Made with FlowPaper - Flipbook Maker
< Previousits identification becomes second nature. Similarly, Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides a comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices. Deep learning’s capabilities of identifying malware from any data source result in comprehensive protection on any device, any platform, and operating system. Injecting AI and Deep Learning “There are 500,000 new malware attacks every day. But in the last two years, there have been only six new end- to-end malware vectors developed by governments. 99.9 percent of the new attacks are a slight variation of one of these six. Because we operate a neural network that does not access the cloud, we can identify these threats and keep them from executing the attack,” Caspi adds. The company applies artificial intelligence’s deep learning to cybersecurity. Leveraging deep learning’s predictive capabilities, Deep Instinct’s on-device solution protects against zero-day threats and APT attacks with unmatched accuracy. Deep Instinct safeguards the enterprise’s endpoints and/or any mobile devices against any threat, on any infrastructure, whether or not connected to the network or the Internet. By applying deep learning technology to cybersecurity, enterprises can now gain unmatched protection against We’re raising the stakes when it comes to the level of actionable and accurate information that security teams can count on11 The Road Ahead Deep Instinct, the leader in deep learning- based cybersecurity, is the first company to back its product with a performance guarantee that ensures an incredibly low false positive rate, plus a ransomware warranty that is three times higher than any other cybersecurity company – up to $3 million per company for a single breach. With dramatically lower levels of false positive alerts, security teams can be much more efficient, lowering total cost of ownership (TCO). “We are offering a level of protection for our customers that goes beyond anything on the market today,” says Caspi. Deep Instinct endpoint protection reduces the likelihood of a cybersecurity breach, and saves significant time managing endpoints by using a proactive method of threat prevention, where most threats are stopped before reaching the execution stage, according to the commissioned study. In the coming year, the company is targeting a market opportunity as large as $17 billion that’s growing at roughly a 15 percent average annual rate — and the company is growing much faster than that. “We’re raising the stakes when it comes to the level of actionable and accurate information that security teams can count on, allowing them to be more productive in their ongoing battle against cyber attacks – and backing that with a warranty. That’s our mission and vision,” concludes Caspi. Our system is autonomous, can operate offline, and has the lowest rate of false positives of any cybersecurity solution unknown and evasive cyber-attacks from any source. Deep Instinct brings a completely new approach to cybersecurity enabling cyber- attacks to be identified and blocked in real-time before any harm can occur. Using a proprietary deep learning framework, Deep Instinct offers a zero-time threat prevention platform with multi-layer protection against any known or unknown threat from any file or fileless attack. Unlike detection and response-based solutions, which wait for the execution of the attack to react, or post-execution which achieves too little too late, the company’s Deep Learning based prevention-centric approach keeps customers protected, while dramatically reducing costs. The Blend of Expertise Deep Instinct’s highly experienced and interdisciplinary team of leading deep-learning scientists, ex-IDF, and special Israeli cyber units are revolutionizing cybersecurity technology by applying deep learning. The cybersecurity team includes veterans of the Israel Defense Forces’ cyber units, National Intelligence units, and executives from top global cybersecurity companies. “Our advanced deep learning algorithms and prediction models are developed by an interdisciplinary team of experienced mathematicians, data scientists, and deep learning experts who hold PhDs and/or MScs and have domain expertise in operational cybersecurity,” points Caspi. While explaining the value proposition of the company, Caspi talks about an instance when the company assisted a client to enhance their protection against ransomware, seeing that their traditional antimalware was not up to the task. Having first tried another vendor's product but finding it obtuse, overly-complex, and finding that it completely ignored some traditional lower-risk, the client looked for alternative vendors. The client was immediately impressed by Deep Instinct’s underlying deep-learning AI tech. The client’s environment is majority macOS, which has historically been only a minor target of malware, but that could change at any time. However, they also have a critical minority of Windows endpoints, extremely vulnerable to ransomware and other threats. Organizations similar in size to ours have suffered massive damage in the recent past. Deep Instinct has performed as