The following is a guest post by a 2016 Secure360 Twin Cities Sponsor enSilo.
Castles are cool. The towers, the minarets, the thick stone walls and moats full of alligators. Back in their day they were what every smart ruler needed to protect their people and their land. But times change. Warfare changed too, and soon, static defenses like the castle were no longer effective.
In Cybersecurity, we’ve been building castles around our networks for years. We surround our data and our vital business information with firewalls, towers of IPS. We create bastions of defense in depth meant to keep the bad guys out and the good guys (and their data) – safe. But what about the guy that cleans your moat? Or works in sales? You can’t keep everyone out or your business just wouldn’t run.
So we put guards on the walls to keep track of all this traffic coming and going through our fortifications. These guards check and report on each visitor (IDS/IPS and SIEM) so when something or someone suspicious is found, they can sound off and call for help. The problem is, that suspect traffic? How long was it inside your castle before the guards noticed? A day? A week? Years?
A mighty fortress is cool to look at and they can stop some of the invaders – some of the time. But it sure is a lot of expense for something that ultimately isn’t working.
Your traffic must flow. Your business must run, and bad guys are going to find a way in. When they do – all of that effort, all of that planning, all of that defense in depth – it all just became an expense in depth. One you can’t afford and didn’t work very well anyway. In the end, your mighty network castle might as well have been made of sand.
Stop building sandcastles.
So shift the paradigm. Guard your data, but guard it our way. eSilo understands your data, understands that it needs to move through your network and be shared with others in order for your business to work. We just make sure that it doesn’t leave your network or get encrypted and put up for ransom.
How do we do it? Simple. It’s Magic.
Okay it isn’t magic. But it kind of works that way. Look – remember when we asked you to shift the paradigm? Here’s where we get to shifting. First off – we both know that bad guys are going to infiltrate your castle and get at your data. It’s going to happen. We just make sure that that your data can’t leave.
What enSilo does is look at one of the most common denominators of your entire business infrastructure – the operating system (OS). The magic is understanding how everything works at the OS level. The OS controls communications and files. Everything that happens to these communications (files) is a call to the OS. Need to open a communication channel? Talk to the OS. Need to move a file? OS. Want to copy something – Mr. OS will have something to say about it.
That’s where we work. So let’s say bad guys show up and decide try to make off with your data. We just stop it from happening. No false warnings, no SIEM notifications to overwhelm you.
Now there’s no magic wand at work here, just smart and accurate technology. Put simply, we have Collectors on communicating devices that passively gather OS metadata. It’s quiet, it’s behind the scenes and it doesn’t eat up CPU cycles. Our enSilo Core™ enforces everything.
Note: we say stop and not alert. We stop it cold. In real-time. Period. Then we’ll alert you.
Neat right? It gets better. Because we deal on the OS level, enSilo is agnostic about pretty much everything – agnostic to applications, protocols, even the content itself.
While all the infrastructure is guarding the castle gates we guard the exits so your data doesn’t leave. Protect what matters – enSilo your data from threat actors, and keep your business moving.