The Next Big Thing – Validation of Strategy

You don’t need eyes to see, you need vision.

Everyone is looking for the “Next Big Thing”, Having been in the channel for over 25 years it’s easy to see that your only as good as the solutions and the services that you represent. It used to be a lot easier than it is now to select the vendors for the portfolio, VC money was harder to come by, there were fewer solutions on the market with very little in the way of technology overlap. Large VC investments were often a good indicator that the technology and approach was sound. The market is now awash with vendors and VC money has been until late easier to come by. To add to the volatility were also seeing a huge amount of “upstarts” in addition to the “start-ups”. The Upstarts being the guys that often have brilliant technology but haven’t got the operational scale in order to deliver the support that an enterprise customer has learnt to expect. We have also seen that vendors will often change their messaging in order to position themselves in a hotter space, even if the technology was not designed for that purpose originally.

At Ignition Technology we have reviewed 100’s of vendors. We check all the regular indicators such as financial background, burn rate, the technology and as importantly the people behind them. In addition to the regular checks we also validate the technology with enterprise customers. This really is the only way to ensure that were not only choosing the winners but there is a market and the timing is right.

Where were also seeing a shift in the market is that as solutions have gone “soft” and by that we mean you don’t need to buy appliances that are too big today and too small way before you could foresee. This makes solutions quicker to evaluate, on-board and operationalise than ever before, with customers seeing the time to value and ROI far quicker. This in itself also empowers the customer to review and swap-out solutions for alternatives far quicker giving them the agility to constantly have the best solution available without the need to sweat their assets and be tied into a hardware lifecycle.

Over the last month a number of reports and 3rd party market validation has come out in the press. Ignition technology is picking the winners in terms of technology areas and product and the market is supporting our strategy.  As an example, if we take Gartner’s latest news report on the Top 10 Technologies for Information Security in 2016, Ignition Technology already have established vendors in a number of those areas like EPP with Cylance, Remote Browser or Isolation technology with Menlo Security and Deception with Illusive Networks.

EPP (Endpoint Protection Platform), The signature approach to blocking malware is dead. The volume and velocity of new and emerging threats means that it’s no longer possible for humans to keep up with the challenge of identifying threats and creating signatures.  Like many other aspects of our lives where large amounts of data has to be analysed and processed, alternative methods are being adopted. Those most prominent being in the field of artificial intelligence and machine learning. You only need to look at what the Likes of Facebook are achieving with FAIR (Facebook Artificial Intelligence Research Program), Google with Deepmind and IBM with “Watson” to understand how this can now be applied to security. Cylance ( www.cylance.com )truly is the Next Big Thing in the Next-Generation AV space, it utilises machine learning and artificial intelligence to obtain super high efficacy rates and low false positives, Predicting and preventing todays ever evolving malware from running on what is the largest attack surface of anyone’s organisation.

Remote Browser, Menlo Security ( www.menlosecurity.com)  are now making it safe for users to access any website without the risk of malicious content being download to the or machine or executed. We’re seeing a huge uptake in Menlo Security where customers now recognise that their traditional URL filtering solutions are now not keeping up. Much like other signature based technology URL filters “only know what they know”. This means enterprise has a really important decision to make with regards to the unknowns or uncategorised websites of which there are thousands. Do you block all uncategorized and potentially stop people from working and accessing sites they need to? or do you allow everything along with the malware that they potentially bring? With Menlo you don’t need to make that decision as everything is rendered on a gateway and only the imagery is displayed on the endpoint with just a standard browser on any device. The problem is not only the uncategorized, even some of the most popular websites in the world that would be permitted will have objects and content that are presented via other providers. This content is often not pen tested and we have seen countless high profile websites with hundreds of objects that have vulnerabilities that could be used to exploit the users. If you’re looking at web and email link security then Menlo is a natural progression from what we have all been used to with legacy solutions, again a huge attack surface that can be controlled simply by stopping the malicious content from getting to the user.

 

Deception, the market for Deception based technology is on the increase – TechSci Research has predicted the global market for deception technology is projected to cross USD1.7 billion market size by 2021. Gartner have also identified deception as one of the Top 10 areas to look at in the security market. The approach of deception is very different to how we have normally approached security. We have always attempted to hunt down the perpetrators, looking for IOC’s, files touched \dropped registry entries changed and the list goes on. Hunting is a skilled and resource intensive process often human led leading to things being easily missed. We all know that some of the largest breaches in major corporations happened despite them having comprehensive alerting and logging systems. Organizations typically don’t have the skills or the resource to make hunting the most efficient approach. We have chosen Illusive Networks (www.illusivenetworks.com ) in this space, their deception approach allows the enterprise to lay “traps” for would be perpetrators to stumble over. This might be fake credentials, bogus file shares or dummy databases. The bad guys rarely use malicious software to move around the network once in. When an attacker touches one of these traps you can be sure there is a problem. For those of you old enough, think of it like the old game show Blockbuster where you need to get from one side to the other or the minesweeper game where you can’t afford to make any mistakes as you move around avoiding the mines.

These are just three of the areas that Ignition has identified early with the validation from customers and 3rd parties alike. Were also making markets and leading with technology in areas such as secure wan from Cato Networks (www.catonetworks.com) and leapfrogging traditional hyperconverged infrastructure to superconverged with Cloudistics (www.cloudistics.com).

Whitehat Security & Digital Guardian are also well placed in their respective Gartner magic quadrants for SDLC Testing and Data Leakage Prevention and RiskIQ his helping organizations get visibility of their public internet presence and associated threat vectors.

Everyone is looking for the next big thing, if you would like to learn more about Ignitions strategy and vision then please feel free to contact us.

