In the crowded world of Cyber Security, where is the true innovation? Manoj throws light on an esoteric area of undiscovered threats and how they are handled by Cyphort.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Cyphort.
Manoj Leelanivas: I’m the President and CEO of Cyphort. I started off my professional career at Cisco about 20 years ago. I was part of the team that started Juniper Networks. I was with Juniper for a long time. I had different roles at Juniper. I ran all of engineering and all the product management groups. Then I created a software business for Johnson, our CEO, which grew to be $150 million business. I ran sales for a year and a half. One fine morning, I said, “It’s time for me to create a new startup.” I’ve done the large company and I just wanted to do something different. That’s my journey to Cyphort. >>>
A different snapshot into the Cyber Security world… can the vulnerability management providers actually see the entire network?
Sramana Mitra: Let’s start with introducing our audience to yourself as well as to Lumeta.
Pat Donnellan: First of all, let me introduce Lumeta. Lumeta is a New Jersey-based company in the cyber security space. The software was originally conceived within the environment of Bell Labs to facilitate the US government DOD to understand, at that point, the Internet. It was originally conceived as a scanning and mapping tool to identify devices and IP addresses on a worldwide basis. That was the original concept. It evolved when a number of investors that put a lot of money into it to build it out. I, along with a number of other individual investors, bought the business just over two years ago. In essence, we bought it on the premise that the future of cyber security centered on real-time as opposed to continuous.
There’s a big distinction there. Real-time network situational awareness – meaning in enterprises and government agencies, the basic premise of Lumeta is without our product, you do not understand your network. You have a 15% to 20% visibility gap in devices, networks, IP addresses, and >>>
Have you wondered what if cyber criminals could be tracked down and convicted like regular criminals? Very interesting discussion on that related issues, as well as possible entrepreneurial opportunities.
Sramana Mitra: Let’s start with some background about yourself as well as CounterTack.
Neal Creighton: I’m the President and CEO of CounterTack, which is a cyber security company. I’ve been in cyber security for about 18 to 20 years now. This is my fifth cyber company. All venture-backed. A couple of those companies are with Semantic now and one is owned by Trend Micro. CounterTack has a very big value proposition. We’ve been around for six years or so and have about 100 employees. We’ve raised $70 million or so in total. We are one of the leading companies trying to solve the problem of all these threats attacking major corporations that you read about in the newspapers these days, whether they’re State-sponsored, activist groups, or criminal elements. >>>
I am still digging into the issue of vastly enhanced exposure to cyber security threats with the advent of Internet of Things. Here we discuss that and other issues.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as Inside Secure.
Andrew McLennan: I currently serve as the President of US for Inside Secure. Inside Secure is a public company headquartered in France. We basically focus very strongly on embedded security and in particular, security elements and software security. My own particular expertise is in the area of software security, which is quite hot in the payments industry and finance in general.
Sramana Mitra: Talk to me a bit about the broader trends in your space and how does what you are doing align with those trends? >>>
The increasingly ubiquitous Internet, mobile devices, social media, and the BYOD trend are making it difficult for enterprises to control the security of the thousands of devices in their network. In the recent past, most enterprises have seen a considerable spike in the number of cyber attacks. As a result, the cyber security sector is finally getting the attention it deserves. According to Gartner, the global cyber security market is expected to grow from $67 billion in 2013 to $93 billion in 2017. Billion Dollar Unicorn Tanium is making huge inroads into this market. >>>
Ray Rothrock had a successful career in venture capital for 25 years, as a General Partner at Venrock.
He was an active investor in Cyber Security. After retiring from Venture Capital, he now has taken the helm of ReedSeal, a 10-year old security company. This discussion focuses on network analytics within the Cyber Security space.
Sramana Mitra: Let’s start with introducing our audience to yourself as well as to RedSeal.
Ray Rothrock: I’m the CEO of RedSeal. I was also the original investor of the company in 2004. As a venture capitalist for 25 years, I’ve invested in over 15 cyber security companies. This is one of them. I retired from venture and a couple of years ago the company was flat-lining out. The Board got concerned and asked me to look at it. I’ve been here for the last 18 months. RedSeal is in an emerging space called security analytics. The company’s enterprise software technology addresses large organizations and their networks. We basically understand and model the network to give you full visualization and metrics. >>>
Atlanta, Georgia has become a mini hub for Cyber Security companies. Lancope is part of that ecosystem. This conversation is an exploration of the network security side of things.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Lancope.
Mike Potts: I’m the President and CEO of Lancope. I’m a 20-year-industry veteran who has been in the software security since the evolution of mainframe security technology, which was where I started my career with a company called MSA. Then, I ran a company called Jacada, which we took public. We helped interface to the web legacy applications. I, most recently, ran a software security company called AirDefense, which was acquired by Motorola. That’s a quick recap of my experience in the industry, which leads us to Lancope. We are a network security company that provides network visibility and security intelligence to some 750 global customers at present. >>>
Applying Artificial Intelligence to Cyber Security is a significant trend. Read my interview with Mark Jaffe to learn more.
Sramana Mitra: Let’s introduce our audience to Prelert and to yourself.
Mark Jaffe: Prelert is leading a new emerging space that we call machine learning anomaly detection, which is a category of behavioral analytics. We’re building a behavioral analytics platform to enable IT operation and security to end the days where breaches go undetected for hundreds of days and where IT operations problems go undetected for periods of time. I founded Prelert about six years ago.
Sramana Mitra: Where are you located?
Mark Jaffe: The company is based just outside of Boston in Framingham. >>>
Email security and the future of email is our topic of conversation in this interview. Very intersting discussion on email marketing as well.
Sramana Mitra: Let’s start with a bit of background about Vade Retro. Tell us about the company. Tell us a bit about yourself.
Georges Lotigier: I am a serial entrepreneur. We were two associates. Together, we have created about 10 different companies. Unfortunately, my associate left two years ago. I’m the President and CEO. I manage three companies now and Vade Retro is one of them. We have founded companies in IT, mainly in security.
Sramana Mitra: Where are you located?
Georges Lotigier: Our headquarters is in Hem, France. >>>
CISOs are flooded with Cyber Security Vendors trying to sell them solutions. What are they looking for?
This and other topics are kicked around in this insightful interview.
Sramana Mitra: Let’s start with introducing our audience to yourself as well as TrapX.
Greg Enriquez: I’m the CEO of TrapX Security. TrapX is a security technology provider and services. We provide deception technology and assist enterprises in providing a duplicate of their real network. We provide a shadow network or deception technology in their environment so they can fool attackers and protect themselves from threats in the cyber environment. >>>