The 10 Best Performing Cyber Security Solution Providers 2017

Page 1

December 2017 December 2017 www.insightssuccess.com www.insightssuccess.com The way of business solutions The way of business solutions The Expert in Domain Data Solution Providers 2017 10 The Best Performing Data Center Security: Controlling Possible Threats Info Network How to Minimize Cyber-Attacks On Your Organisation Threat O Cure Traits to Possess the Best Enterprise Security Secure Vision Educating Employees to Minimize the Risk of Cyber-Attacks Editors’ Perspective IT and Communication Trends for Critical Infrastructure Maven’s Mentorship What GDPR forgets: The physical security Expert’s Insight Managing Corporate Communications on Mobile Devices Executive Voice

Cyber Security: Prevention is Always Better than Cure

Editorial

Nowadays,peoplearebecomingmoreandmoredependenton

theworldofweb,whereincommercialactivities,business transactions,andgovernmentservicesarecomprehended. Thisoverdependencyovertheinternethasledtoasignificantrisein newcyberthreatsandinformationsecurityissueswhicharebeing heavilytakenadvantageofbycybercriminals.Asarelevant example,recentcyber-attacksby“Petya”and“Wannacry”hasmade leadersacrosstheworldvulnerableandenforcedthemtothinktwice abouttheircyber-securityinfrastructure.WithInternetbreaches touchingmillionsofdollars,accessibilityofthesebackdoorsmake criminalslooklikegeniuses,andthesecuritymavenslikeKeystone Kops.Unlessauthoritiescaneffectivelypoliceitsentrances, cyberspacecouldgoontobecomeano-gozone.Theriskissohigh thatmostrecentlyeventheFBIalsocameundertheattackfromthe cybercriminals;theattackexposedasmuchas20,000agency employees’personalonlinerecords,andanother9,000Department ofHomelandSecurityemployeeswerealsoaffected.Backin2004, theglobalcybersecuritymarketwasworth$3.5billionandexpected tobeworthmorethan$120billionwiththeendof2017.Hence, withinsuchashortspanoftimethecybersecuritymarketgrewas muchas35x.

Still,manyoftheorganizationstodayarehesitanttoannouncethe incrementoftheircybersecuritybudgetsduetobreachestheyhave alreadysuffered,mainlyduetothefearsofreputationaldamage. StillorganizationssuchasJ.PMorganChase&Cohasstatedthatit hasdoubleditsannualbudgetforcybersecurityandBankof Americahasannouncedthatithasanunlimitedcybersecurity budget.TechgiantssuchasMicrosoftCorphasalsoannouncedthat itwillcontinuetoinvestmorethan$1billionannuallywhenit comestocybersecurityandR&D.

Spendingindustryexpertsarepredictingthatcybercrimeswill continuetoriseevenfurther,andwillcostbusinessesmorethan$6 trillionannuallyby2021.Whilethesethreatscertainlypose asignificantchallengetoITprofessionalsacrosssectors,the determinationwillonlyincreaseastechnologiessuchascognitive computing,bigdataanalytics,andtheIoTfurtherdevelopand influenceourincreasinglyconnectedworldinunprecedentedways. Enterprisescandotheirpartbysharingthreatdataandinvestingin solutionsandinfrastructuresthataresecurebydesign.Asalways, usersshouldexhibitgoodpasswordhygieneandavoidopening suspiciousorunsolicitedemailsandattachments.

Kaustav Roy
sales@insightssuccess.com Database Management Steve Technology Consultant Swapnil Patil Circulation Manager Robert Research Analyst Jennifer Andy, David, Peter, Kevin, John, Brian Editor-in-Chief Pooja M. Bansal Ariana Lawrence Senior Editor Co-Editors David Smith Art & Design Director Amol Kamble Co designer Alex Noel Visualiser David King Business Development Manager Mike Thomas Business Development Executives Marketing Manager William Nick Adams Art Editor Shweta Shinde Picture Editor Rahul Kavanekar Managing Editor Kaustav Roy Jacob Thomas Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com Insights Success Media and Technology Pvt. Ltd. Ofce No. 513, 5th Floor, Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017 Phone - India: 020-69400110, 111, 112 Email: info@insightssuccess.in For Subscription: www.insightssuccess.in Corporate Ofces: December 2017 Copyright © 2017 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights success. Reprint rights remain solely with Insights Success. Printed and Published by Insights Success Media and Technology Pvt. Ltd. Sourav Mukherjee
Info Network Controlling Possible Threats Expert’s Insight What GDPR forgates: The physical security Maven’s Mentorship IT and Communication Trends for Critical Infrastructure 28 40 14 Editor’s Perpective Educating Employees to Minimize the Risk of Cyber-Attacks 34 22 18 C O V E R S T O R Y Whois API Inc.: The Expert in Domain Data 42 Threat O Care How to Minimize Cyber-Attacks on your Organization Enterprize concern Traits to Posses the Best Enterprise Security Executive Voice Managing Corporate Communications on Mobile Devices 08
certgate GmbH: Protecting Users Since Inception 20 onShore Security: Protecting the Freedom of Information by Revolutionizing Cyber Defense and Governance 24 Seceon: Detecting and Stopping Threats that Matter 26 ShadowDragon: Solving the Challenges of Modern Investigations 32 Silent Circle: Securing Enterprise Communications in the Cyber-Espionage Era 38 C O N T E N T S

TacklingtheWoesofCyberSecurity

NowadayspeoplearebecomingmoreandmoredependentonInternet,wherevariouscommercial

activities,variousbusinesstransactions,andgovernmentservicesarecomprehended.However,with moresuchusage,theworldhasseenasharpriseincybercrimesandinformationsecurityissues. Unfortunately,thewebhasbecomeavaluablevehicleforcriminalstoanonymouslypreyonvictimsthrough cyberbreachesandcorporateespionage.Thedarkwebnowprovidesplatformsfornefariousbusinessesoperations ofallkindsfromidentitytheft,tomoneylaundering,tohumantrafficking. Ifthat’snotall,EdwardSnowdens’ latestleakshavepointedoutthatvariousintelligenceagenciesacrosstheworldwereusingGoogle,Yahoo, Microsoft,Facebook,Twitter,andvariousotherglobalservicestokeepeyesontheirusers.Snowdens’documents evenrevealedthat,intelligenceagencieshacktheirdomesticandforeigncompaniestowiretaptheirusers.

So,thedireneedforcompetentcybersecuritysolutionprovidershasmadeustolookfor“The10Best PerformingCyberSecuritySolutionProviders2017”.OnourcoverpagewehaveWhoisAPI,whichisabig dataandAPIcompanythatprovidesdomain,whois,dns,ip,andthreatintelligencedatatoavarietyofindustries. Further,wehavecertgateGmbH,oneoftheleadingGermanbasedsecuritysolutionproviders,focusedon mobilesecurityproductsandsolutions.OnShoreSecurity,whichisonamissiontoprotectthefreedomof informationbyrevolutionizingcyberdefenseandgovernance.Seceon,OTMprovidesasimple,fullyautomated approachtodetectingandstoppingthethreatsthatmatter ShadowDragon,whodevelopsdigitaltoolsthat simplifythecomplexitiesofmoderninvestigationsthatinvolvemultipleonlineenvironmentsandtechnologies. SilentCircle,whoseenterprisemobileprivacyplatformdeliversflexible,modular,no-touchdeploymentwith zeromaintenance,hardwareoradditionalmanpowerrequired. So,flipthroughthepagestomoreaboutcyber-crimes.Donotmissoutarticlesviz,‘TraitstoPossesstheBest EnterpriseSecurity’,‘EducatingEmployeestoMinimizetheRiskofCyber-Attacks’,‘DataCenter Security:ControllingPossibleThreats’,and‘HowtoMinimizeCyber-AttacksOnYourOrganization’.Also, whileflippingthepagespleasegothroughCXOStandpointsviz,WhatGDPRforgets:Thephysicalsecurityby GisleM.Eckhoff,CEOofDigiPlex,ManagingCorporateCommunicationsonMobileDevices

Silver,Co-founder,TangoNetworks,ITandCommunicationTrendsforCriticalInfrastructure

Harris,VPofMarketStrategy&Development,UtilitiesTelecomCouncil.

byAndrew byBobbi

i pjt

X
BQJJod/; Ui f Fyqf sujo Epn bjo Ebub

‘‘

erpetratorswhocommit

Pcybercrimeareinpossessionof abundanttechnicalknowledge inthedomain.Tomakematters grimmeristhefactthattheyare constantlyevolving.Hence,with technologyrapidlyevolving,soisthe natureofcrime.Thesecrimesare relativelyoldandwillbeinexistence aslongascomputerrelatedaccessories andinternetbreathesfreelyinthe society.Itshouldcomeasnosurprise thatourunpreparedsocietyandthe world,atlarge,findsitalotdifficultto combatagainsttheseboomingcrimes. Toovercomethesecybercrimes,Law enforcementagenciesyieldhelpfrom industryexperts,suchas Whois API Inc.,whichcatersitsresources&data toidentifyalltheconnecteddomains, websitesandIPaddressesassociated withsuchfraudulentactivitiesandthe criminalsinvolvedinthesame.

WhoisAPIInc.isabigdataandAPI companythatprovidesdomain, WHOIS,DNS,IP,andthreat intelligencedatatoawide-varietyof industries.Itservesitsservicesfrom

largeFortune-500companiestosmallsizedcompanies,whichincludecybersecuritycompanies,corporations withinacyber-securitydivision, governmentagencies,domain registries&registrars,brandagents, marketingdatawarehouses,banks, financialinstitutionsandmanymore.

TheTech-savvyCEO Technologyisrebrandingour organizations&society,andoneofthe pillarsoftechnicaldevelopmentstarted backin2002whenJonathanZhang completedhisDegreefromthe BerkeleyUniversityofCalifornia.His extensiveexperienceinthesoftware industryhashelpedhiminlayingthe foundationalstepsofWhoisAPIInc.in 2010.Sincethen,hehasbeen shoulderingtheresponsibilitiesthat comebeingtheCEOofanexpanding company

“IrunWhoisAPIInc,aleading providerinWhoisAPIWebserviceand WhoisData.Igraduatedfrom UniversityofCalifornia,Berkeleywith abachelordegreeinApplied

Mathematics.Ienjoycreatingproducts thatcansatisfyameaningfulmarket demandandcompaniesthathavea viablebusinessmodel.”-asserts Jonathan.

Mr.Zhangcompletedhisfouryears Bachelors’degreeinApplied Mathematicsandstartedhiscareerin theITsectorasaSoftwareEngineer Hedevotedmostofhistime&skillsin organizationalgrowth,andalways playedanimportantandvaluablerole inanyorganizationheworkedfor. Withhisresolutevisionofproviding servicesagainstcyber-related problems,heinscribedhisfootprintsas aresourcefulinformationproviderto organizationsandvariousagencies relatedtolaw,auditorsandenterprise businesses.

