cio review - top 20 cybersecurity

1
The Navigator for Enterprise Solutions 20 Most Promising Cyber Security Solutions 2015 CIOREVIEW.COM C loud, along with a slew of trends such as Bring Your Own Device and mobility has given birth to a varied set of cyber security challenges. The sophiscaon and occurrence of cyber aacks today are growing at a rate similar to that of companies employing IT soluons across industries. To counter these aacks, security soluon vendors today are building innovave security and integrity soware, along with providing risk management soluons, training, and professional services. The purveyors are also coming forth to oer cloud-based systems that present clients with powerful assessment and remediaon management capabilies. These security soluon providers are building soluons to harness all-source threat intelligence and understand when and where threats intersect the Internet, enterprise, and its extended ecosystem. All these soluons enable business enes to stay a step ahead in combang the ever-growing number of cyber threats which can tarnish a rm within a maer of minutes. In this issue of CIO review, we present you “The 20 Most Promising Cyber Security Soluons 2015”, featuring the best soluon providers in the cyber security landscape which has ensured proper safeguards for businesses against cyber threats. The rms compiled in this issue have shown vast knowledge and in-depth exper se in providing cyber security soluons. A disnguished panel of CEOs, CIOs, analysts, VCs and the CIO Review editorial board has selected the top players from the highly compeve market of cyber security providers. This lisng gives an insight into what soluons are available, which are right for you, and how these soluons will impact your business. Description: Company: Fornex An advanced encrypon key management soſtware company that enables greater expansion of encrypon usage across all security conscious enterprises Key Person: Bob Guimarin, CEO Website: www.fornex.com CYBER SECURITY SPECIAL JUNE -12 - 2015 A s data breaches rapidly continue to plague organizations, many CIOs are aggressively looking at securing critical data via encryption methods. Today, enterprises have to opt for multiple Key Management Systems (KMS) due to the lack of interoperability and proprietary protocols aligned to each vendor’s devices and applications. These current hurdles foster an error prone and complex environment. Complexity is the root reason organizations are hesitant about proactively deploying aggressive encryption defenses more extensively across their business. An emerging Cybersecurity company, Fornetix, has addressed this crucial Security Dilemma. At this April’s RSA 2015 conference, Fornetix’s Key Orchestration™ ranked #1 in Server and Client compliance across all KMIP specifications when tested against eleven other members of the OASIS KMIP technical committee. "Although encrypting data has existed for over sixty years, now is the time to focus on managing encryption keys," remarks Bob Guimarin, CEO, Fornetix. Adhering to this belief, Fornetix’s approach to securing data is to enable broader encryption based remedies by delivering advanced key management solutions. Guimarin continues, “By using our solution to orchestrate data encryption, an enterprise can significantly enhance its overall cyber security posture.” TCO Reduction Fornetix's Key Orchestration™ replaces multiple KMS platforms with one that supports an array of multi-vendor devices, storage systems, web servers, operating systems, and applications. By building upon a foundation of open standards, while bridging support for legacy encryption protocols, Key Orchestration™ provides businesses with advanced encryption usage capability, enabling organizations to retain confidence in the safety and integrity of their information. Key Orchestration™ builds upon a strong operational framework of policy and workflow automation to help clients reduce complexity and their TCO. Orchestration in Action Fornetix demonstrated a significant decrease in operating costs, technical errors and omissions by reducing the rekeying time of a sensitive global satellite system from forty-eight hours to thirty minutes. Reducing complexity and automating cumbersome data entry tasks sets a future framework for more frequent and Fornetix : Delivering on Advanced Encryption Key Management 2 MOST PROMISI NG CYBER SECURITY SOLUTIONS Bob Guimarin rigorous rekeying efforts, thus reducing the attack surface. Fornetix views the management of encryption, not as a data encryption problem, but more as an operational messaging problem. "Our four cornerstone framework of a Policy Engine, Workflow Integration, Audit and Tracking Module, and High Scalability Design provide the foundation for advanced business operational use of encryption as a tool, in securing all forms of data, whether at-rest or in-transit," states Guimarin. By implementing a robust, yet easy to use policy engine, Fornetix allows organizations to effectively harden their governance, risk, and compliance practices across the enterprise, whether local, remote, mobile, or in the cloud. Furthermore, by integrating workflow and automating processes, inadvertent mismatches in managing encryption configurations are eliminated producing a consistent operational response to any given key lifecycle operation. Their Audit and Tracking module enhances an enterprise's operational and security stance, allowing for rapid and detailed analysis associated with the management of encryption keys and certificates. Fornetix has built in interoperability and scalability, from the very first solution design point within the core key management messaging level, all the way up to the end user experience level. Evolution of Security In the near future, Guimarin envisions a cyber-world where the use of encryption is ubiquitous and evolves through two stages. Currently, in what Fornetix calls the Attribute Barrier™ stage, there is an integration of discreet identity and policy security attributes, working in conjunction with encryption technologies to provide cybersecurity to tens of millions of devices. During the second stage, the Encryption Horizon™, Fornetix foresees support of tens of billions of devices operating within a high function, high frequency, and dynamically managed environment. Fornetix's Key Orchestration delivers a comprehensive key management capability-giving businesses a single pane of glass-to use encryption in securing their digital world

Upload: bob-guimarin

Post on 14-Apr-2017

84 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: CIO Review - Top 20 CyberSecurity

| | JULY 201421CIOReview| | JULY 201420CIOReview

T h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s

20 Most Promising Cyber Security Solutions 2015

CIOREVIEW.COM

Cloud, along with a slew of trends such as Bring Your Own Device and mobility has given birth to a varied set of cyber security challenges. The

sophistication and occurrence of cyber attacks today are growing at a rate similar to that of companies employing IT solutions across industries.

