10 minute read

TOTAL SECURITY

Next Article
ENABLING DIGITAL

ENABLING DIGITAL

covery: providing a global view of all cloud apps being accessed by end users. It enables enterprises to see important metrics like traffic volume, hours of use, number of accounts and number of apps added over a given period of time. 2. Risk Assessment: Our built-in use and entity behavior analytics functionality identifies anomalies or high risk activities based on a continuously updated behavior risk score. 3. Protection and Control: Enterprises will be able to automatically enforce policies and protect against credential miss use and malicious insider acts. This will enable identification of user activities on unmanaged devices accessing unsanctioned cloud applications, which is a hot bed for risk.

How is your Continuous Zero Trust security different from a traditional approach to zero trust security?

Advertisement

Zero Trust is one of the hottest topics in cybersecurity. Forrester predicts that Zero Trust architectures will grow 200% in 2021. Forcepoint combines the best of both worlds by putting SASE and Zero Trust together to create the Zero Trust Network Access (ZTNA) - a cloud-based architecture for more efficiently and more securely protecting people and data no matter where they are. Delivered as a cloud-based service such as Forcepoint’s Private Access, ZTNA systems tailor each user’s access to just the specific applications they need. Everything else on the internal network remains hidden. This approach makes it possible for networking teams to provide remote access to line-of-business applications while security teams retain the visibility and control, they need to keep the enterprise safe.

Discuss key details of the insider threat management program?

Unfortunately, malicious outsiders aren’t the only ones organizations should be on the lookout for. The truth remains that people are the largest threat in any business. According to Varonis, a third of all data breaches in 2018 involved internal actors, and In 2019, on average, every employee had access to 17 million files and 1.21 million folders. Traditional insider threat solutions were designed for the traditional infrastructure-centric security. A combination of SASE and Zero Trust provides the security team with the ability to respond to insider risks in real time, achieved by feeding further user activity signals from endpoint monitoring and access control systems, along with the signals from the SASE environment, into the insider threat analytics.

Discuss your focus in the Middle East region and the company’s growth/ performance regionally last year in the face of COVID-19 disruptions?

The Middle East remains an important market for Forcepoint. The region is one of the highest growing regions globally due to its focus on digitalization, even prior to the pandemic. Forcepoint has registered a double-digits growth in the market and will continue to invest in the region. We are serving customer demand as a trusted adviser for leading cybersecurity solutions in the region. The pandemic meant that customers needed to pivot to remote working and we were privileged to be able to support them with their network security (SD-WAN, VPN, NGFW) as well as data security needs (CASB, DLP) during this difficult time. Looking ahead, we see more positive moves for customers and prospects as digital transformation continues apace. We expect to see growth in many industries, particularly but not limited to healthcare, Government and the financial sectors. Francisco Partners, a leading global investment firm that specializes in partnering with technology and technology-enabled businesses, has closed on the previously announced acquisition of Forcepoint from Raytheon Technologies. Forcepoint is a leading provider of cybersecurity solutions that protects the critical data and networks of thousands of customers throughout the world.

Coinciding with the transaction close, the company’s board of directors has appointed Manny Rivelo as Chief Executive Officer (CEO) effective immediately. As CEO, Rivelo will focus the company’s strategy on accelerating enterprise and government agency adoption of a modern approach to security that embraces the emerging Secure Access Service Edge (SASE) architecture. Forcepoint’s SASE approach recognizes solving today’s most pressing security problems requires tight integration of capabilities that cross traditional product boundaries. It is cloud-native, end-user aware and powered by a converged security platform, and available today through Forcepoint Cloud Security Gateway and Private Access.

“Cybersecurity has never been more important for businesses and governments around the world. As we continue to see broad-scale global attacks, the cybersecurity industry needs to evolve to deliver security capabilities to match those of today’s sophisticated threat actors. Likewise, every organization today needs to evolve its security posture to holistically integrate cybersecurity across the entirety of its business operations and culture. It can no longer be viewed as ‘just an IT issue’,” said Rivelo. “I look forward to solidifying Forcepoint’s leadership position as the global cybersecurity partner of choice for enterprises and government agencies.”

Francisco Partners completes acquisition of Forcepoint

Avinash Advani

Founder & CEO, CyberKnight

CyberKnight achieved more than $10 Million in revenue bookings in its 1st year of operations despite the impact of Covid-19 and is on track for exponential growth in 2021. Avinash Advani, Founder & CEO at CyberKnight discusses the company’s approach to cybersecurity distribution

Discuss CyberKnight 's approach and strategy towards cybersecurity distribution- elaborate about the zero trust framework and what you refer to as the Art of cybersecurity distribution?

CyberKnight’s The Art of Cybersecurity Distribution is a go-tomarket strategy that entails adding the maximum value to partners, customers and vendors simultaneously. To the vendor, CyberKnight becomes an extension of the vendor on-the-ground in each covered country in the region, from sales through support. To the customer, CyberKnight is a Trusted Advisor, helping regional enterprise and government customers simplify incident response while achieving compliance. To the partner, CyberKnight focuses on empowerment to help them differentiate themselves and drive increased profitability.