TacklingAgainsttheObstaclesof Cybercrime

Totacklecybercrimesatpresentandin future,thecompanyiscreatingarealtimewhoisdatabaseandensuringthat themostuptodateandaccurate informationisprovidedtoits

‘‘

customersandclients.TheWhoisAPI bodyfocusesonprovidingkeydata pointsfordomainswiththeregistered name,datarelatedtoorganization,emailaddresses,registrationaddresses, registrarinformation,updateddate, creationdate,expirationdate,domain availability,anddomainage.Along withthis,theCyberSecurity researchersuseWhoisAPI’sservices forinvestigating&curbingdown cybercrime.CyberSecurity&antimalwaresolutionprovideruseWhois APIinformationdatatodetectspams, maliciouswebsites,intrusions,and otheronlinemisbehaviors.Italso providesdatatoitscompetitors,and thesestrategiesgoalongwayin servingitsFortune-500customersin thebestpossibleway.

Long-termRelationshipBond Historyhaswitnessedthegrowthstory ofWhoisAPI,duetowhichitattained th18 rankintheTopITservicesby Inc.500companiesin2017andhad recorded1640%growth,cumulatively, inthelastthreeyears.Thegrowth figurewaspossibleduetoits development-orientedtechnology resultsandwithitsclientretention strategies.Itiscontinuouslystriving hardtoanalyzeandmeetthe requirementsofitshugecustomerbase byofferingvariousplanningoptionsto meettheirspecificbusinessneeds.The companyhasbeenparticularlyactive inengineeringtoolsthatgatherdomain Whoisrecords,domainavailability, reverseWhois,brandalert,registrant alert,bulkWhois,DNSlookup,and emailverification.Thesestepshelpin servingtheclientsforalongerperiod oftimeandsharingastrongerbond withtheclients.

TheFutureinCyberSecuritySector

Thecyber-securityservicesectorwill continueitsphenomenalgrowthinthe next5-10yearsandbeyond.Right now,therearehundredsoreven thousandsofcyber-securitycompanies. However,downtheline,a consolidationwilloccurwhereonly thebigplayerswillremaininthe market.Seekingfuture,thecompany hasalsobeencollaboratingwith numerouscybercrimeunitsand governmentagenciesinidentifying maliciouswebsites,domainandIP addressesassociatedwithfraudulent practices,creditcardfraud, geographicallocationsofpossible offenders,aswellasfraud,hackings, andotheronlineillicitactivities.To copeupwiththesesituations,the companyiscollectingdata,whichis unified,consistent,wellparsed,and accurate,andprovidingitthroughrealtimeAPIs,DatabaseDownloads,and onlinetools.Thus,aslongasitholds dataadvantage,itwillalsocontinueto holdsolid-footprintsoverthemarket.

ContinuingitsExpansionDownthe Road

Dedicatedeffortsarebeingdeployedin datadevelopmentforthecompany's customerbasewhichincludes cybercrimeunits,government agencies,registrars,domainresellers, marketingresearchersandothers.It (what)continuouslystriveshardto understandandmeetthedemandofits hugecustomerbasebyofferingvarious planningoptionstomeettheirspecific businessneeds.Thecompanyis strivingtobeatitsbestinmonitoring andresearchingofdomains.Itsunique andinnovativetoolswillallowits customerstomonitor,research, uncoverandprotecteverythingrelated

‘‘ ‘‘

toadomainnameandcyber-security Hence,byprovidingexcellentsupport andtakingacutefeedbackconcerning theclients’needs,WhoisAPIwillbe abletohelpinprovidingthebestcustomizedsolutiontoitsclientsinthe nearfuture.

SecuringDevices

AccordingtoWhoisAPI,therearefew simplestepsneededtobefollowedin ordertokeepamobiledevicesafe. Keepingtheoperatingsystemandapps updatedissupersimpleandusually automatic.Theseupdatesareoften madebythevendorstoblock vulnerabilitiesfound.Mobiledevices alsocomewithbuilt-insecurity featuresthatshouldbeutilized. Reviewingapppermissionsisahuge steptokeepingadevicesecure,as hackerswilloftentrytosneakin unneededpermissionswhenanapp installs.Thedeviceshouldbelocked withapasscode,password,fingerprint orsomeothersortofaccesscodeto allowonlytheauthorizeduseraccess. Usersshouldalwaysavoidconnecting devicestounsecuredWi-Finetworks, asusinganunsecurednetworkopens updevicestootherswhoareutilizing thesamenetwork.

Whiletalkingaboutthreats,the organizationbelievesinternalthreats aremuchmoresuccessfulduetothe accesstothedata.Asaninsider,itis likelytohavethesensitivematerialor dataavailabletothemonadailybasis withoutquestion.Anattackfromthe insideisalsomoredifficulttodetect, becauseit’snotalwaysflaggedas securitybreachandgoesunnoticed. Attacksfromtheoutsideusually requireintensehackingandfirewall breaching,whileinsidersalreadyhave accesstothethreateneddata.Another internalthreatissimplyaccidental releaseorleakingofsensitive information,withnomaliciousintent.

EstablishinganOrganization-Wide AwarenessCampaign WhoisAPI(Itwillbebetterifyouuse CEO'sname)believes,employee awarenesstrainingisextremely importantinordertokeepan organizationsafeandsecurefrom outsideattacks.Accordingto(which) research,61percentoforganizations areoftenexposedtomalwareor virusesduetoemployeeignorance. Mostoftheemployeesareoftenlikely toopenanemailfromsomeonethey don'tknowduetothenatureoftheir

jobsorbecausetheyoftenopenemails frompeopletheydon'tknowfor businesspurposes,andaretherefore easiertotrickintoclickingabadlink oropeningadamagingattachment. Variousstudieshaveshownthat traditionaltrainingtechniqueswon’t havealastingeffectonemployee awareness.It’ssomethingthat continuallyneedstobereinforcedand putintheforefrontoftheirminds.The behaviorneedstobetaughtoveralong periodoftime,itisn’tjustaoneand donekindofthing.Employee awarenessshouldstartduringthe onboardingprocessforallnew employees,andcontinuethroughout theircareerwiththecompany.Regular testingtoreinforcetheproperreaction tosuspiciousemailsmaybenecessary

The(CEO)organizationalsoadded that,there’snoneedofover-educating employeeswithtoomuchinformation aboutthreats.Companiesshouldteach themexactlywhattheyneedtoknow andwhattheyneedtobewatchfulfor, whichisenough.Additionally, rewardingemployees,whoeffectively findmaliciousemailsorsimilarisa greattechniquetoreinforcetheinstinct tobewatchful.

providedbyWhoisXmlApiforthreatprevention&investigation! ‘‘ ‘‘
This is just the start of a long and fruitful journey. With our comprehensive Whois products and services, government agencies & cyber security solution providers can trust the data
Address : Country : City : State : Zip : Global Subscription Date : Name : Telephone : Email : 1 Year.......... $250.00 (12 Issues) .... 6 Months ..... (06 Issues) ..... $130.00 3 Months ... (03 Issues) .... $70.00 1 Month ...... (01 Issue) ..... $25.00 READ IT FIRST Never Miss an Issue Yes I would like to subscribe to Insights Success Magazine. SUBSCRIBE T O D A Y Check should be drawn in favor of : INSIGHTS SUCCESS MEDIA TECH LLC Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754,(302)-319-9947 Email: info@insightssuccess.com For Subscription : www.insightssuccess.com CORPORATE OFFICE

AtendeSoftware www.atendesoftware.pl

AurionproSolutions www.aurionpro.com

CDNetworks www.cdnetworks.com

CertgateGmbH www.certgate.com

PawełPisarczyk President SamirShah CEO

AndrewKoo

President&CEO

JanC.Wendenburg CEO

DERMALOG

Identification SystemsGmbH www.dermalog.com

onShoreSecurity www.onshore.com

Seceon

www.seceon.com

ShadowDragon www.shadowdragon.io

SilentCircle www.silentcircle.com

WhoisAPI www.whoisxmlapi.com

Brief

AtendeSoftwaredevelopssoftwareanduseittocreate productsandservices.WebuildourCapitalGroup,which focusesondevelopinginnovativetechnology

Aurionproisaleadingtechnologyproductsandsolutions providerthathelpsenterprisestoaccelaratedigital innovation,securelyandeffeciently

CDNetwork'scontentdeliverynetworksupportsits customers'successbymakingtheirwebsitesand applicationssecure,reliable,scalable,compliantwithlocal regulationsandhigh-performing..

certgateisoneoftheleadingGermanbasedsecurity solutionproviders,focusedonmobilesecurity productsandsolutions.

GuntherMull CEO

SteliosValavanis

Founder&CEO

ChandraPandey

Founder&CEO

Asapioneerinthedevelopmentofbiometricproductsand solutions,DERMALOGhasbeenshapingtheworldof securityformorethan20years.

Foundedin1991,onShoreSecurityisaleading providerofmanagedcyber-securityservices.

SeceonOTMprovidesasimple,fullyautomated approachtodetectingandstoppingthethreatsthat matter

DanielClemens

Founder&CEO

GreggSmith CEO

JonathanZhang CEO

ShadowDragondevelopsdigitaltoolsthatsimplifythe complexitiesofmoderninvestigationsthatinvolve multipleonlineenvironmentsandtechnologies.

SilentCircleEnterprisemobileprivacyplatformdelivers flexible,modular,no-touchdeploymentwithzero maintenance,hardwareoradditionalmanpowerrequired.

WhoisAPIInc.isabigdataandAPIcompanythat providesdomain,whois,dns,ip,andthreatintelligence datatoavarietyofindustries.

Management CompanyName

WHATGDPR FORGETS: PHYSICAL SECURITY

GDPR PHYSICAL SECURITY

TheEU’sGDPRlegislaturewillhave consequencesforeverycompanydoingbusiness inEurope,includingAmericancompanies.The newdirectivepromisessizeablefinestoanyonethatdoes nottakepersonaldataseriously.Meanwhile,thedata centercompanyDigiPlexurgescompaniestofocuson anotherimportantaspect:physicalsecurity.

TheGeneralDataProtectionRegulation’s(GDPR)purpose istoharmonizelegislationrelatedtopersonalinformation acrosstheEU’smemberstates.Itdoeshoweveralsocreate radicalchallengesforAmericanbusinessesholding informationonEUcustomers.ComeMay2018,whenthe legislationentersintoforce,companieswillhavepublicly disclosedhowthedataisused,inadditiontooffering transparencyforindividualsseekingaccesstotheirdata. TheGDPRincludesasanctionmechanism,andthefinesfor non-compliancecanreach4percentofacompany’sannual revenue.

