CEO Kirsten Bay outlines her approach to a 100-day cybersecurity plan for the new administration.
“We have already spent a fortune on our perimeter defenses – and still we don’t feel safe”
I hear that a lot and there’s a couple of good reasons for this instinctive fear:
1)The perimeter wall might be fit-for-purpose to defend against traditional attacks on the traditional business. But the adversary has moved on – now he targets the mobile surface, the IoT surface – where the old castle walls just don’t help because they’ve been built for a different kind of battle.
2)You’ve already been breached. The attacker is now inside, the malware is in position, the socially conditioned user is enabled and the private credentials have been stolen. The cost of exhaustive, manual searching is prohibitively high – so many logs, so many files, so many systems.
So the technology architects here have been working hard to provide comfort and confidence to our customers for some time… deploying advanced security for the new wave of devices that sit outside the boundaries of the traditional network perimeter. We’ve built a new type of defensive wall for this new frontier – because out there, these endpoints exhibit different traits…
…so we built a tailored solution, that’s more like a plasma shield – it is a more advanced repellent and far more maneuverable than the old stone wall that was built for traditional endpoints. We call it SDM – Secure Device Management.
Inside the shield, the user must be totally enabled – no passwords to re-enter, secure communications not dropping or lagging, full use of the device and its increasingly powerful features.
Then this is how we search the grounds – our spotlight concentrates on the very specific traffic from smartphones, laptops, body cams, tablets, industrial sensors… All the network traffic from protected devices must be completely visible and prioritized for inspection. Any traffic that is alarming, well – it alarms, and the device is precisely pinpointed and automatically quarantined if the severity and controls dictate.
This week we mark the release of Cyber adAPT 2.0. What additional problem is this solving? Well another thing we hear a lot is:
“Give me that solution without consultants, software engineers or any more hardware.”
Now our customers can have all of Cyber adAPT’s protection from the cloud, or a virtual machine to run inside your own network on your preferred hardware. That’s 2.0 in a nutshell and I’m delighted to see it make an entrance!
Enter your details and we’ll get back to you