Originally published by Founder, Hubbert Smith

These commandments will be familiar to all leaders in the cybersecurity space:

1.    With secure networks, assume all hosts are hostile.

2.    With secure hosts, assume all networks are hostile.

3.    With secure applications, assume all users are hostile.

These are credited to IT security expert – Richard Stiennon – a top shelf thought leader, author, analyst, and founder of industry analyst firm, IT-Harvest.

We first came upon Stiennon’s commandments in a Forbes article published in 2014, in which he makes the point that there will never be a vendor in the security space that can lead as a full stack solutions provider. In fact, he resurfaced this point just a month ago on his substack page.

We agree. Our take is Data breaches are (still) daily news. Data Security Compliance regulation and lawsuits are daily news. Even with the strictest policies and protocols, credentialed users are a data security risk.

CREDENTIALED USERS can walk away with your data, it is trivial. It is time to evolve.

Unless sensitive business data is actually secure, every business: a) leaves the value of its data on the table; b) reduces the ability for data scientists and AI experts to truly innovate; c) spends more money and time on cybersecurity measures than is necessary, never mind prudent, because legacy approaches only detect data breaches but do not prevent data breach.

We’ve flipped the script. With the only patented solution on the market that prevents exfiltration, we’re revolutionizing data security. And we believe this will become the industry standard. Ours is a “first principles” approach to data security; recognizing data security is a data storage problem not a networking problem.

If you’re interested in experiencing a solution that offers prevention of data breach rather than simply detection, contact us today for a demo or to learn about participating in our customer trial.

It’s time to move away from what the industry has become accustomed to because it’s simply not good enough.

Comments are closed