Business will obviously change for everyone not taking personal information seriously. This will clearly raise awareness regarding how the data is secured, but it’s also vital not to forget where the information is located, says DigiPlexCEO,GisleM.Eckhoff.

Movingdatatosafety

Americancomputersecuritycompany,McAfee,publisheda studyofover800companyleadersfromdifferentsectors. Thereportrevealsthat50percentoftherespondentsstate thattheywouldliketomovetheirdatatoamoresecure location.AmotivatingfactoristhenewEUlegislation.The reportalsorevealsthat74percentofthebusinessleaders specifiedthattheythoughtprotectingthedatacorrectly wouldattractnewcustomers.

Data security is not just about protecting yourself against hacking and other digital threats. The overall security critically depends on where your data is stored. Companies who actively select a secure data centre to host their data will gain a competitive advantage in the market as the management of personal information is in the spotlight, saysEckhoff

Physicalsecurityisforgotten

WhileEU-basedcompaniesareintheprocessofadapting totheGDPR,Gartnerpredictedonly50percentof Americanfirmswillbereadyforthestrictregulationbythe endof2018.It’sprimarilythelargestcompaniesandpublic enterprisesthatarefurthestalongintheprocessof adaptation.AccordingtoEckhoff,theyareusuallytheones thatarethemostconcernedwithdatasecurityandwhereit isstored.Fireandoperationalsafetyaretwoobvious challenges,butphysicalsecurityalsoincludessecuring yourselfagainsttheft.

Several smaller businesses and organizations keep their data servers at their offices, and the physical security in many of the smaller data centers is almost absent. If your data is stored in such a data center, where someone easily could break in and physically remove the hardware containing your information, then you are very vulnerable –both operationally and in relation to GDPR

AtDigiPlex’sdatacenters,severallayersofsecurityensure thesafetyofthedataandthepersonalinformationthatis storedthere.Physicalsecurityisoneofthemost complicatedandexpensivefeatureswhenbuildingor updatingadatacenter Thatiswhynewlyestablisheddata centershavetoreachcriticalmass,allowingthemtostore enoughdatatocompensateforthelargesecurity investment.

THE 14 | December 2017 |

About The Author

Gisle is the former Senior Vice President and Managing Director of CGI’s operation in Norway, and has also held a number of senior management roles at both country and regional levels in CSC Computer Sciences Corporation. The experience and knowledge gained from heading up the Financial Services vertical in the Nordic region, before becoming Vice President and Managing Director of CSC in both Norway and Sweden, is of great value

AdaptingtoGDPR

Oneconsiderationtotake,aswearegettingclosertothe implementationdateofGDPR,iswhereyourdatacenter shouldbelocated.SeveralUSbasedcompaniesarealready relocatingtheircenterstotheEUinordertocomply Multipledatabaseprovidersarehelpingnon-EUcompanies organizeandsegregateEUdatafromotherpersonal information.Thedatacenterindustryiswellestablishedin Europe,andsomeofthemostcostandclimateefficient centersarelocatedintheNordiccountries.

IntheNordics,thecoolclimatehelpschilldownvast amountsofhardwarethatotherwisewouldhavebeen

cooleddownsolelybyelectricity.Additionally,the electricitythatisrequiredbydatacenterstoruntheir operationsissuppliedthrougheasyaccesstoaffordable renewableenergy

In recent years, we have seen political turbulence in larger parts of the world, Europe included. The stabile political environment in the Nordic countries is also a climate to consider, as the establishment of data centers is a long-term investment, saysEckhoff.

Gisle M. Eckhoff joined DigiPlex in August 2014 as Chief Executive Ofcer. He brings nearly thirty years’ experience in senior positions in the IT industry in the US, Sweden, UK and Denmark as well as at home in Norway. when implementing DigiPlex’ growth strategy in the Nordic markets. Gisle holds a Degree in Business Administration from the Norwegian School of Management.
Expert’s Insights 15 | December 2017 |

DATA CENTER SECURITY:

Theriseincyber-crimesisoneofthemaincausesof

Datacenteroutages.Aspertherecentsurvey conductedbyindustryinsiders,cyber-crimecaused 22percentdatacenteroutagesin2015opposedto2percent outagesin2010.Addingtoallthese,nowmostofthedata centersarere-evaluatingtheirsecuritypoliciesafterthe recentWannaCryransomwareattack.

Datacenteroutagescausecompaniestolossrevenuein manyways.However,thecostliestlossisservice interruptionandlossofITproductivity.So,the organizationsarenowrealizingthattraditionalsecurityis nolongersecureenoughtosecureanydatacenter.Arecent studyhasfoundthat83percentoftraffictravelseast/west withinthedatacenter,whichstaysundetectedbythe perimetersecurity.Inthisenvironment,whenanattacker infiltratestheperimeterfirewall,thencanjumpacrossthe systemwithease,extractinformationandcompromise valuabledata.Additionally,datacenterscanfaildueto trespassersoraterroristattackorbynaturalcalamities.

So,howcanonesecureadatacenterinthebestway possiblefromanykindofcyberthreat?Don’tworrywe’ve gotyoucovered,withthepointsbelow

Asthefirststep,oneshouldMaptheDataCenterandflag thehackerswithinthevirtualandphysicalinfrastructure. TheCSOsandCIOswithasystemmapoftheirsystems canreacttoanysuspiciousactivityandtakestepstostop databreaches.Beingabletovisualizedifferenttraffic patternswithinanetworkhelpstounderstandthreats,that eventuallyelevatesthelevelofsecurity

Understandingandmeasurementoftrafficflowwithin thedatacenterboundaryareveryimportant.Inthecaseof anyinterruptionintrafficacrosseast/westvsnorth/south, protectedvsunprotectedonecangettoknowaboutathreat.

Additionally,vulnerablezonesandunprotectedtrafficneed tobemonitoredforabetterresult.

Firewallrulesneedtobedefinedandimplementedasper requirements.Additionally,oneshouldallowtrafficonly afterthoroughverificationandselectivelyallow communicationtoensuremaximumprotection.Thekeyis toidentify,what;slegalandsecuredandwhatcanbe blockedtoenhancesecurity

OneneedstoBuildaTeamwithexecutives whounderstandhowtrafficflowswithin thepremisesandcanaccess&secure information,takenecessarymeasures tosecureimportantassetsalongwith theimplementationofroadblocksfor theattackers.

Securitymustmoveasfast asadatacenter’s technologyadoption andintegration.

Security Strategy Should Change

Alongsidethe Technologyanditshouldnot betreatedasanadd-onoption.Additionally,businessesalso shouldensurethattheirvirusprotection,signaturesother protectionfeaturesareuptodateforbetterprotection.

BusinessesshouldIdentifyandPlaceControlsoverhighvalueassets,whichwillhelptoreducerisk.However,older securitysolutionsarecompletelyblindtonewthreats,new securitycompanieshaveproducedlatestsolutionsthat protectdatainthevirtualworld.

18 | December 2017 |

Possible Threats

AccessRestrictionalsoneedstobeimposed.Everybusinessshouldthoroughlycheckaperson’sbackgroundbeforegiving theaccesstoaprizedpossession.Accesstothemainsiteandtheloadingbaymustbelimited,additionally,two-factor authenticationsandfortifiedinteriorswithsecurityguardsandrovingpatrolswouldhelptosafeguardtheemployeesandthe datacenter

InstallingSurveillanceCamerasaroundthedatacenter,alongsideremovingsignswhichmayprovidecluestoitsfunction helpstolocateanintruder.Abufferzonebetweenthedatacenterandalltheentrypointswilllimitunlawfultrespassingtoa greatextent.Additionally,thedatacenterneedstobefarawayfromthemainroadanditshouldnothaveanywindowsother thanadministrativepurposesforbettersecurity

AdatacentershouldCheckTestBack-UpSystemsregularlyasprescribedbythemanufacturer.Itshouldalsoensureto makealistandofDo’sandDon’tsintheeventofanattack.Recoveryplansandsecurityplansalsoneedtobechecked thoroughly.

DatacentersarealwaysaSoftTargetforTheTerrorists,asanattackonthemcandisruptanddamagemajorbusinessand communicationinfrastructure.So,securityneedstobetakenseriouslyandtodothatproactivestepsshouldbetakentolimit theimpactofaterroristattack.

TrainedSecurityGuardsneedstobepostedinsideadatacenterandtheyshouldbewelltrained.Securityofficersmust undergostrictsite-specifictrainingtomonitorsurveillancefootage.Dependingonthesizeofdatacenterandthenumberof securitycamerasmultiplesecurityofficersmayberequiredonduty. Securityofficersdedicatedtoinspectingsurveillance footagehelpswhenitcomestosecuringadatacenter.

DisasterRecoveryisverymuchimportant,thatmustbeinplace.Ifthedatacenterstopsfunctioningafteranattackor naturalcalamity,itmusthaveawaytorestoreoperationsassoonaspossible.Tobereadyforadisasterandtoevaluatethe disasterrecoveryplan,it’snecessarytotrainstaffswellandexperiencesimulateddisasters.

Toavoidtheseobstacles,oneneedsafairbitofknowledgeofnewsecuritysystems,solidplans,andcomprehensive visibility.Themoreworkadatacentercandoupfrontintheabove-mentionedareasthebetterthechancesofsuccesswith lesseroutages.

Info Network 19 | December 2017 |

certgate GmbH: Protecting Users Since Inception

Withthegrowingusageofsmartphonesand internet,privacyhasbecomeathingofpast. Nowadays,mostofthemobileserviceproviders andtheinternetserviceprovidersstoreallthecriticaldataofa userforatleastsixmonths,uptotwoyears,whichtheycan keepitforever Analyzingthisdatamapssocietybehavior patterns,createsablueprintofsocialcommunications.Itis possibletodetectcommunicationhubs,definewhoismore importantandswitchoffcommunicationleaders.Itquestions theverybasictermsoffreedomandprivacy.

However,that’snotallEdwardSnowdens’latestleakswas about,itevenpointedoutthattheUSIntelligenceagencies wereusingGoogle,Yahoo,Microsoft,Facebook,Twitterand otherpopularglobalservicestokeepaneyeontheusers. Snowdens’documentsevenrevealedthattheintelligence agencieshacktheirdomesticandforeigncompaniesinorder towiretaptheirusers.Addingtothegovernmentagencies, therearealsoafewprivateorganizationsthatspecializeson extremelysophisticatedsurveillancetechniques.Theycollect andanalyzedataabouttheirtargetfromdifferentsourcesi.e., mobilephones,socialmedia,personalcomputers, communicationcontactsoftheircontacts,webcameras, mobilecameras,andsoon.

