• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Sandcastles

May 18, 2016 by Jeffrey Duran

sandcastles

Copyright: 123rf/Tomas Marek

The following is a guest post by a 2016 Secure360 Twin Cities Sponsor enSilo.

Castles are cool. The towers, the minarets, the thick stone walls and moats full of alligators. Back in their day they were what every smart ruler needed to protect their people and their land. But times change. Warfare changed too, and soon, static defenses like the castle were no longer effective.

In Cybersecurity, we’ve been building castles around our networks for years. We surround our data and our vital business information with firewalls, towers of IPS. We create bastions of defense in depth meant to keep the bad guys out and the good guys (and their data) – safe. But what about the guy that cleans your moat? Or works in sales? You can’t keep everyone out or your business just wouldn’t run.

So we put guards on the walls to keep track of all this traffic coming and going through our fortifications. These guards check and report on each visitor (IDS/IPS and SIEM) so when something or someone suspicious is found, they can sound off and call for help. The problem is, that suspect traffic? How long was it inside your castle before the guards noticed? A day? A week? Years?

A mighty fortress is cool to look at and they can stop some of the invaders – some of the time. But it sure is a lot of expense for something that ultimately isn’t working.

Your traffic must flow. Your business must run, and bad guys are going to find a way in. When they do – all of that effort, all of that planning, all of that defense in depth – it all just became an expense in depth. One you can’t afford and didn’t work very well anyway. In the end, your mighty network castle might as well have been made of sand.

Stop building sandcastles.

So shift the paradigm. Guard your data, but guard it our way. eSilo understands your data, understands that it needs to move through your network and be shared with others in order for your business to work. We just make sure that it doesn’t leave your network or get encrypted and put up for ransom.

How do we do it? Simple. It’s Magic.

Okay it isn’t magic. But it kind of works that way. Look – remember when we asked you to shift the paradigm? Here’s where we get to shifting. First off – we both know that bad guys are going to infiltrate your castle and get at your data. It’s going to happen. We just make sure that that your data can’t leave.

What enSilo does is look at one of the most common denominators of your entire business infrastructure – the operating system (OS). The magic is understanding how everything works at the OS level. The OS controls communications and files. Everything that happens to these communications (files) is a call to the OS. Need to open a communication channel? Talk to the OS. Need to move a file? OS. Want to copy something – Mr. OS will have something to say about it.

That’s where we work. So let’s say bad guys show up and decide try to make off with your data. We just stop it from happening. No false warnings, no SIEM notifications to overwhelm you.

Now there’s no magic wand at work here, just smart and accurate technology. Put simply, we have Collectors on communicating devices that passively gather OS metadata. It’s quiet, it’s behind the scenes and it doesn’t eat up CPU cycles. Our enSilo Core™ enforces everything.

Note: we say stop and not alert. We stop it cold. In real-time. Period. Then we’ll alert you.

Neat right? It gets better. Because we deal on the OS level, enSilo is agnostic about pretty much everything – agnostic to applications, protocols, even the content itself.

While all the infrastructure is guarding the castle gates we guard the exits so your data doesn’t leave. Protect what matters – enSilo your data from threat actors, and keep your business moving.

Filed Under: Guest Posts

About Jeffrey Duran

Jeffrey Duran is Director of Product Marketing for enSilo and responsible for developing and executing the product marketing strategy. With almost 30 years of communications experience, Jeffrey has built his career around solving complex communications problems for challenging industries to include cyber security, defense, web development, manufacturing and services. Jeffrey’s commercial clients are who’s-who of global business-to-business enterprises and encompass a variety of marketing and public relations challenges.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: The time to register is NOW, because today is the final day to score early bird rates. #Sec360 is the professional… https://t.co/rsIAkxmmCV
    about 18 hours ago

  2. Secure360 Conference
    Secure360 Conference: We can never thank our wonderful #Sec360 sponsors enough! Silver Sponsors @AxoniusInc @BlackBerry @Fortinet and… https://t.co/pnYxfkR135
    about 1 day ago

  3. Secure360 Conference
    Secure360 Conference: Join us for a series of FREE Student360 webinars! Topics include: How to ACE Your Video Interview, What Makes A Gre… https://t.co/rNLX3HMuc7
    about 1 day ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.