expected, catching every next-gen threat thrown at it, handles traditional threats well, and all while having a minimal impact on endpoint performance. Deep Instinct’s console provides clear and understandable information and has only gotten better with recent updates. The endpoint clients are easily deployable en masse on both macOS and Windows. Under the Hood Since its inception, under the guidance of Guy Caspi, Deep Instinct has been creating a revolution in the cybersecurity space with one of the most innovative solutions available in the industry today. Caspi has spearheaded companies in senior positions through entire life cycles; from start-up, accelerate growth and up to IPO in Nasdaq. His in- depth knowledge in computer science Deep Learning AI assimilation in Cyber Security & Big Data Analysis, combined with a unique strong Go-To-Market execution experience are the key factors that are driving Deep Instinct to success today. Armorblox secures enterprise communications over email and other cloud office applications with the power of Natural Language Understanding. The Armorblox platform connects over APIs and analyzes thousands of signals to understand the context of communications and protect people and data from compromise U nlike the past, GRC is no longer just about checklists, apps, workflows or capabilities. Today’s GRC is more about building a true enterprise security system of intelligence that leverages technologies and includes natural language processing to glean critical risk insights from massive volumes of data. This enables managers to automatically cluster thousands of suppliers into different groups and determine the various risk suppliers. As a result, organizations can seamlessly take action proactively while enhancing the enterprises’ security portfolio. That’s where Enterprise Security is headed, building intelligent and proactive security solutions enabling a safer tomorrow for executives, boardrooms, and CEOs. As technology improves and innovative capabilities get added to this realm, in the long run, Enterprise Security solutions will become more functional while providing informed decisions. As more organizations invest in these technologies and system capabilities, they see proven results over the years. The market today is replete with a multitude of such solutions with innovation to assist companies in improving the business operations and productivity. With that in mind, in this edition of GRC Magazine, we bring to you “Top 10 Enterprise Security Solution Providers - 2021,” featuring leading solution providers offering ground-breaking security technology solutions. The companies featured in this issue exhibit profound industry knowledge, and in-depth expertise in delivering superior solutions. Cyware’s Enterprise Solutions are designed to promote secure collaboration, inculcate cyber resilience, enhance threat visibility and deliver needed control by providing organizations with automated context-rich analysis of threats for proactive response without losing the element of human judgment. DJ Sampath CEO Management Location Website armorblox.com Sunnyvale, CA Anuj Goel CEO Management Location Website cyware.com New York, NY Deep Instinct cyber security company is revolutionizing cyber security- Our deep learning AI cybersecurity platform learns to detect more types of cyber threats offering cyber security threat prevention & antivirus solutions that harness the power of advanced machine learning. Hyper Vigilance was founded by two military Service- Disabled Veterans with extensive experience in the Department of Defense, Intelligence Community, Department of State and private industry. We built Hyper Vigilance upon one primary mission: to deliver high- quality, effective cybersecurity and compliance solutions at an affordable cost. McAfee Corp is a leader in personal security for consumers. Focused on protecting people, not just devices, McAfee consumer solutions adapt to users’ needs in an always online world, empowering them to live securely through integrated, intuitive solutions that protects their families and communities with the right security at the right moment. Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email profoundly safer, restoring trust and bolstering business resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. Guy Caspi CEO Management Location Website deepinstinct.com New York, NY John Harrison Founder Management Location Website hypervigilance.com Fairfax VA Peter Leav CEO Management Location Website mcafee.com San Jose, CA Peter Bauer CEO Management Location Website mimecast.com London, UK One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration and privileged access management. Thales Trusted Cyber Technologies, a business area of Thales Defense & Security, Inc is a trusted, U.S. based source of cyber security solutions for the U.S. Federal Government. We offer holistic data protection solutions that deliver the same level of security whether deployed in enterprise, tactical or cloud environments Transmit Security is on a mission to transform the identity experience market. From onboarding to authentication to smart authorization for both