Jan C. Wendenburg CEO
20
We protect your mobile communication. Whether text, voice or email, with our easy-to-use apps and services you are well equipped for global competition | December 2017 |

Tokeepuserssafefromvariouskinds ofprivacyandsecuritybreach, Germanybasedsecuritysolution providercertgateGmbHcameinto thefray.Theorganizationis completelyfocusedonmobilesecurity productsandsolutions,withofficesin Nuremberg(nearMunich),Hannover andDusseldorf,certgateisownedby thelargestprivateequitycompanyin Germanyandthemanagement.

Thecompany’sofferingistwofoldand workshandinhand.First,certgate APPssecurecorporatemobile communicationwithregardsto End2Endencryptedvoice,chatand email.Itssolutionsprotectdataat flexiblesecuritylevels,fromsoftware basedtohardwareprotected2-factor authenticationandencryption.

Secondly,certgates’wirelesssmart cardsenableorganizationstoexpand provendesktopsecurityintomobile platforms.Thecompany’ssolutions integratewithglobalmobiledevice managementsolutionsandimprove protectionforenterprisemobiledata ontravelandonrest.

AVeteranLeader JanC.WendenburgistheCEOof certgateGmbH.Atcertgate,Janis currentlyadvancingthefurther developmentofthe“MobileIT Securitysolutionprovider,”with patentedandnewconceptsand technologiesforimprovingmobile securityforcompaniesandauthorities. ThroughouthiscareerJanhasworked intheITindustry Whileservingfor IBM,hewasresponsiblefor worldwidecustomers,Germany’s largestsystemsintegrator,inmultiple locationsandforhundredsofmillions ofsales.Janthenactivelychangedas managingdirectortoaninternational ITcompany Afterwards,heledthe

transformationofthecompanyintoan internationalventurecapitalfundwith officesinBerlin,HongKongandLos Angeles.

Duringthistime,hefounded AuthentiDateInternationalAGin Dusseldorf,whichwasthefirst Germanaccreditedcertificationservice fortimestampsandleadingITsecurity specialist.In2005,AuthentiDatewas awardedthehighestprizeforIT securitypioneeringworkinGermany. Howeverin2011,hesoldthe organizationtoexceetGroupS.E.and supportedthemontheirsuccessfulIPO ontheFrankfurtStockExchange.

StandingoutAmongsttheCrowd andMaintainingLong-term RelationswithClients certgatehasbeenalong-termIT securityinnovator.Itspatentedand uniquemobilesecurityproductsand solutionsprovidemaximumsecurityat minimumuserimpact.Ingeneral, software-basedmobilesecurity solutionsrelyonthesafetyof underlyingoperatingsystems.Incase oneencryptstheconfidentialdataand storesthekeyonavulnerabledevice orOperatingSystemallthedata possessesamassivethreat.certgate comestotherescuebylettingits clientsstoretheirvaluablekeys wirelesslyonglobalcertifiedsecure elements.Thecompanytrulyprotects itsclients’mobiledata,mails,chatand voicecommunication.Thisworks mostlyindependentofthesecurityof theoperatingsystem,i.e.Apple/iOS, Android,Windows,MacOSorLinux.

AccordingtocertgateGmbH,IT securityisamatteroftrustandthecore fundamentofallitsclientsandpartner relationships.Theorganization includesallitsclientsandpartnersinto theproductroadmapplandiscussions

toreceivefeedbackoncurrentproducts andfutureconcepts.

WhentheSuccessisBasedon Restless,andParanoidApproach certgates’successiscompletelybased onarestless,paranoidapproachin ordertocombinemaximumsecurity withminimumuserimpact.The companyisnowworkingintensively withitspartnersandclients,nomatter theplatform,geography,orlanguage.

certgatebelievesthatwithinIT security,thereareafewmajortrends, whichareimportanttowatch:

•Everyoneandeverythinggoes mobile.

•Usersrequestsimpleuserinterfaces.

•Consumerizationiskey.

•ITsecurityshouldhavenouser impact.

•ITattackswillincreasedramatically

•Artificialintelligenceautomationwill putalmostanysoftwarebased securityconceptathighrisk.

However,certgateisverywell preparedtodrive,followandcomply withthesetrends.Whilethefirsttrends areshorttomediumterm–thelastone “artificialintelligence”(AI)willhave thebiggestimpact.AIwillbethemost dangerousonewithregardsthat hackerswilluseAItofind vulnerabilitiesandcompletelynew waystoinvadeinfrastructuresand gatheruserkeysandcredentials. certgates’solutionscombinehigh securitywithconsumerizationand includetheoptiontouseproven, certifiedsecureelements.Theyare perfectlyprotectedagainstnew weaponsandattacks,whichmight ariseinfuture.

21 | December 2017 |

Educating Employees to Minimize the Risk of Cyber-Attacks

During480B.C.,in The Battle of Thermopylae, merelythreehundredSpartansheldoffahugePersianarmy. However,inrealitySpartanswerenotaloneinthebattle,alongsidethemfoughtAthenians,Thebesandother Greekforces.UntilthelastdayGreekshadaforceofaroundseventoeightthousandsoldiersatthebattleground. Thekeydifferentiatorinthebattlewasthat,Spartanswerealreadyprofessionalsoldiers,whereastheGreekswerenot professionalsoldiersandtheyfoughtinthearmywhilecalledupon.

Cuttomoderndays,theworldisnowcompletelydependentoninternet,anditpossesamassivethreatfromamodern-day nuisancewhichiscalledCyberAttacks.Theworstpartis,sadlytheusersarenotSpartanwarriors,insteadmostofthem areworkingprofessionalsorcasualusers.Theseprofessionalsarenotatallsecuritygeeks,mostofthemdon’tunderstand whatcybersecurityis,andforthatwecan’tblamethemeitherastheirjobsaren'tfocusedoninformationand cybersecurity

So,inordertobesafeinthebadworldofcyberattacksandbreaches,onejustcannot

22 | December 2017 |

Alreadyconfused?Don’tbe,weareherewithfewstepsthatcaneventuallyhelptoensuresafetyintheriskycyberworld.

Anorganizationmightinteractwithseveralvendors,whichcaninvolvevariouspurposes.So,the first step towards safety is to determine which members would be of highest-impact to the organization in case of a breach. Additionally,itisalso importanttoconsiderwhattypeofdatathevendorishandling,whichcanbeanythingfromcardholderdatatoprotected healthinformation.

Onealwaysneedtoreinforcemessagesthroughpolicy,internalvideos,instaffmeetingsandothersourcesthatworksin theenvironment.Inordertocreateanawarenessprogram,onemustunderstandthat awareness is a process and it always takes time. LastlyonemustSettheexpectationthattheelementsoftheawarenessprogramwillbeupdated,andrepeated onaregularbasis.

Anotherblundermostoftheinternetuserscommitis using same password for multiple services. Samepasswordsalways tendtoleavetheentiredigitallifeatastakeandvulnerabletobreaches.Asifonehackerhasgottheholdofasingle password,thenhecanaccessalltheaccountsoftheuser

Nowadayshand-helddeviceslikecellphonesandtabletshavebecomeanecessityandmanyoftheemployeesusethemfor officialpurpose.However,theusershould always be extra careful while installing new apps in the phone or tablet asthis isoneofthemost-easywaysinwhichmaliciousappscangainaccesstothepersonalinformationofauser.Anappcan alwaysaskforabiglistofpermissioninordertofunction,butit'simportanttobeawareofwhattypesofinformationthe appisaccessingforbettersafety.

Always be aware of phishing scams. Whenitcomestophishingscams,cybercriminalsdesignawebsiteoremail-id to stealsensitivedata.Mostofthetimetheattackerinstallsmalicioussoftwareontotheuser'spc.Theworstpartis,onecan barelydifferentiatethesewebsitesoremailfromthegenuineones.However,phishingscamsarequiteeasytospot,butfor thatonemustknowwhattolookoutfor.

Companiesmustalsotelltheiremployeesto avoid logging into any of their important accounts from public computers publicpcoranetworkisopentoalltheusers,whicheventuallyleavesmanysecurityholes ,sometimespeoplemightnothavetheaccesstoaprivatepcoranetwork,sointhatcasethe usermustdeletethebrowserhistoryoncedoneandonlylogintoanetworkaftermakingsurethatitis completelysafe.

Applying necessary software updates areverycriticalnowadays.TechgiantslikeMicrosoft,Google, Apple,etc.releasesbugfixes,securitypatchesintheirrecentupdates.Thesefixesmostlyhelpusersto besecuredintheriskyworldofweb.

Aboveallthesekeypoints,onemustrememberthatonemusttrainhisemployeessuchamannerthatit eventuallyincreasesthestaff'sabilitytomakemuchmoresecureddecisionsthattoconsciously Employersmustrememberthattheyarenotmakinganycybersecurityexperts,forthatrolethecompany alreadyhasspecializedgeeks.Theyonlyneedemployeeswhoaregoodandhastheenough presenceofmindsothattheycanhelptoprotecttheorganization.So,herearefewpointsfrom usthatcaneventuallyhelpyoutominimizerisksofcyber-attackswhichcanwreakhavocin yourorganization.

Editos’s Perspective 23 | December 2017 |

onShore Security:

Protecting the Freedom of Information by Revolutionizing Cyber Defense and Governance

Withadedicatedmissiontoprotectthefreedomof informationbyrevolutionizingcyberdefenseand governance,onShoreSecuritycameintoexistencein 1991.Initiallyinceptedasnetworkconsultantsandsoftware developers,onShorelaunchedmanagedcyber-securityin1998 withapurposetoprovidefreedomviasecurity.Beingtheleading providerofmanagedcyber-security,thecompanybelievesthat cyber-securityrequiresawell-developedprocesswitha24x7 analysisofnetworkandapplicationdatathroughoutan enterprisetoinformpolicy;onShorecallsitPanoptic Cyberdefense.

ThecoreofwhatonShoreSecuritydoesisitsPanoptic CyberdefenseSecurityOperationsCenter Thecompany collectsdatathroughoutthenetworkandhosts,whichit analyzesonanongoingbasis.Thisisdonetolookforthreats, anomalies,andcompliancetoinformpolicyandevaluate securityposture.onShorealsoprovidesCyber-security LeadershipservicessuchasvirtualCISOandCISOmentoring.

