This discussion focuses on behavior-based network traffic analysis.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to IronNet.
>>>Ran Ilany: The second thing that we’re doing is authenticating the communication of those workloads. That is to say, the actual identity of the workload is injected into the traffic stream so that every connection would be, first and foremost, authenticated and would then be authorized.
The whole notion here is moving from IP port and protocol to workload identity that can be authenticated at runtime. This is what we call the runtime protection.
>>>This interview puts the spotlight on a highly specialized area of cyber security, identity-based workload protection.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Portshift.
>>>Sramana Mitra: Going back to the ecosystem, where do you sit in the ecosystem?
Ran Ilany: We start with the vendors for container and security solutions that focus on scanning. We assume that what goes to the runtime is clean. Then we provide the runtime protection based on those signatures that we generate that are based on the artifact.
>>>Sramana Mitra: What does the opportunity landscape look like? What are the white spaces in the scope of what you are watching carefully?
Kelly White: This isn’t new, but in some ways, it is new. Digital transformation has driven organizations to rapidly outsource systems and services to a wide range of service providers.
This digital transformation has also been accompanied with a dramatic change in the architecture on which systems are built and operated. Think of the cloud ecosystems of Amazon and Microsoft.
>>>Sramana Mitra: Could you point out the ecosystem around you in a bit more detail? Who are the people you interface with? Whom do you compete with?
Kelly White: There’s quite a large industry around managing third-party cyber security risks. The roots of that industry are in GRC platform providers.
>>>This discussion focuses on risk within the cyber security domain.
Sramana Mitra: Let’s start by having you introduce yourself as well as RiskRecon.
Kelly White: I’m the CEO and Co-Founder of RiskRecon. RiskRecon is a provider of cyber security risk readings that allows companies to solve a wide range of security challenges. Prior to founding RiskRecon in 2015, I was the CISO of a large top 25 financial institution.
>>>Sramana Mitra: What else do you want to discuss that I have not asked you?
Amos Stern: We can talk a little bit about the type of customers that would use a system like that. It’s interesting because we have two types of customers. If you look at the different types of companies that exist in a market, you can split it somewhere in the bottom-third. The top part are big enough to have their own security operations team, or big enough to have a security infrastructure and a security organization.
>>>