customers and workforce across every channel, our technology reduces all forms of identity attrition and saves enterprises substantial costs. Openpath’s touchless access control makes getting into your building easier and safer than ever. Designed to improve security and convenience in the modern workplace, Openpath access control replaces outdated badges and fobs with encrypted mobile credentials. Patrick Nichols CEO Management Location Website oneidentity.com Aliso Viejo, CA Alex Kazerani CEO Management Location Website openpath.com Culver City, CA Lloyd Mitchell President Management Location Website thalestct.com Abingdon, MD Mickey Boodaei CEO Management Location Website transmitsecurity.com Boston, MA MIMECAST Delivering the Pervasive Security Strategy A s the majority of businesses are increasingly moving to the online world, more cyberattacks keep happening all over the globe. Remote workers will be the focus of cybercriminals through 2021. At this juncture, traditional security approaches are no longer effective. Attack methods are quickly evolving and growing more sophisticated, targeted and dangerous. Ignoring these advanced threats, and sticking with legacy security capabilities or deploying a defense-only security strategy, puts your data, business operations, employee productivity, and reputation at risk. This ultimately points out that it’s time for a new approach, just like how Mimecast—a cloud cybersecurity service provider for email, data, and web—is fighting the new threat landscape. “Businesses must approach cyberdefense in a holistic and integrated fashion to increase their odds of denying adversaries the outcome they seek,” begins Peter Bauer, CEO. Mimecast improves the way companies manage confidential, mission-critical business communication and data. The company develops proprietary cloud architecture to deliver comprehensive email security, service continuity, and archiving in a single subscription service. Its goal is to make it easier for people to protect a business in today’s fast- changing security and risk environment. Mimecast Email Security , which includes Targeted Threat Protection: URL Protect, Attachment Protect, and Impersonation Protect, is a set of security services designed to help businesses defend against advanced email-borne threats. This service defends against impersonation attempts, malicious URLs, and malware attachments, as well as spam and more commoditized viruses. “Mimecast has seen a 5.2X reduction in the propensity of its user base to click on a bad link after engaging with the company,” adds Bauer. To maximize a company’s protection against email- borne threats, Mimecast combines internally-developed and 17 third‐party detective analytics with multiple internal and external threat intelligence sources. This provides a multi‐layered inspection system that is effective against both widely used, commodity attacks as well as highly targeted attacks. Mimecast’s integrated system collects a vast amount of threat intelligence to make your cyber resilience team more informed and corporate security systems smarter. Mimecast helps organizations adapt by leveraging third‐party threat intelligence, continually assessing and deploying leading technologies, conducting ongoing threat analysis, automating remediation services, and delivering inline user education to help employees be more aware and cautious. Before an inbound email ever makes it to an organization’s email system, whether it is on‐premises or in the cloud, Mimecast provides a deep inspection system to detect the ways phishers and spammers try to access and fool native email security system as well as the users. An instance that highlights Memecast’s value proposition in the security solutions industry is when the company assisted Bidfood—one of New Zealand’s largest wholesale food distributors. It services all sizes of businesses, from small cafes to major chains. Bidfood is required to keep certain communications around food safety for a minimum of 10 years. With such a huge amount of information residing in the system, finding a way to easily archive, manage and access that data when required had become a massive task. Mimecast helped Bidfood on a number of fronts, most notably by easing the management and access of its considerable archive, tightening up its email security so that malicious emails are intercepted and dealt with before they reach employee inboxes. Today, Mimecast is on a mission to reduce the risks users face from email, and support in reducing the cost and complexity of protecting users by moving the workload to the cloud. The company expanded its technology portfolio in 2019 through a pair of acquisitions. With the acquisition of Segasec, Mimecast can provide brand exploit protection, using machine learning to identify potential hackers at the earliest stages of an attack. “We believe these acquisitions allows Mimecast to continue to evolve our Email Security 3.0 strategy and provide the best protection,” Bauer concludes. We deliver a fully cross- functional authentication solution that is agile, intuitive, and easy to use Peter Bauer, CEOCYBERSECURITY DURING COVID-19 AND BEYOND T he cyberattack