PathBreakingServices

Mostofitscompetitorsinthecybersecurityspaceuseoffthe shelfsolutions,howeveronShoreuseswhatitlikesofftheshelf butmostofitrunsonitsownplatform,developingintegrations andcustomizationsgearedtowardsempoweringanalystsrather thansimplyautomation.Eventually,theclientreceiveshigh visibilityandarichunderstandingoftheirsecurityposture. Thecompanyoffersfourservicesrelatedtosecurity,theyareas follows:

We want to bring the full freedom of the Internet to all
Stelios Valavanis Founder and CEO
24 | December 2017 |

Panoptic Cyberdefense SOC

Itisacyber-securityprofessional serviceinvolvinghigh-level consulting,monitoring,datacollection, analysis,securitymanagement,and reporting.onShoretypicallyserves regulatedindustriesandenterprises withcomplexnetworkswithits24hourscyber-securityresponsefeature. Itintegratesitssolutionwithitsclients ITorganization,therebyincreasing securityvisibility,providingreporting formanagementandregulators,and informpolicy

Withcyber-attacksnowoften becomingmulti-vector,multiexploitive,and55%ofthembeginning withsocialengineering,onShoreis usingaholisticapproachtotacklethe same.Inthispost-Sonyera,every singlenetworkisvulnerablebothfrom insideandout.DuringonShore’stwomonthonboardingprocess,itheavily tunesitssensorstoestablishabaseline ofitsclients’networkwithhundredsof parametersmatchedagainst characteristicsofclientpolicies,risk appetite,andregulatorycompliance. Ÿ

Cyber-security Leadership

Itisacyber-securityprofessional serviceprovidedbyonShoresecurity involvingCISCOresponsibility, augmentation,anddirection.onShore CISCOleadershipservesclientsand satisfiesregulatoryrequirementsata fractionofthecost.Thecorefunction ofCISCOistoreportonacompany’s cyber-securityprogram,atleast annuallytotheBoardofDirectors, includingtheeffectivenessofthe programoranymaterialeventsthat wereaddressedduringthetimeperiod. Ÿ

Cyber-security Assay

Thisisacyber-securityprofessional

serviceinvolvingasuitoftestsand assessmentstodeterminecyber securityposture.

Ÿ

Cyber-security Insurance

Cyber-securityInsuranceisCyber LiabilityInsuranceCoverage underwrittenbytheLloydsofLondon. onShoreSecurityhasengagedwiththe bestincyberliabilityinsurancemarket toprovideacomprehensiveBreach Response.

TheFarsightedLeader

Aninvestorinseveralearlystage companies,SteliosValavanisisthe FounderandCEOofonShore Security.Graduatingfromthe UniversityofChicagoin1988witha Bachelor’sdegreeinPhysics,Stelios heldvarioustechnicalpositionsback there.Currently,heservesontheboard ofACLUofIllinoisandadvisory boardsandcommitteesforseveral otherorganizationsandcompanies.

Steliosbusinessandtechnicalprowess revolvesaroundnetworkandsecurity, designinginternetsecurityfortrading firmsinthe90sandbuildinga managedsecuritycompanywithan emphasisonbanking.Heisabig advocateofopensourcesoftwareand itscontributiontotheinternetsecurity industry

onShoreanditsSatisfiedClients

“We are always improving our offering and providing additional value. We also customize data collection and

reporting for our clients making it easier for them to present to their board of directors,” exclaimsStelios.

IttrulyinfuriatesonShoreSecurityto seecybercrimecreatingasenseoffear andslowingdowntheinnovativeforce i.e.,TheInternet.Thecompany envisionsbringingfullfreedomofthe Internettoeveryone.Itisviasecurity thatthisvisioncouldbefulfilled;hence justifyingthecompany’stagline "Because Security Gives Us Freedom.”

PictureoftheFuture

onShoreSecuritydeeplybelievesthat securityisaprocess,notanyother product.Slowly,manymore enterpriseswillbegintooutsource theirsecurityoperationcenter,once theyrealizethatsecurityismorethana technicalprocess;itisabusiness process.Asenterprisesrecognizethe needtoansweroutsideofIT,onShore standsreadywithallitsavailable technicaltoolsandtheright governance,whichitgarneredinthe bankingspace.

Movingforward,onShoreislookingto utilizesmallandcheapsensorsto capturemoreandmoredistributeddata formasscorrelation,withcoreand edgenetworkdataadtogivemuch morepowerfultoolstoitsengineers, likeheuristicsthreatdetection.

Ÿ
25 | December 2017 |

Seceon: Detecting and Stopping Threats that Matter

Cybersecurityhasnowbecomeoneofthemostdiscussed thingsinthedigitaluniverse.Despiteinvestingvast amountsofresourcesoncybersecuritysolutions,data breachesareincreasingeveryday,andthetraditionalmethodsto solvethesebreachesareflawed,requiringpeopletouseavariety ofcomplextoolstoidentifyandstopthreats.Theproblemwith thisapproachisthat95%ofattacksexfiltrateorcorruptdata withinjustafewhoursofabreach,whichgiveshardlyenough timeforexpertstoreact. Anadvancedcyber-securitythreat managementstartup,Seceon,recognizedthisflawanddeveloped aninnovativedisruptivesolutionbyestablishinganapproachthat deploysanalysisofalltraffic,logs,flows,identitydataand processesinandoutofthenetworkandcorrelatesthemnear simultaneouslywithbehavioralanalytics.Thecompany recognizesthreats,zero-dayexploitsandpoliciestosurface threatsandproposeresponsesinnearrecordreal-time.Moreover, thesecuritymeasurescanbedeployedwithinafewshortshours inanysizeorganizationwithlittletonocybersecurityexpertise requiredofenterpriseorserviceproviderstaff.

AProvenUndisputedBusinessLeader

ChandraPandeyistheFounderandCEOofSeceon.Heisan expertindatacenterarchitectureandhighlyscalablenetwork solutions,andaprovenbusinessleaderwithexperienceofmore thantwentyyearsindevelopingandmarketinginnovative technologysolutions.BeforefoundingSeceon,Chandraserved BTISystemsasaGeneralManagerandVicePresidentof PlatformSolutionsforabriefperiod.Heledaglobalteam throughthecreation,developmentandlaunchoftheIntelligent SecureCloudConnectplatformtomorethan20Web2.0─focused customerdeploymentsinlessthan18months.Additionally, ChandrahasheldseniorleadershiprolesatcompanieslikeJuniper

26 | December 2017 |
Seceon is a leading solution when it comes to cybersecurity, and we continue to prove this to our clients by allowing them to feel secure and by enabling them to focus their attention on successfully running their respective businesses

Networks,InternetPhotonics(Ciena), Lucentand3Com(HP).

WhileservingJuniper,heledthe worldwideSolutionsArchitecture& Engineeringteamsandwasalso responsiblefordeliveringintegrated securitysolutionsforJuniper’s enterprise,serviceprovider,managed serviceorganizationandmajorOEM partners,drivingbillionsofdollarsin revenueforthecompany.Chandrais aninspirationalleader,whoisalways empoweringhisteamtotakeonthe continuallyevolvingcybersecurity challengesthatbusinessesface nowadaysandintheprocesscreateda newmarketcategory.AstheCEOof Seceon,Chandraworkscloselywith customerstodefineandaddressthe problems,implications,andsolutions ofdefendingcorporateassetsintoday's highly-connectedenterprise.

ADifferentCyberSecuritySolution Provider

Whenitcomestotacklingcompetition, Seceon’sstrategyistodifferentiate itselffromothers.Seceon’sOpen ThreatManagement(OTM)platform providestheindustry’sfirstandonly fully-automatedthreatdetectionand remediationsoftwareplatform.The platformhelpscustomersdetectthreats astheyhappenandenablesthemto takeimmediateautomatedactiononall thosethreats. Seceon’sunique platformisalsocapableofhandling millionsofinputsfromlogsandflows andcorrelatesallthosetogetherinto actionablealertsthatcanbeputinto actionautomaticallyormanually Thankstoitsabilitytoscaleatspeed, theplatformcanprocessdatainreal time,ingestingandrunningthreat modelsthroughDRAM;updatingand activatingthesemodelswithinminutes throughadvancedcorrelationwith intelligentapplicationofmachine learning—andtherefore“see”how systemstalktoeachother This capabilityallowsthesystemtolookfor anomaliesandcorrelatethemtoget fullviewwhileminimizingfalse

positivesandthentriggerseasyto understandalertswithassociated appropriateactionsforeliminationand remediation.

Ontheotherhand,Seceon’s competitorstakealinearapproachinto ingestingandanalyzingdata.Seceon’s in-memory,fastanalyticsprocessing enablesamoreglobalapproach; ingestingandanalyzingdatainrealtimewhilecorrelatingwithinformation aboutexistingthreatsorzero-day exploitstodeliverprioritizedthreat alertstoITanalystsonstafforwithan MSSP Accordingtotheorganization, there'snoothercompanyinthemarket thatcanautomaticallyprovidethreat alertsandimmediate,automated remediationwithoutanyhuman intervention,therebydramatically speedingupthetimeittakestoidentify andstopanattackandpreventdata losswithfinancialimplications.

EmpoweringEnterprisestoDetect andStopCyberAttacks

Thecompany’smainmissionand visionisempoweringallitsclientsto detectandstopallexistingandnew cyberthreats.Seceonwantsallofits clients,regardlessoftheirsizeordepth oftechnicaltalent,tohaveaccesstoits technologyinordertoprotectcritical datafromlossordamage.Seceon’s missionisasfocusedoncreatingand continuinglong-termrelationships withitsclientsasitisabout empoweringandprotectingthem.

Eachquartertheorganizationlaunches amajorreleasewithimprovementto theorganization’splatforminorderto meetgrowingneedsofclients.

WhentheCultureandLeadership TeamaretheTwoBiggestFactors

Oneofthebiggestfactorsthatcanbe attributedtoSeceon’ssuccessisthe cultureofthecompany.Seceon’s cultureisoneofpassionforworkand constantlystrivingtoimprove.This cultureisembodiedbyitsteamof employees,andallowsthemtobe

motivatedandmakeadifference. AnotherfactorinSeceon’ssuccessis thestrengthofitsleadershipteam members,whohavedecadesofdiverse experience.Themassiveexperience allowsSeceontomoveintheright directionandtobepreparedforthe future.Theorganization’sleadership coupledwithitsmissionof empoweringcustomers,drivesSeceon tobesuccessful.

Lastly,theorganizationattributesallits successtoitsapproachintheindustry Seceon’sapproachandplatformis completelydifferentanduniquefrom anythingelseinthemarket,whichwill eventuallyallowthecompanyto separateitselffromtherest.