To counter these attacks, security solution vendors today are building innovative security and integrity software, along with providing risk management solutions, training, and professional services. The purveyors are also coming forth to offer cloud-based systems that present clients with powerful assessment and remediation management capabilities. These security solution providers are building solutions to harness all-source threat intelligence and understand when and where threats intersect the Internet, enterprise, and its extended ecosystem. All these

solutions enable business entities to stay a step ahead in combating the ever-growing number of cyber threats which can tarnish a firm within a matter of minutes.

In this issue of CIO review, we present you “The 20 Most Promising Cyber Security Solutions 2015”, featuring the best solution providers in the cyber security landscape which has ensured proper safeguards for businesses against cyber threats. The firms compiled in this issue have shown vast knowledge and in-depth expertise in providing cyber security solutions.

A distinguished panel of CEOs, CIOs, analysts, VCs and the CIO Review editorial board has selected the top players from the highly competitive market of cyber security providers. This listing gives an insight into what solutions are available, which are right for you, and how these solutions will impact your business.

Description:Company:Fornetix An advanced encryption

key management software company that enables greater expansion of encryption usage across all security conscious enterprises

Key Person:Bob Guimarin, CEO

Website:www.fornetix.com

CYBER SECURITY SPECIAL JUNE -12 - 2015

A s data breaches rapidly continue to plague organizations, many CIOs are aggressively looking at securing critical data via encryption methods. Today, enterprises have to opt for multiple Key Management

Systems (KMS) due to the lack of interoperability and proprietary protocols aligned to each vendor’s devices and applications. These current hurdles foster an error prone and complex environment. Complexity is the root reason organizations are hesitant about proactively deploying aggressive encryption defenses more extensively across their business.

An emerging Cybersecurity company, Fornetix, has addressed this crucial Security Dilemma. At this April’s RSA 2015 conference, Fornetix’s Key Orchestration™ ranked #1 in Server and Client compliance across all KMIP specifications when tested against eleven other members of the OASIS KMIP technical committee.

"Although encrypting data has existed for over sixty years, now is the time to focus on managing encryption keys," remarks Bob Guimarin, CEO, Fornetix. Adhering to this belief, Fornetix’s approach to securing data is to enable broader encryption based remedies by delivering advanced key management solutions.

Guimarin continues, “By using our solution to orchestrate data encryption, an enterprise can significantly enhance its overall cyber security posture.”

TCO ReductionFornetix's Key Orchestration™ replaces multiple KMS platforms with one that supports an array of multi-vendor devices, storage systems, web servers, operating systems, and applications. By building upon a foundation of open standards, while bridging support for legacy encryption protocols, Key Orchestration™ provides businesses with advanced encryption usage capability, enabling organizations to retain confidence in the safety and integrity of their information. Key Orchestration™ builds upon a strong operational framework of policy and workflow automation to help clients reduce complexity and their TCO. Orchestration in ActionFornetix demonstrated a significant decrease in operating costs, technical errors and omissions by reducing the rekeying time of a sensitive global satellite system from forty-eight hours to thirty minutes. Reducing complexity and automating cumbersome data entry tasks sets a future framework for more frequent and

Fornetix :Delivering on Advanced Encryption Key Management

2 MOST PROMISI NG

CYBER SECURITY SOLUTIONS

Bob Guimarin

rigorous rekeying efforts, thus reducing the attack surface.

Fornetix views the management of encryption, not as a data encryption problem, but more as an operational messaging problem. "Our four cornerstone framework of a Policy Engine, Workflow Integration, Audit and Tracking Module, and High Scalability Design provide the foundation for advanced business operational use of encryption as a tool, in securing all forms of data, whether at-rest or in-transit," states Guimarin.

By implementing a robust, yet easy to use policy engine, Fornetix allows organizations to effectively harden their governance, risk, and compliance practices across the enterprise, whether local, remote, mobile, or in the cloud. Furthermore, by integrating workflow and automating processes, inadvertent mismatches in managing encryption configurations are eliminated producing a consistent operational response to any given key lifecycle operation. Their Audit and Tracking module enhances an enterprise's operational and security stance, allowing for rapid and detailed analysis associated with the management of encryption keys and certificates. Fornetix has built in interoperability and scalability, from the very first solution design point within the core key management messaging level, all the way up to the end user experience level.

Evolution of SecurityIn the near future, Guimarin envisions a cyber-world where the use of encryption is ubiquitous and evolves through two stages. Currently, in what Fornetix calls the Attribute Barrier™ stage, there is an integration of discreet identity and policy security attributes, working in conjunction with encryption technologies to provide cybersecurity to tens of millions of devices. During the second stage, the Encryption Horizon™, Fornetix foresees support of tens of billions of devices operating within a high function, high frequency, and dynamically managed environment.

Fornetix's Key Orchestration delivers a comprehensive key management capability-giving businesses a single pane of glass-to use encryption in securing their digital world