risks faced by companies using outmoded security methods have been intensifying in recent years. But those challenges have increased dramatically with the advent of the COVID-19 pandemic. With so many key employees now working remotely, sensitive data needs to be shared outside a company’s walls. This includes employee data, intellectual property, corporate financial data, and other proprietary information. It also includes data on customers, their purchases, and the performance of products in the field. Cybercriminals have seized this opportunity by launching phishing schemes that lure email users to click on malicious files. Many of these schemes have been COVID-19 related, and they have ranged from audio files impersonating voicemail targeting Office 365 users to emails purporting to be from company executives. Meanwhile, the number of remote desktop protocol (RDP) servers exposed to the internet has risen sharply from 3 million in January 2020 to more than 4.5 million in May, and attacks targeting them were up more than 300% in the United States in both March and April. Further complicating the job for security professionals, the ubiquity of bring-your-own-device (BYOD) work protocols allows cyber attackers to leverage outdated and unpatched operating systems or insecure apps on employee machines. For example, a vulnerability recently discovered in the popular iOS Mail app may have been exploited for Insights19 two years (and possibly nearly eight). Companies also must defend against man-in-the-middle attacks, in which an attacker secretly gets in between a user and an accessed web service. A compromised Wi-Fi system, for example, could let an attacker harvest any information a user sends, including passwords. Companies also face newer, more sophisticated, and pervasive threats. There is a rising incidence of zero-day threats exploiting unpatched software vulnerabilities. Additionally, malware attacks, including keyloggers and ransomware, are leveraging and paralyzing corporate networks. More and more malware seeks to connect IoT devices to botnets that can then create massive distributed denial of service (DDoS) attacks against companies, governments, and institutions, resulting in some of the biggest shutdowns across industries ever seen. The solution: Adaptable cybersecurity Cybersecurity has long been due for a rethink that transforms the concepts of usernames, passwords, and IP addresses, turning them into practical elements that support their underlying functions. The emerging digital ecosystem only became possible as the traditional elements of computing — mainframes, operating systems, applications, and networking — became atomized, abstracted, and virtualized. Accordingly, to protect themselves and become more resilient in the face of cybercrime, companies need to consider the broader ecosystem and apply adaptable cybersecurity. Many security practices are still based on the old concept of trust but verify, yet today data and applications extend far beyond the company’s walls and blind trust is a luxury that no business can afford. Instead, cybersecurity should focus on authenticating identities and devices in the context of requests for any protected resource. Such resources broadly include anything that would constitute a risk to the business if it were compromised. This means data, networks, and workloads, but also their data flows and the underlying infrastructure that supports them. Legacy security is not robust enough to secure a contemporary IT ecosystem consisting of remote workers, workplaces, partners, and customer interactions, or to protect the data employees may need to access remotely. In the past, security was based on known employees working from company offices or on a laptop using a VPN. Security functions focused on external threats. Internal errors, threats, and leaks were not taken as seriously. When only company desktops, printers, and on-premises data centers required permissions, that kind of security could manage the challenge. But new vulnerabilities arrive with each advance in technology. Not only are employees using their own devices — smartphones, laptops, tablets, and desktops — but companies depend on the operating technology of internet-connected products. Moreover, individual departments are frequently deploying their own robots and other automated entities, outside the umbrella of corporate IT, and their priorities and security diligence may be inconsistent. That’s why security must be addressed in the corporate IT architecture. A secure future: To mitigate risk to their business, most enterprises are continuously investing in new tools and technologies. Leading-edge, risk-focused, and context-aware security is increasingly available as a service. Forward-looking companies take a never trust, always verify approach to access their data and processes, acknowledging that threats evolve and require the capabilities available in advanced technology. Through leveraging such services, a business can embrace a more resilient and adaptable cybersecurity model, positioning itself to survive new challenges and take advantage of the opportunities in emerging digital ecosystems. Next >