PreparingfortheFuture Seceonbelievesthatcybersecurityis oneofthemostprominentissuesand concernsfororganizationsofallsizes, andfortheircustomersaswell. Businessesarechallengedtoaddress thisissuebyfindingautomated, affordable,fastandeffective enterprise-classcybersecuritysolutions thatdon’trequireextensiveand resourceintensivehumanintervention toanalyze,detect,respondto, remediateandreportthreatsbefore theycauseextensivedamageandloss.

However,thegoodnewsisSeceonis well-equippedtoaddresstheseissues andempowersenterprisesofanysize tohavecomprehensivecybersecurity solutionforadigitalera.With12 patentspending,theplatform automatesdatacollection,analysis,and correlationwithbehaviorsandthreat modelsusingmachinelearningfor real-timedetectionandremediation. Finally,itprovidescompanieswith proverbialvirtualsecurityanalyst, regardlessofenvironmentor technologyexperience.SeceonOTM Platformcanseeandstopallthreats proactivelywithoutanyhuman intervention.

27 | December 2017 |
28 | December 2017 |
Maven’s Mentorship 29 | December 2017 |

ShadowDragon:

Solving the Challenges of Modern Investigations

Today,theinternetisubiquitous.Ithasrevolutionized businessesandcommunications.Ithasalsorevolutionized crime.Unfortunately,thewebhasbecomeavaluable vehicleforcriminalstoanonymouslypreyonvictimsthough cyberbreachesandcorporateespionage.Thedarkwebnow providesplatformsfornefariousbusinessesoperationsofallkinds fromidentitytheft,tomoneylaundering,tohumantrafficking.

Cybercrimehasbeenaroundfordecades,butin2010therewasa sharpriseindifferentattacksleveragingtheInternet.Itwas aroundthattimethatDanielClemensbegantogetrequestsforhis securityconsultingcompany-- PacketNinjas--toinvestigate maliciousonlineactivity Thiswasbeforetheterm“Threat Intelligence”wascoined.Therewerenotoolsavailabletoeasily dothistypeofresearch.Itallhadtobedonemanually

Tohelphisclients,Danielandhisteamcreatedatool–a rudimentaryversionoftoday’sSocialNet--tomapsocial mediaalias’andidentitiesassociatedwithmaliciouscyber activities. Asnewresearchdemandsaroseoverthenextfew years,hecreatedothertools-- OIMonitor,Spotterand AliasDB.In2014,withtheadditionofMalNet,hehadcreated fivetoolstoinvestigatecriminalactivityonlineoronline communications.

Thenextyear,DanielfoundedShadowDragontolicensethese fivesolutionstocustomers.Thegoal--empowerinhouse teamswithtoolsthatenabletheeasyandsafecollection, correlationandverificationofdiverseartifactsontheopen, deepanddarkweb.Today,ShadowDragonsolutionsareused globallybyU.S-basedandinternationallawenforcement, government,militaryandintelligenceorganizations,and Fortune50companies.

DigitalToolsDesignedbyInvestigators,ForInvestigators

ThegrassrootsoriginofShadowDragonsolutionssetacoursefor themtobecomeasuiteoftoolsthatuniquelysupporttheneedsof moderninvestigators.Theyarefairlysimpletouseforthenon-

Our tools were developed to simplify the complexities of modern online investigations, making it easier for in-house teams to generate highly relevant, operationalized and actionable intelligence
Daniel Clemens Founder and CEO
32 | December 2017 |

technical.And,theyaregearedtoward helpingin-houseteamsunderstand theircybersituationalawarenessby determiningiftheyareatarget,the identityoftheiradversariesandthe adversary’stools,tacticsandhistory

Ÿ

OIMonitor – Performslivesearches onopen,deepanddarkweb,andthe darknet.Investigatorschoosedata sourcesanddefinealertstoautomate intelligencegathering,andeliminate theneedtomanuallyidentifytrends andcorrelatethreat.

businessleaderwhohasdedicatedhis careerinsolvingcomplexcyber crimes.Tilldate,hehasassisted governmentsandbusinessesofU.S, LatinAmerica,Asia,andtheMiddle Easttosolvecomplexcybercrimes rangingfrommoneylaunderingto corporateespionagetolargescale cybersecuritybreaches.

companystartedsellingitstools.

PreparingfortheFuture

Ÿ

SocialNet – Performslivesearches andvisualizessocialmedia connectionstouncoveridentities, correlations,networksofassociates andavailablegeographical informationinjustminutes. SocialNetcanbeinvaluableforboth cyberorphysicalcriminal investigationsandsocialmedia forensics.

Ÿ MalNet - Enablesuserstoquery, correlateandvisualizeProofpoint ETinnearreal-timeformalware investigationsandincidentresponse. MalNethelpsidentifyandvisualize malwareconnectionsand infrastructuresinjustsecondsto expediteinvestigations,response, andmalwareprotection.

Ÿ

AliasDB -Historicaldatabaseof 70,000confirmedthreatactors,8,000 aliasesandcorrelationofknown associatesthatcanbeaccessed throughacustomizedinterfacethat canbeusedforresearchand documentation.TheAliasDB interfaceenableseditingofprofiles forcustomizedupdates.

Ÿ Spotter - Helpsinvestigatorsgather keyintelligencetomovean investigationforward.Spotterworks byallowinguserstoengage incognitowithatargetviaawebsite redirectthattracksthetechnical aspectsoftheinteraction.

HowaCyberSecurityExpert BecameaLeader

DanielClemensistheFounderand CEOofShadowDragon.Danielisa cybersecurityexpert,entrepreneur,and

Danielpossessesextensivehands-on experienceinbothoffensiveand defensivesecuritytacticsaswellasa deepunderstandingtoworldwide threats.Hehasalsoprovidedsecurity briefingstotheFBI,Departmentof HomelandSecurity,theDepartmentof Defenseformerpresidentialcandidates andmembersofCongress.

DuringhiscareerDanielhasaidedin theidentificationandapprehensionof hackers,terrorists,humantraffickers, andmembersoforganizedcrime. Neverloosinghispassionforresearch, healsofoundedtwocompanies–PacketNinjas,acybersecurity consultingcompany,andShadow Dragon.

Tackling

theCompetition

“Marketing strategy can be made into a multi-dimensional and complex topic, but when you strip all those complexities away its very simple. Deliver what your clients need, do it with excellence, and do it better than the competition,” addedDaniel Clemens.

Inordertoaccomplishthis, ShadowDragonalwayslistens carefullytoitscustomersandmakes suretoaddressclientneeds.Daniel believesthat“perfection can be a roadblock to progress”, sohisteam focusesonpursuingexcellence, instead,byimbuinghisteamwiththe confidencethattheycansolveanyhard problemiftheydotheirbest.

Byfocusingonthesetwothings–customerneedsanddeliveringwith excellence–ShadowDragonhasgrown andsucceededorganicallysincethe

Accordingtoindustryanalystreports, theexpenditureonthreatintelligence servicesandsolutionswilleventually increase,andwillbecomeintegralwith securitystrategy.However,asthisisa newcategory,ShadowDragonhas foundsomeconfusionand misunderstandingabouthowthreat intelligencetoolscanbesmoothly integratedintosecurityoperationsand generaterelevantandactionable information.

Forthisreason,thecompanyhas startedtooffertrainingcoursestoup thelevelofunderstandingand expertiseamongprofessionalsonthe frontlineswhoarenotalwaysknighted withatitlecontaining“cyber.”And, ShadowDragonalsoseekstohelp thosethatdohaveacyberfocusto adeptlyuseinformationthatis generatedtoforwardaforensically soundinvestigativeprocess.

Withthegrowingnumberof sophisticateddatabreachesorinside threats,moreandmorecompanieswill needintelligenceonwhowasbehind thethreat,theimpactonlongterm businessperspectivesoncapital investments,andalternativestrategic tacticstodisrupt/counterthehumans behindthesecurityissue.

ShadowDragon’stoolsuniquely augmentteaminvestigativecapabilities insupportofBOTHphysicalandcyber cases.Theysimplifyonlineresearch makingiteasierandfastertosource theirownveryrelevantintelligence. Analystsandinvestigatorslikethese toolsbecausetheycandrivequick resultsthroughreal-timedrilldownof investigationclues.It’safaster,less costlyandmoreproactiveapproach.

33 | December 2017 |

Cybersecurity plays amassiveroleintoday’

Accordingtoindustryinsiders,averagecostof databreachforvariouscompanieshasincreasedfrom$3.8millionto$4millionrecently.Mostofthecompanies todayhaveembracedopensourceforinfrastructuresoftware;additionallytheyhavealsoembracedcloudstorage. Bothofthesecomeswiththeirownblendofpositivesandnegetives.Likeifadatacentregetsattackedorfailsthenit couldbedeadlyforacompany,andmostoftheopensourcesoftwaresarevulnerabletocyberattackswhichpossesa massivethreat.

So,herewearelistingoutsomeofthecybersecuritythreatsandtheirpotentialsolutions,thatcanchangethecyberworld.

DDoSAttacksTargetedOnInternetofThingsDevices

Asperrecenttrend,cybercriminalshavegotallouttotargetvariousIoTdevices,thatincludessurvelliencecameras, securitysystems,electronicappliances,cars,commercialenviornments,vendingmachines,robotsinvarious

34 | December 2017 |

manufacturingplantsetc.Therearemorethan12billion IoTdevicesthatcanbeconnectedtotheInternetand researcher’sestimatetherewouldbe26timesmoreIoT devicesthanpeoplebytheendof2020.Thisthreatcame intospotlightrecentlyafterarevelation,wherethousandsof lowsecurityIoTdeviceswerebeingusedtolaunch massive-scaleDDoSattacks.Theseattacksimpacted variousDNSserviceproviders.

DDoSisakindofDOSattackwhichmakessurethat multiplesystemsarecompromised,withthehelpofTrojan virus.Ultimately,thevictimsofDDoSattackgets maliciouslycontrolledandusedbythehackers.

Tocounterthethreat,FTChasstartedtargetingsomeIoT devicemanufactures,whoseproductscomewithoutadequet security.

Ransomware

Ransomwarehasseensteadyimprovementovertheyears sinceitsfirstappearancewaybackin2005.Initsearly days,cybercriminalswouldusefakeappsandfake antivirusestoalertvictims, andthentheyaskforfeesasa chargeforfixingsomefakeproblems.EvenitshowedFBI warnings,whichcontainedthreatmesseges.Ultimately, theybegantolockdownsystemsoranyspecificappuntil thedemandsweremet.

However,themainthreatthesedaysarecrypto ransomeware,wheretheattackerencryptsthefileandthe victimneedstopayinordertogetthekeyandunlocktheir ownfile.Accordingtovariousagencies,Ransomwarehas causeddamagesofaround$325milliontilldate.

InordertostaysafefromtheRansomware,theusermust usereputedandoriginalantivirusandantimaleware softwares.Usersshouldn’topenemailattachments,until theyarecompletelysure.Useofstorngpasswordismust andoneshouldnotreuseolderpasswords.Keepingallthe softwaresuptodateisanotherthingonemustfollow,and lastbutnottheleastausermustbackupallthedatato preventdataloss.

BusinessEmailCompromiseSchemes

ABECattackisaformoffishingattackwheretheoffender pretendstobeanexecutiveandtargetsavendorora customerwhowouldtransferfundsorclassified informationtotheattacker.

BECattackiscompletelydifferentfromotherattacks,in caseofBECattacks,theattackersarehighlymotivatedand thesekindofattackmostlypassesthroughspamfiltersand evenevadesemailwhitelistingcampaigns.Allthese togethermakesithardtorecognizethattheemailisnot fromanauthenticsource.

SohowcanonebesafefromaBECattack?Don’tworry therearefewguidelineswhichwillmakelifeabiteasier.

Acompanymustimplementamultifactorauthentication, asasecuritypolicy,theauthenticationsystemwillmakethe hacker’slifemuchmoredifficultandultimatelyitwill preventthecriminalfromgainingaccesstoaemployee’s mailbox.Onemustalsocheckonorganiztion’sspoofability, thathelpstoknowhowsecuredthecompanyis.There’s nothingliketeachingemployeeshowtospotphisingattacks whichwilleventuallyhelpemployeesandthecompanyto besafe.

RiskOfUsingCloud

Recentlymostofthecompanieshavestartedusingcloud services.PopularappslikeDropboxandGoogleDriveare beingusedbycompanies,andsadlytherearemanyusers whoareusingtheseservicesfromtheirnon-corporatemail accountswhicheventuallyexposesensitivedatatooutside threats.Companiesalsolackspecificusagepolicieswhenit comestocloudservice,thatcanleadtosharingsensitive informationtounapprovedapps,whichcanleadtosevere databreach.

So,togetridofriskrelatedtoclouds,oneorganization musthaveastrictandclearpolicyabouthowandwhento useit.Anemployeemustbebarredfromsharingsensitive datatounapprovedapps.

ThirdPartyVendorsIncreasesRisk

Acompanymightbuildbrilliantsecuritysystemwithgreat policiestokeeptheircustomersandtheirdatasafe,but unlessanduntiltheirthirdpartyvendorsusethesamelevel ofsecuritythedataandcustomerswillalwaysbeatrisk. JustlookattherecentWendy’sincident,wheremorethan 1000franchisedlocationofWendy’swerehitbyaPoint-ofSalemalwareattack,thateventuallyledtomassivedata breach.

Untilcompaniesmakesurethatpoliciesaretightedup enoughandthethirdpartyvendoristakingalltheneeded securitymeasures,thesekindofattackswillcontinueto

35 | December 2017 |
Threat O Care

takeplace.Topreventcyberattacks,organizationsshouldcomeupwithapolicy,bywhichoneshouldensurethatthirdparty vendorsaretakingsamesecuritymeasuresasthecompany.

Inadditiontoallthese,stortageofskilledITprofessionalsisalsohurtingtoagreatextent;therearemorethanamillion vacantITprofessionaljobsacrosstheglobe.So,withmoreskilledprofessionalsandbyfillingthevacantpositions,thecyber threatscanbeminimizedtoagreatextent.However,onestillhastoreligiouslyupdateandpatchfirewalls,firmwares, changingthedefaultpasswordoftherouterandsettingupstrongpasswordstonottogettrappedintheworldofweb.

So,thesearethetypeofcyberattacksthatcouldhurtyourcompanytoagreatextent,wehavealsolistedouttheprevention methods,thatwilleventuallyhelpyoutobesafeintheweb.

Threat O Care 36 | December 2017 |

Silent Circle: Securing Enterprise Communications in the Cyber-Espionage Era

Endowedwithsomeofthebestmindsinmobile technology,encryption,security,andprivacy,SilentCircle istheleaderintheprivacyandsecurityofenterprise communications.Ithelpstokeepconversationsbetween employees,customers,andpartnersprivate.

SilentCircleprovidessecurebusinesscommunicationsinthe cyber-espionageera,bydeliveringSaaSandhardwaresolutionsin conjunctionwithitsproprietaryZRTPcryptography.Ithelps companiesandfirmsinmanagingtheircriticalinformation rangingfromdesktopmessagingtoportablefirewalls,withits productslikeGoSilent;andspecializesinmakingdatainmotion incrediblysafe.

TheanswertoCyber-criminals

AccordingtoSilentCircle,mobiledevicesareanintegralpartof everydayhumanlife,whereinpeopleusesthesedevices24hours aday,sevendaysaweek.Smartphoneshavealreadyreplaced computers,cameras,andisalsohelpinghumansincompleting variousday-to-dayworkslikeemailingco-workers,messaging friends,andinmakingphonecalls.

Withsomanysmartdevicesperformingmission-criticalfunctions andtransferringexabytes,ifnotzettabytesofdata,mobile platformsandtheirvulnerabilitieshavebecomeprimetargetsfor cyber-criminals.Thesemaliciousactorsusecellularmonitoring, intercepting,anddataexfiltrationtechniquesandrunitsentire spectrumofcriminalactivitiesallacrossthenationstates.

Tocopeupwithgrowingthreatofenterprisedatabreaching, SilentCircleinnovated Blackphone,whichwascreatedsolelyfor thepurposeofprovidingbusinesseswithacompletelysecure

Protect your business behind the shield of Silent Circle 38 | December 2017 |

mobiledevicecommunication.

Blackphoneoffersaseamlessuser experience,familiarAndroid environment,andfrequentlyusedapps andservices.Additionally,Blackphone providescompletecontroloverwhen andhowdataisshared. Itssequelof development– Blackphone 2 –offers additionalsupportforMDMservices andAndroidplatformforwork purposes.TheSilentPhonesoftwareis designedtoprovideafail-safemethod ofsecurecommunicationsandfile transferonanydevice.Thissoftware andhardwarecombinationishelping organizationsingaininggreater technologyintegration,securingdata, andcommunicationinavarietyof mobileenvironments.

TheVeteraninMobileandCybersecurity

GreggSmith,CEOofSilentCircle, isaveteraninthemobilityand cybersecurityspace.HejoinedSilent CircleinJanuary2017andhas,since then,leveragedhismassiveexperience ofmorethantwenty-fiveyearstosteer thecompanyahead.Greggisamuch sought-afterspeakeratmobile, wireless,andsecurityindustryevents, andbrings-inhisthoughtleadership andexpertisetotheSilentCircleteam.

PriortoSilentCircle,Greggservedas thePresidentof Aether Systems,which isoneofthelargestandmost successfulenterprisefirmsinthe region.Inrecentyears,Gregghasalso leadteamsat Koolspan and OptioLabs asitsCEO,andcurrentlyservesonthe BoardofDirectorsfor Datatribe—an earlystageventurecapitalfirm focusingoncybersecurity

However,SilentCirclewasfoundedby PhilZimmerman—alegendinthe cryptographyworldandthecreatorof PGPandZRTP.Hehasbeeninducted intotheInternetHallofFameandis namedasoneofthe ‘Top 50 Tech Visionaries’ ofthelast50yearsaswell asoneofthe ‘Top 10 Innovators in E-

business.’ Ontheotherhand,Mike Janke,Co-FounderofSilentCircle,is anotedprivacyadvocateandaformer USNavySeal.

TechnologytoTackleFuture

Thebiggestchallengesocietyisfacing inthiscyber-crimeproneera,isthe failureofsoftwareorhardwareas independentsolutionsforcyber securityfromacomplianceor regulatoryperspective.SilentCircles’ goalremainsthesame,whereinit wantstohelppeopleinmanagingand controllingtheircontent, conversations,anddata.SilentCircles’ platformcanserveanydevicetype acrossanentireorganization,whichis inafixedlocationorwithamobile workforce.Itbringsthecombinationof hardwareandsoftwaretoeffectively checkalltheboxesabusinessclient needs,especiallyinaregulated industrylikefinance.Withitshistory beingahandsetmanufacturer,itknows alotaboutwhatispossibleandnot,as allsoftwareresidesonhardwareoris accessibleviatheweb.SilentCircle hasalreadypairedupwithCogSystem tocreateandprovidethemostinnovativemobilesecuritysolutionfor enterprisesavailabletillnow

TheLong-lastingRelationshipwith Clients

Themarketisfloodedwithcompanies providingcyber-securitysolutions,but SilentCirclestandsapartwitha shiningbadgeofSilentNetwork;it protectsvideoandvoicecalldatafrom eavesdroppingandinterceptiononWiFiandcellularnetworks.TheSilent Phonehasalreadysetastandardfor

protectingconfidential&private communicationsandisrecognizedfor itspeer-to-peerencryptionprotocol anditsimpeccableuserexperience.

ThenewpartnershipofSilentCircle andCogSystemsaimstoprovidean in-depthmobilesecuritydefense throughcombinedencryption technologyonD4Securearchitecture formobile;toprotectvoiceandvideo calldataoncellularandWi-Fi networksfrominterceptionand eavesdropping.Thetechnologyworks bycombiningtheSilentPhone softwareontheHTC,securedbyD4, whichwasdesignedtoprotect organizationsandtheiruserswithan unparalleledlevelofdataandsystem security Thesetechnological advancementsarehelpingthecompany toremaincompetitiveinthemarket andinsharingastrongbondwithits clients.

ValuesandAttributesinSuccessand itsFutureDown-the-line Datasecurityhasbeenthehallmarkfor thecompanysinceitsveryinception. Whetheritwashelpingconsumersor helpingbusinesses,thefundamental principlehasnotchanged.

ItstronglyfeelsthatSilentCircleis positionedformoregrowth. Gregg Smithconcludesbymentioning,“Data loss and breaches continue to be a problem. What is less reported on but happens very often is data loss for mobile devices. That is an area the company has always had a focus on giving our solution(s).”

39 | December 2017 |

Thereisastrangeinconsistencyinhowenterprises

managemobilecommunicationscomparedtoother typesofbusinesscommunications.

Withtraditionalvoicecommunicationsanddata communications,wedirectlycontrolhowcommunications aredeployedandusedbyouremployees.Butformobile devices,wegiveupthiscontroltoexternalmobileservice providers,creatingexpensivemanagementandregulatory headaches.

Itdoesn’thavetobethisway,whichiswhyIfounded TangoNetworksadecadeagotorevolutionizebusiness mobilecommunications.

TheCompanyisTheServiceProvider

Considerhowotherformsofcommunicationsaremanaged foremployees.

