CHANNELS

Subscribe to the InfoTech eNewsletter

infoTECH Feature

December 10, 2015

The Threat is Real; Don't Be the Catalyst for Hacker Success

The instant access we have to information, entertainment and individuals comes with a price – the networks we use are attractive to others and under attack. It makes sense; if we’re using the same networks to transfer information that could potentially put millions in the hands of the individual with the best hacking skills, why wouldn’t they try?

And try they do, putting cybersecurity break-ins at an all-time high. While we hear about the ones that affect the big brands, like Target (News - Alert) and CitiBank, there are a number of smaller entities with fewer IT resources under attack at all times. It can make for very disturbing operations among those who are limited in resources to provide the protection they need.

Products to combat the threat continue to increase in number, but those who are trained to beat them are doing the same. For this reason alone, it’s not wise to combat the threat on your own, even if you no longer fall into that small business umbrella. But how do you know who to trust? Every provider on the market will tell you their solution is the best, yet not all are performing according to expectations or the number of successful breaches would be declining.

To explore this concept, Junaid Islam with Vidder joined TMC’s (News - Alert) Rich Tehrani in the TMC newsroom. One thing Islam highlighted is the fact that cyberattackers are very good at breaking a specific product. Every time a product enters the market, the primary hacker goal is to learn the product and break it. For that reason alone, it doesn’t make sense to build a security solution based on one product.

In order to produce the best protection, security measures have to be merged with software so the cyberattacker has to break multiple systems at the same time in order to gain entry to the network. The fusing of different solutions and methods builds a stronger system, a key focus for Vidder and one of the reasons the company continues to grow and enjoy validation from its customer base.

Islam explains, “Secure networking or the concepts behind it such as verifying your identity, device, etc. is not new. People aren’t doing it because usability has been terrible. If it takes you five or ten minutes to connect that isn’t acceptable. We have totally automated them from a human prospective. They simply press a button and within two seconds we do five things to verify identity, role, etc. So, now there is no excuse not to have a highly secure network. Everybody can press a button and that’s what we do.”

To learn more about how Vidder is shaking up the market, watch the full interview below: 




Edited by Kyle Piscioniere
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers