Feyzi has built technology that enables legacy applications to become SaaS-enabled seamlessly and rapidly. Excellent thought leadership.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Corent Technologies.
Feyzi Fatehi: I’m the CEO of Corent Technologies. Corent stands for core enterprise in the same way that Intel stands for integrated electronics. Corent was coined by one of the people who was involved in coining the phrase “Intel Inside”, which I fell in love with when I was in business school doing my MBA in Santa Clara while working for HP.>>>
Sramana Mitra: How does this trend of people working from home all the time these days and this whole gig economy thing play into all the scenarios that you’re describing?
Danny Kibel: Yes, that’s key. In the old trusted world, people were either VPN-ing into their office. In that case, they become part of this big trusted circle of their enterprise or they would work from the office which already puts them, in terms of their physical location or network physical location, in a trusted world. They’d be given almost a blank trust to do whatever it is they need to do in the organization.>>>
Sramana Mitra: Who are the key players in this space?
Danny Kibel: You see companies like Okta that started from single sign-on and are now pushing into the MFA space as well. They’re also promoting the Zero Trust concept. We’re also seeing companies like Microsoft and Ping Identity.
There are a few players in this particular space for Identity as a Service (IDaaS). But, again, our solution is a unique combination that also includes the enterprise mobility management to verify the devices as well as user behavior analytics which we were the pioneers of.>>>
Sramana Mitra: How do you solve that challenge of the Zero Trust access? How do you tackle it?
Danny Kibel: That is based on the basic foundation of Zero Trust. At Idaptive, we verify every user first and foremost. Then we verify that the device they’re using is actually a valid device that can get access to those systems.
We also basically combine User-Behavior Analytics to make sure that the users access the right system with the right level of contact. So how do we verify every user?>>>
Danny discusses Zero Trust access management.
Sramana Mitra: Let’s start by introducing our audience to yourself and Idaptive.
Danny Kibel: I’m Danny Kibel. I’m the CEO of Idaptive. Idaptive is a new company that spun out earlier in the year out of Centrify, which is a cyber security leader in the identity and access management space.>>>
Sramana Mitra: Can you suggest areas that we should cover in this discussion that the audience that we’re speaking to should know about in what you’re doing?
Ethan Schmertzler: We’re not the only company that’s starting to explore the idea of using virtual machines as dynamic disposable environments for protecting assets. You can think of Moving Target Defense as a medical glove in the sense that you can put one on and then you don’t expose any risk of data being exfiltrated.>>>
Sramana Mitra: Are you selling directly to enterprise CIO’s or are you an OEM into a Cisco, for instance? How do you go to market?
Ethan Schmertzler: We, almost always, go directly to CIO’s and CTO’s of large institutions because they’re trying to make users’ lives easier and more efficient, but they confront the security concerns of these open networks. We often get integrated directly with the institution.>>>
In this interview, Ethan discusses Moving Target Networks, a cyber defense technology. The company does about $10M ARR.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Dispel.
Ethan Schmertzler: I’m the CEO and one of the Co-Founders of Dispel, which is a cyber security and cyber defense firm that was founded in 2015. It’s based in New York City and Washington DC.>>>