“We have already spent a fortune on our perimeter defenses – and still we don’t feel safe”

I hear that a lot and there’s a couple of good reasons for this instinctive fear:

1)The perimeter wall might be fit-for-purpose to defend against traditional attacks on the traditional business.  But the adversary has moved on – now he targets the mobile surface, the IoT surface – where the old castle walls just don’t help because they’ve been built for a different kind of battle.

2)You’ve already been breached.  The attacker is now inside, the malware is in position, the socially conditioned user is enabled and the private credentials have been stolen.  The cost of exhaustive, manual searching is prohibitively high – so many logs, so many files, so many systems.

So the technology architects here have been working hard to provide comfort and confidence to our customers for some time… deploying advanced security for the new wave of devices that sit outside the boundaries of the traditional network perimeter.  We’ve built a new type of defensive wall for this new frontier – because out there, these endpoints exhibit different traits…

  • They might move around a lot. From cell tower to cell tower, from Wifi to LTE
  • They might be used for business and personal reasons requiring careful data separation
  • They might be needing access to, or are themselves transmitting, sensitive data in unsecure environments
  • They might have limited battery and bandwidth capacity? Fit?
  • They might be on any one of hundreds of device, operating system and version combinations

…so we built a tailored solution, that’s more like a plasma shield – it is a more advanced repellent and far more maneuverable than the old stone wall that was built for traditional endpoints.  We call it SDM – Secure Device Management.

Inside the shield, the user must be totally enabled – no passwords to re-enter, secure communications not dropping or lagging, full use of the device and its increasingly powerful features.

Then this is how we search the grounds – our spotlight concentrates on the very specific traffic from smartphones, laptops, body cams, tablets, industrial sensors…   All the network traffic from protected devices must be completely visible and prioritized for inspection.  Any traffic that is alarming, well – it alarms, and the device is precisely pinpointed and automatically quarantined if the severity and controls dictate.

This week we mark the release of  Cyber adAPT 2.0.  What additional problem is this solving?  Well another thing we hear a lot is:

“Give me that solution without consultants, software engineers or any more hardware.”

Now our customers can have all of Cyber adAPT’s protection from the cloud, or a virtual machine to run inside your own network on your preferred hardware. That’s 2.0 in a nutshell and I’m delighted to see it make an entrance!

Some headlines:

  • High grade security for data processing in a SaaS Environment
  • No on-premises hardware required means lower cost
  • 3 click, 30 second enrollment process brings even faster protection
  • Full virtualization brings flexibility to react quickly to customer needs
  • Deployment options and low cost entry models including AWS and Azure
  • Supports trial and pilot customers by providing simple, ring-fenced environments

The press release is here, product information here and to book a trial or demo of the product, click here.


Enter your details and we’ll get back to you