Everyone is looking for the “Next Big Thing”, Having been in the channel for over 25 years it’s easy to see that your only as good as the solutions and the services that you represent. It used to be a lot easier than it is now to select the vendors for the portfolio, VC money was harder to come by, there were fewer solutions on the market with very little in the way of technology overlap. Large VC investments were often a good indicator that the technology and approach was sound. The market is now awash with vendors and VC money has been until late easier to come by. To add to the volatility were also seeing a huge amount of “upstarts” in addition to the “start-ups”. The Upstarts being the guys that often have brilliant technology but haven’t got the operational scale in order to deliver the support that an enterprise customer has learnt to expect. We have also seen that vendors will often change their messaging in order to position themselves in a hotter space, even if the technology was not designed for that purpose originally.

At Ignition Technology we have reviewed 100’s of vendors. We check all the regular indicators such as financial background, burn rate, the technology and as importantly the people behind them. In addition to the regular checks we also validate the technology with enterprise customers. This really is the only way to ensure that were not only choosing the winners but there is a market and the timing is right.

Where were also seeing a shift in the market is that as solutions have gone “soft” and by that we mean you don’t need to buy appliances that are too big today and too small way before you could foresee. This makes solutions quicker to evaluate, on-board and operationalise than ever before, with customers seeing the time to value and ROI far quicker. This in itself also empowers the customer to review and swap-out solutions for alternatives far quicker giving them the agility to constantly have the best solution available without the need to sweat their assets and be tied into a hardware lifecycle.

Over the last month a number of reports and 3rd party market validation has come out in the press. Ignition technology is picking the winners in terms of technology areas and product and the market is supporting our strategy. As an example, if we take Gartner’s latest news report on the Top 10 Technologies for Information Security in 2016, Ignition Technology already have established vendors in a number of those areas like EPP with Cylance, Remote Browser or Isolation technology with Menlo Security and Deception with Illusive Networks.

EPP (Endpoint Protection Platform), The signature approach to blocking malware is dead. The volume and velocity of new and emerging threats means that it’s no longer possible for humans to keep up with the challenge of identifying threats and creating signatures. Like many other aspects of our lives where large amounts of data has to be analysed and processed, alternative methods are being adopted. Those most prominent being in the field of artificial intelligence and machine learning. You only need to look at what the Likes of Facebook are achieving with FAIR (Facebook Artificial Intelligence Research Program), Google with Deepmind and IBM with “Watson” to understand how this can now be applied to security. Cylance ( www.cylance.com )truly is the Next Big Thing in the Next-Generation AV space, it utilises machine learning and artificial intelligence to obtain super high efficacy rates and low false positives, Predicting and preventing todays ever evolving malware from running on what is the largest attack surface of anyone’s organisation.

Remote Browser, Menlo Security ( www.menlosecurity.com) are now making it safe for users to access any website without the risk of malicious content being download to the or machine or executed. We’re seeing a huge uptake in Menlo Security where customers now recognise that their traditional URL filtering solutions are now not keeping up. Much like other signature based technology URL filters “only know what they know”. This means enterprise has a really important decision to make with regards to the unknowns or uncategorised websites of which there are thousands. Do you block all uncategorized and potentially stop people from working and accessing sites they need to? or do you allow everything along with the malware that they potentially bring? With Menlo you don’t need to make that decision as everything is rendered on a gateway and only the imagery is displayed on the endpoint with just a standard browser on any device. The problem is not only the uncategorized, even some of the most popular websites in the world that would be permitted will have objects and content that are presented via other providers. This content is often not pen tested and we have seen countless high profile websites with hundreds of objects that have vulnerabilities that could be used to exploit the users. If you’re looking at web and email link security then Menlo is a natural progression from what we have all been used to with legacy solutions, again a huge attack surface that can be controlled simply by stopping the malicious content from getting to the user.

Deception, the market for Deception based technology is on the increase – TechSci Research has predicted the global market for deception technology is projected to cross USD1.7 billion market size by 2021. Gartner have also identified deception as one of the Top 10 areas to look at in the security market. The approach of deception is very different to how we have normally approached security. We have always attempted to hunt down the perpetrators, looking for IOC’s, files touched \dropped registry entries changed and the list goes on. Hunting is a skilled and resource intensive process often human led leading to things being easily missed. We all know that some of the largest breaches in major corporations happened despite them having comprehensive alerting and logging systems. Organizations typically don’t have the skills or the resource to make hunting the most efficient approach. We have chosen Illusive Networks (www.illusivenetworks.com ) in this space, their deception approach allows the enterprise to lay “traps” for would be perpetrators to stumble over. This might be fake credentials, bogus file shares or dummy databases. The bad guys rarely use malicious software to move around the network once in. When an attacker touches one of these traps you can be sure there is a problem. For those of you old enough, think of it like the old game show Blockbuster where you need to get from one side to the other or the minesweeper game where you can’t afford to make any mistakes as you move around avoiding the mines.

These are just three of the areas that Ignition has identified early with the validation from customers and 3rd parties alike. Were also making markets and leading with technology in areas such as secure wan from Cato Networks (www.catonetworks.com) and leapfrogging traditional hyperconverged infrastructure to superconverged with Cloudistics (www.cloudistics.com).

Whitehat Security & Digital Guardian are also well placed in their respective Gartner magic quadrants for SDLC Testing and Data Leakage Prevention and RiskIQ his helping organizations get visibility of their public internet presence and associated threat vectors.

Everyone is looking for the next big thing, if you would like to learn more about Ignitions strategy and vision then please feel free to contact us.