Volume 2 – 2019 TAG Cyber Security Annual[3]

Volume 2 – 2019 TAG Cyber Security Annual[3]

Design – Miles McDonald, Alicia Amoroso, Rich Powell Media Services – Miles McDonald, Matt Amoroso, Laura Fanelli Finance – M&T Bank Administration – navitend Lead Author – Dr. Edward G. Amoroso Researchers – Ed Amoroso, Matt Amoroso, Felix Andersen, Liam Baglivo, Ana Bolsoni, Shawn Hopkins, Miles McDonald, Ankit Parekh, Pratik Patel, Stan Quintana, Tim Steinberg Facilities – WeWork, NYC TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2019 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2019 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice. 1 September 17, 2018 To the Reader: Conducting and transcribing a detailed interview with an expert is harder than it looks. This is the third year we’ve published our questions and the corresponding answers received from various cyber security luminaries for this TAG Cyber Security Annual, Volume 2. While we would admit considerable remaining distance between our work and Cronkite’s, we do think we are getting better. In fact, we are confident you will find this series of interviews to be the most crisp and interesting content in our three volumes – probably because our interviewees did all the work. Our primary goal in each interview was to showcase the expert views of the person being interviewed. This might sound obvious, but it is often complicated by marketing and public relations teams who certainly earn their monthly paychecks. On occasion, we would submit questions and receive back cut-and-pasted responses perfectly phrased from a brochure: “Our industry-leading security solution provides superior protection of your critical assets on both premise and in the cloud.” We tried to push back whenever we received anything vacuous like this. For the most part, however, our experts – forty-five in total – were selected because their voice was simply worth hearing. Too many enterprise security teams avoid vendors like the plague, and this is a lose-lose situation. Enterprise teams lose out because they are deprived the amazing perspectives available from the cyber technology community; and the vendors lose out because they drive customers away by being too pushy about why their product would have solved the problems of Target, Sony, OPM, and Home Depot, not to mention stock fluctuations and global warming. Our interviews cut through all of that. We recommend that you use these interviews in your day-to-day source selection or vendors and partners. If you are considering a purchase in some area of cyber security protection, then check to see if a principal from that firm is included here (or in our two previous volumes published in 2016 and 2017). Take a moment and read their words, because it will help provide for you with a sense of their purpose, belief, and intent. It’s been our experience at TAG Cyber that understanding what a company and its principals believe is often the most important factor in determining whether their products will fit your needs. By the way, if you are a vendor and haven’t been included here – but believe this is an injustice the size of our galaxy, then please feel free to drop us an email at [email protected]. We will do our best to set up time to review your solution offering. We cannot promise that we will make it together to second base, but we promise to try to listen to your message, and to try to understand what you and your team are about. Our experience dictates that this is the optimal means for any industry analysts to advance the community. Wishing you nothing but the best in your cyber security work this year, enjoy this volume – and we hope it helps you save time, effort, and money. Dr. Edward G. Amoroso Chief Executive Officer, TAG Cyber LLC Fulton Street Station on Broadway 2 2019 TAG Cyber Distinguished Vendors Each year, we cover roughly 2000 vendors in the cyber security industry and write a one-pager for Volume 3 of this Annual. From that large group, we down-select about 200 or so to deep-dive their technology and usually to generate an article, blog, or technical article. We do this work gratis – and enjoy every bad-business-model-because-it’s-free minute of the work. Every day, we try to assist the industry – and that includes you – with this work. You should follow Edward Amoroso on LinkedIn or @hashtag_cyber on Twitter to gain access to this stream of content. In addition, however, we down-select the list to about 40 or so cyber security vendors that we believe are truly worth spending serious time with during our year. These vendors become our TAG Cyber Distinguished Vendors, and we channel their technology message to you through a series of articles, webinars, white papers, technical reports, eBooks, videos, interviews, and on and on. This report would not be possible without their technical, in-kind, time, travel, research, meeting, and financial assistance to TAG Cyber throughout the year. The list of 2019 Distinguished Vendor sponsors is provided below and I hope you’ll take a moment to review the list. These are fine companies: 3 Table of Contents 1. Ravi Khatod, Agari ………………...……………………….….…………...…………….…… 06 2. Tushar Kothari, Attivo Networks ……………….……….……………..……………….. 08 3. Toby Weir-Jones, Bayshore Networks …………………….…….……………………. 11 4. John Hayes, BlackRidge Technology …………….….………………………………….. 13 5. John Aisen, Blue Cedar …………………………………..………………………..…………. 15 6. Karl Falk, BotDoc …………………………………………..……………………………………. 17 7. John Viega, Capsule8 …………………………………….……………………………………. 20 8. Sameer Malhotra, CIX Software …………………….……………………………………. 23 9. Carson Sweet, CloudPassage …………………..…….……………………………………. 26 10. Bruce Gregory, Corsa Technology ………….………….……………………………… 28 11. Nir, Gertner, CyberArk ……………………………………………………………………… 31 12. Stu McClure, Cylance …………………………………………………………………………. 34 13. Guy Caspi, Deep Instinct ……………………………………………………....…………… 36 14. Gordon MacKay, Digital Defense ………………………………………………………….. 39 15. Ken Levine, Digital Guardian ……………………………………………………………… 43 16. Tony Pepper, Egress ………………………………….…………………………….………… 46 17. Peter George, empow ……………………………………….………………………………. 48 18. Ram Krishnan, F5 ……………………………………………….……………………………… 50 19. Jonathan Nguyen-Duy, Fortinet ………………………….……………………………… 53 20. Henry Harrison, Garrison ………….………………………….………………....………… 55 21. George Avetisov, HYPR ………………………………....…………………………………… 57 22. John De Santis, HyTrust ……………………………………………………………………… 60 23. Michael Ehrlich, IronNet Cybersecurity ………………….………………………….. 63 24. Elad Yoran, Koolspan ……………………………………………….………………………… 66 25. Eddy Bobritsky, Minerva Labs ……………………...………….………………………… 68 26. Bill Diotte, Mocana …………………….…………………………….………………………… 70 27. Darren Ansee, NETSCOUT Arbor ……………………………….……………………….. 72 28. Justin Zeefe, NISOS Group ………………………………………………………………….. 75 29. Mike McKee, ObserveIT ……………………………………………………………………… 79 30. Dan Burns, Optiv ……………………………………………………….……………………….. 81 31. Sudhakar Ramakrishna, Pulse Secure …………………………………………………. 84 32. Eric Hipkins, R9B ……………………………………………………...………………………… 87 33. Mike Armistead, Respond Software ………………………..…………….…………… 89 34. Mario Vuksan, ReversingLabs …………………………………………………………….. 91 35. Srinivas Mukkamala, RiskSense ………………………………………………………….. 94 4 36. Steven Sprague, Rivetz ………………………………………………………………………. 96 37. Doug Howard, RSA …………………………………………………………………………….. 98 38. Guy Berjerano, SafeBreach …………………………………………………………………. 101 39. Nish Bhalla, Security Compass …………………………………………………………….. 104 40. Greg Taylor, Sertainty ……………………………………………….………………………… 106 41. Sumit Agarwal, Shape Security …………..................................................... 109 42. Hugh Thompson, Symantec ………………………………………….…………………….. 111 43. Jay Kaplan, Synack …………………….………………………………….……………………… 114 44. Ed Amoroso, TAG Cyber ………………………………………………….…………………… 117 45. Bruce Flitcroft, TenFour …………………………………………………….………………… 119 46. Alexander Garcia-Tobar, Valimail ………………………………………..………………. 121 47. Marc Woolward, vArmour ……………………………………………………..……………. 124 5 Offering DMARC- Based Solutions for Email An Interview With Ravi Khatod CEO Agari WHEN EARLY email security standards emerged such as DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework), the community took notice of the weaknesses inherent in the email protocol. As these

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    126 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us