Cybersecurity has an asymmetry of economics - defenders must defend everything but attackers need find just one-way in … and it need not be one seen before. Attackers are updating methods more, attacking more and impacting more devices and people.
The harms associated with attacks are escalating from legacy data breaches, to DDoS and ransomware, to potentially physical damages, injuries, deaths or debilitation of critical infrastructure.
Likely you already have legacy solutions from FireEye, Symantec, McAfee and others, so already have in place the layers of defense that these established vendors offer.
Detailed below are a selection of 5 emerging tech partners that add to your security posture, complement existing infrastructure.
That these companies leverage automation is hugely important since even the most deep-pocketed DoD command, government agency, West Coast tech company or Wall Street Bank cannot simply keep adding cybersecurity staff or contractors to meet mushrooming cybersecurity needs.
CyVision Cauldron - Automated cybersecurity assessment visualization
New visualization and modeling technology automates a key aspect of enhanced cybersecurity assessments, allowing highest priority threats to be quickly identified and remediated first.
InLitics - Automated cognitive analytics
InLitics applies a cognitive analytics approach to the neglected people side of critical infrastructure protection. It automatically leverages and interlaces multi-discipline human dimensions for threat and vulnerability detection against such data as still photos, video feeds (images and/or voice), emails, text, or other data extractions.
Packet Viper - Automated network traffic control
New IP filtering technology sits outside of existing firewalls as an undetectable in-line bridge that can automatically reduce network traffic, logging and alerts up to 70%, protect from flooding and DDoS, mitigate risks from bots and proxies, with faster threat detection.
RunSafe Security - Automated cyber hardening
RunSafe is a pioneer in automated cyber hardening with the ability to make embedded system and devices functionally identical but logically unique. Its patented binary stirring technology automatically renders threats inert by eliminating attack vectors, significantly reducing vulnerabilities and denying malware the uniformity required to propagate.
Sepio - Automated detection of rogue and ghost hardware devices
Sepio works with the neglected physical side of cybersecurity. Its unique behavior-detection software suite automatically identifies all connected hardware devices in a network — including nefarious ones that compromise IT infrastructure.
About the author
Simon is an industry recognized expert in cybersecurity, mobility and IoT, part of a growing family of Washington DC-based cybersecurity startups including RunSafe Security and 202 Partners. He is a member of SAE’s Cybersecurity IoT Committee and a contributing author of their new book “Cybersecurity for Commercial Vehicles". RunSafe’s IP was developed as part of DARPA’s High-Assurance Cyber Military Systems (HACMS) program of cybersecurity for military vehicles, drones and medical devices. Simon also worked with Apple and Samsung in hardening their mobile devices for DoD and government use.
Previously, he was VP of Sales at Kaprica Security (acquired by Samsung), Mobile Program Director, DMI, market leader in enterprise managed mobility and Director of Sales at Thursby Software, market leader in strong iPhone security. Prior executive sales and management roles in the US and EMEA include Red Hat, HP, Capgemini, a $9B hedge fund, a $50MM dot com and a background in nuclear software engineering. He holds a BS in Physics from U-Manchester, England, a MS in Law & Cybersecurity from U-Maryland Carey Law, CISSP, CEH and CIPP/US cybersecurity and privacy certifications.