point
Menu
Magazines
Browse by year:
March - 2013 - issue > CEO Spotlight
Guard the Perimeter of Cloud and Address Cyber Crimes
Vijay Basani
President & CEO-eIQnetworks
Tuesday, March 5, 2013
The Massachusetts headquartered eIQnetworks is a provider of simplified security and compliance solutions, helping to transform how organizations identify threats, mitigate risks and enable compliance. Founded in 2001, the company has received a total funding of $10 million from Venrock.


Today, increasingly customers are interested in cloud security and IT security in general. More and more customers are paying attention to breaches, and becoming more aware of different types of breaches such as APTs and cyber - attacks, while at the same time trying to meet compliance challenges.

In the IT security vertical, increasingly customers are talking about the challenges of meeting new headaches with limited IT budgets and a huge shortage of security professionals. Now if one talks about the segment EIQ addresses – SIEM and log management — the trends seen are: demands for visibility into security and compliance, automation of security analysis and correlation tasks, meeting security threat detection challenges in a cost effective fashion and deriving value from their investments quickly.

Unfortunately, SIEM and log management solutions to-date have failed to address these challenges as every vendor’s solution has proven cumbersome to deploy, expensive to procure, and requires constant tuning over long periods of time that too only if they get value.

Dodging Security Concerns

As an increasing amount of IT infrastructure moves to the cloud, security challenges in the cloud will need to be addressed. The current cloud providers do not provide sufficient security and activity related data that can be easily analyzed to protect against newer types of threats such as cyber-attacks and APTs. I believe that as cloud technologies mature, cloud providers will need to address this concern so that customers who utilize cloud infrastructure can gain visibility into their security postures within the cloud.

Similarly, with increasing adoption of mobile technology, the traditional security perimeter is no longer secure. Wireless mobile technology security analysis is expected to become an increasing requirement for SIEM and log management vendors to address in the near future.

In our perspective the recently issued executive orders from President Obama with regard to cyber security as the first step towards a comprehensive cyber security law. I am of the opinion that this law would incorporate and address private sector concerns while at the same time providing information sharing and collaboration between government and private sector which will provide additional security to critical infrastructure such as banking, industry, telecom and utilities sectors.

I predict that cyber-attacks will continue to increase in sophistication and intensity, which would finally force companies of all sizes to begin focusing more on security versus traditional approaches taken of checkbox compliance. In order to address these challenges, customers must implement next-generation security analysis solutions that provide proactive answers to potential problems.

Good Service is not a Synonym of "Brand" name

One of the challenges entrepreneurs always face is to compete for quality talent with large companies. Second, entrepreneurs that have ideas that can radically change the industry must overcome big companies with brand name recognition as well as these companies' ability to slow innovations through confusing marketing messages. But as an entrepreneur, it is also very gratifying when we are not only able to win against goliaths with brand names, but also able to deliver the best possible security protection for customers.

Twitter
Share on LinkedIn
facebook