: • Are third-party file sharing systems like DropBox used by the app • Does the app take the contact book off the device? • Does the app location track users (with or without permission)? • Is malware present? • Does the app communicate with known sites that serve malware? Appthority © Copyright 2012 All Rights Reserved 9 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 10. Appthority Q&A Wrap-up and Q&A. Questions? Thank you! The Authority in App Security™ Thank you! – Anthony Bettini, Founder & CEO, Appthority Appthority © Copyright 2012 All Rights Reserved 10 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Notas do Editor

  1. http://www.businesswire.com/news/home/20120228005949/en/Appthority-Named-%E2%80%9CMost-Innovative-Company-RSA%C2%AE-Conference