Fortypicaldesktopphoneservice,thecompanypurchases phonesfromavendoralongwithacentralsystemto providevoicecalling,conferencing,in-officedialing,and otherfeatures.Thecompanyoritscontractorwillrun cablingandpowerforthephones.Thenthecompany contractswithaserviceproviderforvoiceservices.The enterpriseisincontrolofthecommunicationssystem,and setsthepoliciesforeachuser

It’sthesamefordatacommunications.Thecompanywill contractwithaserviceproviderforInternetservice.But thenthecompanywillinstallrouters,firewalls,SBCsand Ethernetcabling,orWi-Fiaccesspointsandsimilar infrastructuretogetitsemployeesonline.Thecompany similarlyisindirectcontrolofitslocalandwide-area networks,andsetsthepoliciesforeachuser.

Inbothcases,thecompanyisactingasaserviceprovider

foritsemployees-deliveringandsupportingessential communicationsservices.

Butthismodelhasremainedbrokenwhenitcomesto mobilecommunications.

TheBrokenMobileModel

Inmoretraditionalsituations,thecompanywillcontract withamobilecommunicationsserviceproviderandbuyor leasemobilephonesandserviceforemployees.The companypaystheprovidertohandlesupport,configuration andmanagementofthephonesinadditiontotheprimary voiceanddataservicecosts.Whilethecompanyis incurringtheseexpenses,thecompanydoesnothavedirect controloverthedevicestoensurethatcorporatepoliciesare followed.Companiesthatmustmonitoremployeevoice callsanddatasessions,orarchivethemforregulatory purposes,faceaddedexpenses.

Insomecompanies,thismodelhasevolvedintoBringYour OwnDevice(BYOD)programs,oftenwhenITdepartments havesimplygivenuptryingtogaincontrolovercorporate mobilecommunicationsthewaytheyhavealwaysbeen abletomanagetheirotherservices.

Insteadofcontractingforphoneswithaserviceprovider, theemployeesarepermittedtousetheirowndevices.Then thecompanyreimbursesorotherwisesubsidizesservices. Whilethiscanbelessexpensivethanacompany-owned phoneapproach,itmakesenforcementofpoliciesvery difficult,especiallyforregulatedindustriesrequiring communicationsrecording.

Inbothcases,themobiledevicesandservicesubscriptions remainseparatefromthemainformofcorporate communications. IfIcallyoufromtheoffice,youseemy corporatenumberasthecallerID.IfIcallyoufrommy

Executive Voice 40 | December 2017 |

About theAuthor

Acompanyco-founder,Andrew SilvernowservesasTango Networks’ChiefTechnologyOfficer. Silverisanentrepreneurandbusiness technologistwhohasheldsenior managementanddirectorrolesin largeandsmallwirelesscompanies includingEricsson,NortelNetworks, ComverseandSpatialWireless.Heis anaccomplishedspeakeratwireless industryforumsandhasbeengranted morethan50patentsinwireless communicationssystems.Silver holdsanelectricalengineeringdegree andanMBAfromMcGillUniversity.

mobile,youseemypersonalmobile number,oranothernumberyoudon’t recognize.Ifyoucallmeonmymobile butIneedtotakethecallfrommy deskphoneforrecordingcompliance,I needtocallyouback,orelsestartupa specialapponmyphonetorecordthe call.

Inshort,theuserexperienceismessy, unwieldy,andlessprofessionalin appearance.

TheBetterWay Imagineinsteadthatyourmobile phonecouldbeanextensionofyour maincorporatecommunications systems.

Youcouldmakeandreceivecalls usingyourcorporatenumber You couldtransfer,conference,callwithinofficedialing.Youcouldsendtext messagesfromyourcorporatenumber andreceiveincomingtextstoyour corporatenumber-somethingyour desktopphoneprobablycannotdo. Yourcallsandtextscouldbearchived forcompliance.YourITstaffwould havedirectcontroloverwhenand whereyoucouldmaketollcalls,or evenroutethemthroughthecorporate networkstoreducecosts.

Supposeallthiswerepossibleeven withyourownpersonaldevice.Your businesscommunicationswould operateasanextensionofyour corporatephonesystemwhileyour personalcommunicationsremained totallyprivate.

That’sexactlywhatTangoNetworks’ solutionsdo.OurKinetic CommunicationsPlatformenablesa companytocontrolmobile communicationsinanentirelynew way.

SharedControl

Thebreakthroughisaninnovationin howcommunicationssignalingand routingaremanaged.OurKinetic platformcreatesacommunications controlsystemthatissharedbetween yourcompanyandyourmobileservice provider,enablingtheenterprisetobe theserviceproviderfortheir employees.

ThismeansyourITstaffsetspolicies, determinescallroutingrules,turnson features,andexecutessimilarcontrol steps.Theseenterprise-managed policiesandconfigurationsettings interfacedirectlywiththeservice providerwheretheyareenforcedon themobilecommunicationsinthe

serviceprovider’snetwork.

Thisprovidesgreatadvantagesfor bothcompaniesandtheirservice providers.Forserviceproviders,it meansthatcompaniesaretakingon muchoftheirownsupportand managementtasks.Forthecompanies, itmeanstheITstaffismoredirectlyin controlofthiscriticalformof corporatecommunications.Oursystem issupportedbymanyTier1mobile serviceprovidersaroundtheworldand isservinghundredsofthousandsof userswithenhancedmobile communicationstoday. Onnetworks whereoursolutionsarenotyet supported,wealsooffermanyofthe samecontrolcapabilitiesfor employeesthatuseAndroid, BlackBerryandIOS(Apple)devices.

Forthefirsttime,mobile communicationscanbemanagedby yourcompanypreciselytheway traditionalfixedvoiceanddata communications.Intheend,this meanseasierregulatorycompliance, lowermobilecommunicationscosts, andabetteruserexperiencethat maximizestheproductivityofyour employeesonthego.

41 | December 2017 |

Traits to Posses the Best Enterprise Security

Thefoundersoccasionallyforgetaboutimplementingimportantfundamentalsofsecurityandstartrunningafter

shiningtechnology Thesecuritybudgetsarelimited,sotheyneedtobesureaboutcoveringhighestbreachareas beforemovingontootherthings.

IBMreportedthatmorethanabillionpersonaldatawasstolenandleakedin2014alone,whichmadeitthehighest recordednumberinthelast18years.Criminalsarealwaysastepaheadoftheexistingsecuritysystems.Socompanies shouldhavebeststrategiesandpracticesforenterprisesecurity

Sohowdoweensuretohavethebestsecuritysystems?Itallhastodowithhavingasolidfoundation,whichstartswith thesebasicpractices.

StrongFirewalls

Firewallsarethefirstlineofdefenseforanyenterprise.Itbasicallycontrolstheflowofthedataanddecidesthedirection offlowofdata.Thefirewallkeepsharmfulfilesfrombreachingthenetworkandcompromisingtheassets.Thetraditional processforimplementingfirewallsisattheexternalperimeterofthenetwork,buttoincludeinternalfirewallsisthe popularstrategy Thisisoneofthebestpracticesofcompaniesbymakingitthesecondlineofdefensetokeepunwanted andsuspicioustrafficaway

SecuringRouter

Routersaremainlyusedtocontroltheflowofthenetworktraffic.Butroutersdohavesecurityfeaturestoo.Modern routersarefullofsecurityfeatureslikeIDS/IPSfunctionality,qualityserviceandtrafficmanagementtoolsandstrong VPNdataencryptionfeatures.ButveryfewpeopleuseIPSfeaturesandfirewallfunctionsintheirrouters.Tohave improvedsecurityposturecompaniesneedtouseallthesecurityfeaturesofrouters.

SecuredEmail

Itishighlycommontoreceiveemailsfromthesuspicioussources.Theemailisthemaintargetforthecriminals.An86 percentoftheemailsintheworldarespam.Evenifthelatestfiltersareabletoremovemostofthespamemails, companiesshouldkeepupdatingthecurrentprotocols.Iftheno,ofspamemailsarelarge,thenitonlymeansthecompany isatgreaterriskofgettingmalware.

UpdatingPrograms

Tomakesureyourcomputerpatchedandupdatedisanecessarystepifyouaregoingtowardsfullyprotectedenterprise.If youcan’tmaintainitright,thenupdatingalreadyinstalledapplicationsisanimportantstepinenterprisesecurity.Noone

Enterprize concern 42 | December 2017 |

cancreate100percentperfectapplications,butonecanmakechangesaccordinglytryingtokeepitwiththepace.Thus, makingsureyourapplicationisupdatewillletyouknowtheholesprogrammerhasfixed.

SecuringLaptopsandMobiles

Youmaywonderthatwhysecuringlaptopsandmobilesisinthelist.Butitistruethatsecuringlaptopsandmobilephones thatcontainsensitivedataofenterprises.Unlikedesktopcomputersthatarefixed,laptopsandmobilesareportableand thusareathigherriskofbeingstolen.Makingsureyouhavetakensomeextrastepstosecurelaptopsandmobilesisas importantasimplementingstrongfirewalls.Encryptinglaptopsandmobileswiththehelpofsoftwaresisagreattacticto befollowedforsecuredenterprises.

WirelessWPA2

Thisisthemostobviousfeatureofall.Ifcompaniesaren’tusingWPA2wirelesssecurity,thentheyneedtostartusingit. Manymethodsofwirelesssecurityare insecureandcanbecompromisedinminutes.IfcompanieshavewirelessWPA2 installed,thenitwillbedifficulttobreachforcriminals.

WebSecurity

VerizonDataBreachInvestigationsReportstatedthattheattacksagainstwebapplicationsintherecentyearshave increasedatanalarmingrate,withover51percentofthevictims.SimpleURLfilteringisnolongersufficient,asattacks arebecomingmorefrequentandcomplex.ThefeaturesthatneedtobeconsideredforwebsecuritysystemsareAV Scanning,IPreputation,MalwareScanning,anddataleakagepreventionfunction.Awebsecurityshouldhavetheability tocorrectlyscanthewebtraffic.

EducatingEmployees

Makingsurethatemployeesareeducatedaboutsafeandonlinehabitsisascrucialassecuringenterprisewithtopclass antivirusandfirewalls.Educatingemployeesaboutwhattheyaredoingandhowtobepre-defensiveismoreeffectivethan expectingITsecuritystafftotakestepslater.Becauseprotectingendusersagainstthemselvesisthemostdifficultthingto do.So,employeesmustunderstandhowimportantitistokeepcompany’sdatasafeandthemeasurestheycantaketo protectit.

Whiletheworldisapproachingwithmoreandmorecybertheftandcrimes,thesesimpleandstandardtoolsbased foundationofenterprisesecuritycanprotectthecompaniesfromsuchattacks.

Enterprize concern 43 | December 2017 |

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.