circumvent data security measures sender and no other information. of the biggest threats to information using smartphones as their This is a common trick used by security, in spite of warnings and doorway. a number of con artists to get notifications for improving the unsuspecting people to respond strengths for the same. Techniques Let’s explore some of to emails asking for personal used to gain access to a secured the most common ways information. system range from guessing in which sensitive data of passwords to hacking using from mobile phones can Phishing also remains the most advanced tools. However, such be compromised: common technique used by hackers methods are rendered difficult if the to get users to reveal highly passwords are at least 10 characters Inadvertent permissions sensitive personal information like long and consist of letters, numbers user names, passwords, credit card, in addition to symbols. As silly as it may seem, most users and banking information and so on. leak data inadvertently, believing This is simply because almost every With the right system hacked, applications to be trustworthy. working professional opens up a cybercriminals can siphon off Almost every single mobile app new email on their phones, rather large amounts of mission-critical requires access to user data on one than desktops. This makes mobile corporate data that could cause level or another. “The main challenge internet pages attractive targets millions of dollars in damages is how to implement an app vetting for hackers to replicate and steal and require months for recovery. process that does not overwhelm the information. Additionally, entire networks administrator and does not frustrate and public infrastructure can be the users,” says Dionisio Zumerle, Unsecured networks compromised if key officials don’t research director for mobile take adequate precautions. security at Gartner. There are With so many mobile applications numerous solutions and software offering a plethora of utilities, The information age that we live for avoiding applications-centered combined with the pervasive in demands that we consider data leakage. Such measures have a addictiveness of social media, information as important resources, comprehensive way of vetting apps people are more likely to browse as something precious to be and determining which ones may the internet on their phones while protected. The struggle between pose a threat, and to what levels. on the move. This greatly increases hackers and cybersecurity measures the likelihood of connecting to is a constantly evolving one and It is extremely important that unprotected internet hotspots. everyone must be constantly everyone from the casual user to Two or more people exchanging vigilant or end up as hapless victims. working professionals who access messages over an unsecured sensitive data take certain simple Wi-fi risk their messages being SR measures like not granting access intercepted by an unknown person. permissions to applications from Such messages may contain unverified developers and taking confidential information that could care not to save any corporate either be personal or official. In information on their phones. cities with free public Wi-fi, the chances of information being Masquerading and Phishing viewed by an unintended person increase drastically. It is one of the oldest and most common ways used in the theft of Weak passwords data. In spite of all the numerous security features and anti-virus Although this does not seem like software available and widespread a likely reason for theft of data, awareness regarding data security, repeated surveys carried out a disturbingly large number of by various organizations have smartphone users fall for this and suggested otherwise. This problem end up disclosing confidential is made worse by the fact that information to the wrong person. personal, as well as official or Most of the mobile applications for corporate information, can all be emails only display the name of the accessed from a smartphone on the go. Weak passwords for personal devices and login portals remain one APRIL 2019 51
Dathena Science Pte. Ltd. The Universal Layer of Information Security that enables End-to-End Data Protection Global data breaches have your entire organisation, where they exponential growth of structured already compromised 4.5 are located and who has access to and unstructured data. This billion records in the first them. increases the need for better data half of 2018, a 133 percent increase governance, or risk exposing the compared to the same time in 2017. Key Benefits: organization, its employees and its clients to harmful exploitation. This disturbing trend is cause for • Gain an accurate and concern not only for consumers but comprehensive understanding Successful governance is built on especially for your business and of all your data and where it highly precise data classification employees. resides by business category and level of confidentiality. Current solutions In light of the above-mentioned • Know which data is most are neither accurate nor time- scenario, we’re thrilled to present critical to your business efficient, which results in the Dathena Science Pte. Ltd. underperformance of Data Loss • Reduce your data risks Prevention tools and costly non- Dathena Science offers data security and management costs by compliance with regulations. and privacy management platform identifying and eliminating for real users. It offers artificial redundant data files Protect Your Sensitive Data: Data intelligence solutions to classify breaches affect all organizations data, detect anomalies related to Features: Map & Monitor all your and are increasing in frequency and access control and users at risk, Data Files, Identify your Business severity. Causes range from a simple controls risks with notifications Critical Data Discover & Eliminate unauthorized transfer of data from and workflows and manages Duplicate Files an employee to fraudulent activity data by identifying retention and to international espionage. Whether protection regulatory requirements Business Challenges – preventable or not, the results are of documents. almost always damaging to the Discover Your Data: You cannot organizations. The company was founded in 2016 protect what you don’t know. and is based in Singapore. It has Organizations of all sizes struggle to Cloud Access Security: Today, all additional offices in Singapore and understand what information they organizations either are moving Switzerland. possess, where it is located and who to or will have to move to the has access to it. cloud. Whether it is to increase Dathena Science Pte. operational flexibility, drive down Ltd.: Synopsis Comply with Data Protection data management costs or to Regulations: Data protection promote mobility and internal Dathena: Discovery regulations are proliferating around collaboration, cloud access is fast the globe: GDPR in the European becoming non-negotiable. In this You can’t protect what you don’t Union, CCPA in California, APPI in transition, security of data living on know. Japan, PDPA in Singapore, GDPL or migrating to the cloud must be in Brazil and more. Compliance top of mind. Start your data protection journey with these regulations has saddled right with Dathena Discovery and organisations with significant Whatever stage of cloud adoption immediately gain full insight into financial & operational burdens. you are in, Dathena can help you what kind of files you store across ensure that your migration to the Classify Your Data: Organizations of all sizes and sectors face an 52 APRIL 2019
cloud is happening safely, securely Business Challenges: Comply and in compliance with local with Data Protection Regulations, regulations, so you can focus on Classify Your Data, Protect Your your core business with peace of Sensitive Data, Cloud Access mind. Security Dathena: Privacy Dathena: Protect Christopher Muffat Founder & CEO Dathena Privacy scans all your files Dathena Protect boosts the to automatically and accurately effectiveness of your Data Loss Christopher Muffat: detect and map all Personal Prevention (DLP) solution by Founder and CEO Data (or PII) they may contain. ensuring Dathena’s granular Dathena Privacy then builds a classification tags & key-words Christopher Muffat is Dathena’s comprehensive library of all the are seamlessly exported to any founder and CEO. He has over 10 years Personal Data information you third-party information security of experience in information security store and provides you with a user- system. Dathena enables all known risk management, including leading the friendly, interactive visualization of information security tools with where they are and who has access highly accurate and intelligent internal SwissLeaks digital forensics to them. dictionaries, built by our multi- investigation for HSBC and thereafter patented technology, the Dathena Features: Identify & Map all your 99 A.I. core engine. acting as Head of Information Risk Personal Data, Analyse & Sort Management for Barclays Bank in Documents by Toxicity & Risk, Features: Powering Performance Europe and the Asia Pacific. Chris also Ensure Compliance with Data of all known Information Risk acted as a Senior Security Analyst for Privacy Regulations, Perform Management Tools, Intelligent Emirates Airlines, where he conducted Instantaneous Subject Access Document Labelling & Tagging, research on cybersecurity risk in Requests Automatic Data Protection Policy Enforcement safety-critical systems. Business Challenges: Comply with Data Protection Regulations, Business Challenges: Protect Chris holds a degree in Network Protect Your Sensitive Data, Cloud Your Sensitive Data, Cloud Access Administration from ISG and a Access Security Security Bachelor’s in IT from Infosup. Dathena: Classify Dathena: Detect “Leveraging the power of latest AI technologies, Dathena Classify quickly, accurately Dathena Detect sheds light on who and intelligently classifies your is creating and accessing data and Dathena is delivering data by business category and how, when and where they are breakthrough solutions by level of confidentiality. With doing it. Dathena Detect analyzes industry-leading “out-of-the- user & data behavior and alerts with unprecedented box” accuracy, the powerful you to any anomalies, allowing efficiency, speed and Dathena 99 A.I. core engine for efficient risk event mitigation accuracy to secure the quickly learns any organization’s without having to define complex privacy and data security unique documentation patterns monitoring rules. protection journey of its & classification requirements, reaching 99 percent accuracy Features: Continuous Monitoring clients.” shortly after deployment. and Detection of Data Access & Storage Anomalies, Smart Alerts Features: Live Classification for Fast Response, Integrated of Data at Rest or In Motion, Workflows for Seamless Automatic Labelling of Sensitive Remediation Information, Comprehensive & User-Friendly visualisation Business Challenges: Monitor of Classified Data Files, Holistic Data Access and Storage View of Organisational Risk Anomalies, Cloud Access Security SR APRIL 2019 53
Company & Management 10 Best Security Companies 2019 Kordia Solutions Description Hamish Guild, CEO www.kordia.com.au Kordia Solutions Pty Limited builds, operates and manages broadcast and telecommunications networks. ALTEN Calsoft Labs ALTEN Calsoft Labs is part of ALTEN Group, offering next gen digital Ramandeep Singh, CEO transformation, enterprise IT and product engineering services. The company www.altencalsoftlabs.com enables clients innovate, integrate, and transform their business by leveraging disruptive technologies like Artificial Intelligence, Machine Learning, CyberQ Consulting Dr. Rajiv Nag, Chairman & Director CyberQ Consulting was founded in February 1997, with the objective of www.cyberqindia.com providing Process Improvement and Information Security Consulting Services. Over the years, CyberQ carved out a niche for itself in the areas of Process Secure Application Assurance, Information Security Assurance and IT Consulting services. Shylaja Chandrasekhar, CEO www.secureapplication.org Secure Application is one of the leading consulting firms in Information Security. The firm has expertised technical crew. The team prides itselves in being a leading independent firm. SECUDE SECUDE is an established global security solutions provider offering Dr. Heiner Kromer, Chairman & CEO innovative IT data protection for SAP users. www.secude.com Zimperium Only Zimperium offers real-time, on-device protection against both Shridhar Mittal, CEO known and unknown threats, enabling detection and remediation of www.zimperium.com attacks on all three levels - the device, the network and the application. 360 Enterprise Security Group The leader in China’s enterprise-class cybersecurity market, 360 Enterprise Qi XiangDong, Chairman & CEO is a comprehensive group of companies focused on providing next-generation www.360.net network security products and services to governments and businesses. 360’s mission is to “make the network safer and make the world a better place”. Illusive Networks Illusive Networks, the leader in deception-based cybersecurity solutions, Ofer Israeli, CEO & Founder empowers security teams to preemptively harden their networks against www.illusivenetworks.com advanced attackers, stop targeted attacks through early detection of lateral movement, and resolve incidents quickly. Secure Code Warrior As the secure coding company, the firm’s vision is to empower developers to be the first line of defense in their organization by making security highly Pieter Danhieux, CEO, Director visible and providing them with the skills and tools to write secure code & Co-founder www.securecodewarrior.com from the beginning. Dathena Science Pte. Ltd. Dathena is a Swiss and Singaporean company developing data Christopher Muffat, Founder & CEO governance software based on machine learning algorithms. Dathena is www.dathena.io the most complete and accurate data governance platform. SR
April 2019 | RNI Reg No. - KARENG/2017/75691
Search