Booth #South-607

Invincea at RSA Conference

Invincea is the machine learning next-generation antivirus company with the #1 malware protection rate in the industry. Created by data scientists, X by Invincea has consistently rated highest in performance metrics in third party testing. In addition, X by Invincea received the highest scores possible in attack detection and prevention effectiveness criteria in the Forrester Wave 2016 Endpoint Security Report.

With X by Invincea, now companies have the ability to detect and stop malware – even never seen before variants – without relying on signatures.

Stop by booth #South-607 at RSA Conference to see a live test drive of X by Invincea defeating malware in the wild. You’ll also get a chance to see product demos, meet our renowned security experts, and bring your toughest questions.

Schedule a Meeting

We know from previous years that schedules can quickly become packed during RSA Conference – and we don’t want to miss seeing you! Please fill out the form below to request a meeting, and someone will be in touch soon to schedule a time.


Map of Moscone Center,
South Hall

Click for larger image

Save the Date for #BeatTheBreach 2017 –
February 14, 2017 | 5:00pm – 9:00pm

RSA Conference attendees: Save the date for the evening of February 14, 2017, when we’ll be hosting the third annual #BeatTheBreach at 111 Minna Gallery. Registration is now open; you can register here.

Register to See “Nothing but Thieves” @ RSA Conference

Don’t miss the VIP concert during RSA Conference that everyone is going to be talking about! Register now to rock out to the hit band “Nothing but Thieves” perform at Mezzanine in San Francisco on Monday, February 13th. Learn more and register here.

About X by Invincea

X by Invincea machine learning driven next-generation antivirus protects endpoints by detecting and blocking known and unknown malware – without signatures- automatically and in real-time. X prevents malware from executing no matter where the malware originates, including weaponized Office documents, or spear phishing email links and attachments. It also provides visibility to your security teams without overwhelming them with data or requiring additional resources.