CyberKnight has built its portfolio offering around Zero Trust Security to assist customers with digital transformation including enabling a remote workforce, cloud adoption and protecting data accessed by users, devices and applications no matter where they are located. The framework is critical for organizations to consider implementing as there are inherent flaws in current security strategies and architectures since networks have evolved to hybrid environments with on-premise, cloud and mobile spaces. Data is constantly flowing outside the corporate perimeter due to the rapid adoption of cloud and the explosion of remote working, especially during the COVID-19 pandemic. Since the traditional defense perimeter is vanishing, implicit trust can no longer be assumed in the LAN because attackers are leveraging historically flat environments to compromise credentials giving them access to sensitive data. These issues also play a major role in attacker dwell time as there is a lack of lateral movement detection.

How challenging has it been building a value distribution business from scratch in the past 1 year, especially when the market has been impacted by Covid-19? What have been the key highlights of the success so far?

It was definitely challenging to build a new distribution business as we had entered 2020 with ambitious targets and goals for the year, but then in March we entered the lockdown and everything suddenly took a U-turn. Even after emerging from the lockdown, it took a good quarter for the market to return to some semblance

of normalcy. Therefore Q2 and Q3 had a disastrous impact on our ability to meet our initial 2020 plan. But thankfully, Q4 was rock solid and we managed to persevere through 2020. We are grateful and proud to have been able to achieve over $10 Million in our first year! Other than surviving the year, which is an achievement in itself, we focused extensively on two main campaigns: Zero Trust for the Remote Workforce and Unified Threat Intelligence, both of which were well received and garnered significant partner and customer interest. In addition, the other key achievements of 2020 included building the portfolio with 20+ market-leading cybersecurity vendors, onboarding more than 50 Strategic Partners across the region, building more than $60 Million in pipeline with over 900 opportunities, and deploying our on-the-ground teams across the region.

While there is a lot of work getting done through remote collaboration, there is a need for physical presence as well for Businesses to reach out to different markets. How is CyberKnight looking to achieve that balance across the region and markets of focus?

CyberKnight has the philosophy of centralized strategy, but decentralized execution. We absolutely understand that our partners and customers in each country require us to have local presence to support them. So, although headquartered in Dubai, we have deployed local sales and technical teams in all key Middle East markets. This expansion will continue step-by-step until we have effectively covered the entire region, following which our ambition is to extend the strategy into neighboring regions.

SASE is the new approach to cybersecurity in the cloud - discuss how Cyberknight has been building that approach in terms of vendors aligned with and solutions in your portfolio? SASE is definitely on our radar, but as cloud adoption has historically been slower in the Middle East as compared to other parts of the world, we decided to focus on Zero Trust Security first to build our initial offering, and have mapped our portfolio to each of the micro-perimeters in the ZTX Framework. Now, as organizations are accelerating on their cloud journey, our immediate goal is to assist them with a Zero Trust approach to the cloud, which removes trust assumptions when users, devices and applications connect. The future evolution of our offering will definitely encompass SASE, at which point we will be able to provide complete session protection, regardless of whether a user is on or off the corporate network.

How do you see organizational investments in cybersecurity going up in the region? What are the kinds of solutions that are seeing larger spends?

Other than collaboration, cybersecurity was one of the only other IT segments that grew in Q2 and Q3 last year. This is because of the rapid need that arose to move employees to a remote working environment, but then also to support this transition from the SOC. Furthermore, I do believe that cybersecurity investment will continue to increase in the Middle East as regional organizations are constantly playing catchup to cyber attackers. In 2021, I expect to see an increase in spend across various cybersecurity domains including cloud security, zero trust network access, phishing defense, password-less authentication, automated and continuous compliance, code security, and next-generation breach detection that leverages AI, deep learning and UEBA.

As a distributor, what are the value add support services you provide your partners?

We assist our partners with value-added services that span sales through support. So this includes assisting them with marketing, lead generation, sales presentations, as well as, Pre-Sales activities like technical presentations, demos, RFP responses and POCs. Then, we also assist partners with post-sales services like implementation and support, but only when they require such services, so as to not complete with their professional services offerings. We also assist partners with solution-selling around key advisory topics such as threat intelligence, threat hunting, security operations, ransomware protection, endpoint security etc.

Do you help solution provider partners opt for the right solutions from your portfolio since there may be overlaps in offerings from vendors in your portfolio? What would be the typical selection criteria in such instances?

Yes, by understanding the profile of each of our strategic partners, we align portfolio vendors to them based on their existing areas of focus, their target customer base, their cybersecurity vision, the type of partner they are: VAR, SI, MSSP etc., and of course, based on what is complementary to their current vendors. Also there is minimal competitive overlap in our portfolio as we consciously try to avoid this commonly made mistake, so that we can give maximum focus to each of our vendors. Of course there may be vendors that target the same customer budget, but technologically there is minimal duplication, unless vendors go through mergers and acquisitions themselves that are outside our control.

Have you held any virtual partner events in 2020? Are there plans to hold such engagements in 2021?

Yes, several, to map to our Zero Trust for the Remote Workforce and Unified Threat Intelligence campaigns, as well as, separate events for our respective portfolio vendors. We will absolutely continue to host such engagements in 2021 for each of our vendors aligning with their individual channel strategies and business objectives. Watch this space, as we will also be launching new innovative campaigns in 2021!

Would you be participating at this year's GISEC?

Yes, in a big way, with many of our strategic vendors participating with us as we truly believe in the potential of the show. The only caveat is that travel restrictions in the Middle East must be reduced enabling customers and partners to travel to Dubai for the event, otherwise we may have to reconsider our participation.

This article is from: