Alex bootstrapped Datablink from Brazil to $7.5 million addressing cyber fraud. He discusses the trends in his current markets – Brazil and East Asia – as he gets ready to penetrate other markets.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Datablink.
Alexandre Cagnoni: I’m was born in Brazil and graduated with a Computer Engineering degree. Datablink is a Cyber Security company that was founded in Brazil in 2007. At that time, we were called BrToken. We targeted the authentication and transaction signing market. Our main focus was the >>>
According to Gartner, 8.4 billion connected things will be in use worldwide in 2017 and will reach 20.4 billion by 2020. This explosion in the number of connected devices is also multiplying the potential for cyber-attacks.
Toronto, Canada-based RANK Software provides a security analytics platform called Virtual Advisor to Security Analysts (VASA) that leverages Machine Learning and Artificial Intelligence for cyber security solutions. >>>
The recent phishing fiasco involving Hillary Clinton campaign chairman John Podesta hoodwinked even the IT staff of the campaign. It goes on to show how vulnerable traditional security systems can be to advanced attacks. This interview tackles some of the current developments in email fraud prevention and related topics.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as your company.
Markus Jakobsson: I am the Chief Scientist at Agari. Agari is a company that addresses email-based threats. The threats being things like cyber attacks mounted over the last few years and intensified. John Podesta’s suffering is one example. Business email compromise attacks is another one. A third one is ransomware. That’s the spectrum of attacks that Agari addresses.
Agari protects about 10 billion emails a day. It has two types of customers. There are the customers who want to preserve and protect their brand name to avoid >>>
Password management is a nightmare. See how the industry is evolving.
Sramana Mitra: Can one of you give us a background of the company and also please introduce yoruselves?
James Legg: I’m the CEO. Just to give you a background, Jonathan built and founded Thycotic and then decided he wanted some assistance in taking the company from roughly $25 million to $100 million. We’re fairly sizeable. He and I teamed up a year ago. Now we’re growing at a tremendous pace. I brought in several members of my team. This company today is growing at roughly 100% and we’re EBITDA and cash flow positive. We’re extremely profitable.
Sramana Mitra: Where are you located? >>>
Cyber Security is fraught with all sorts of risks. We discuss application security here as it pertains to malware intrusion.
Sramana Mitra: Let’s start by introducing our audience to you as well as to your company.
Anand Adya: It has been exciting times in the company. It’s especially a challenging time for the industry in general to adjust the security and regulation-related topics. I’m the Founder of Greenlight Technologies. I’ve been a technocrat for the past two decades having worked with esteemed organizations like Pricewaterhouse and Andersen Consulting and part of two successful startups before this.
I have always been in the tech space. Greenlight was started with the mission of helping companies automate risk compliance initiatives. We certainly have >>>
Just like your credit score, your security score is an important metric to track. Read on to see what’s happening in that realm.
Sramana Mitra: If one of you could give us some background about UpGuard as well as the two of you, that would be great to begin with.
Mike Baukes: We’re a company that basically focuses on making it easy to understand your digital posture and its digital resilience. I’m one of the Co-Founders, and I’m a Co-CEO alongside Alan Sharp-Paul.
Sramana Mitra: Are you both from the security space? What we see in the security companies is that the founders have been in the industry for a long time. >>>
In the crowded world of Cyber Security, where is the true innovation? Manoj throws light on an esoteric area of undiscovered threats and how they are handled by Cyphort.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Cyphort.
Manoj Leelanivas: I’m the President and CEO of Cyphort. I started off my professional career at Cisco about 20 years ago. I was part of the team that started Juniper Networks. I was with Juniper for a long time. I had different roles at Juniper. I ran all of engineering and all the product management groups. Then I created a software business for Johnson, our CEO, which grew to be $150 million business. I ran sales for a year and a half. One fine morning, I said, “It’s time for me to create a new startup.” I’ve done the large company and I just wanted to do something different. That’s my journey to Cyphort. >>>
A different snapshot into the Cyber Security world… can the vulnerability management providers actually see the entire network?
Sramana Mitra: Let’s start with introducing our audience to yourself as well as to Lumeta.
Pat Donnellan: First of all, let me introduce Lumeta. Lumeta is a New Jersey-based company in the cyber security space. The software was originally conceived within the environment of Bell Labs to facilitate the US government DOD to understand, at that point, the Internet. It was originally conceived as a scanning and mapping tool to identify devices and IP addresses on a worldwide basis. That was the original concept. It evolved when a number of investors that put a lot of money into it to build it out. I, along with a number of other individual investors, bought the business just over two years ago. In essence, we bought it on the premise that the future of cyber security centered on real-time as opposed to continuous.
There’s a big distinction there. Real-time network situational awareness – meaning in enterprises and government agencies, the basic premise of Lumeta is without our product, you do not understand your network. You have a 15% to 20% visibility gap in devices, networks, IP addresses, and >>>