SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
802 SECURE, INC.: DEVELOPING ADVANCED
TECHNOLOGY FOR SECURING THE INTERNET OF
THINGS (IoT), COMBINING SOFTWARE DEFINED
RADIO WITH BIG DATA ANALYTICS
802 Secure, Inc. was honored with a Gold Medal as theSilicon Valley Start-up of the Year in April 2015by Info Security Maga-
zine; and has signed resale agreements with AT&T’s Cyber Security Solutions business unit.
8
02 Secure isbringing to
market a new and unique
approach to detecting
and preventing exploitation of
advanced wireless threats using
software-defined-radio with
deceptive networking.
The problem: as more devices
become internet-enabled, they
can be used as a gateway to hack
into a company’s IT network
to steal data, or bring down
systems. The IoT device can
become an infection vector. To
respond to the recent dramatic
increase in advanced wireless
threats and vulnerabilities, in
particular those surrounding the
Internet of Things (IoT), Garry
Drummond founded 802 Secure,
Inc. in July 2014 with leading
industry experts.
To help enterprise customers
reduce their risk of network
security breaches, 802 Secure is
developing solutionsto help de-
fend enterprise and government
agencies from new attack vec-
tors that cross the broader RF
spectrum by offering a defense-
in-depth approach through
proactive wireless vulnerability
assessment, target-aware de-
ceptive networking and attack
profiling with big data analytics.
The company’s technology was
selected at DEFCON and Black
Hat 2015 to provide visibility
into wireless threat intelligence.
802 Secure has filed several
provisional patents underpin-
ning their technology including
new innovation for P25, voice
and data trunked communica-
tions. The company’s product
P25CleanRF™, is a real-time
wireless security system which
protects mission-critical lines of
communication for first re-
sponders to help save lives.
Legacy solutions only moni-
tor the802.11 2.4GHz and 5.0
GHz frequencies for known
signature-based attacks. These
solutions fail to support proac-
tive auditing, security validation
and effectivemitigation. 802
Secure’s solution provides a
comprehensive view into the
broader RF spectrum to detect,
assess, and prevent risk from
these new attack vectors. The
802 Secure solution provides in-
trusion detection, target-aware
network deception, and pro-
active wireless vulnerability
assessment in conjunction with
big data analytics. Using 802
The man behind the
technology
Garry Drummond, Founder–
With over 20 years of experience in
Consulting, Sales, and Executive positions
in the Network Security Industry, Garry
Drummond, CISSP, CWNA, CWSP, CCDA,
hashelped many enterprise businesses
implement best-practices approaches
to riskmanagement. Prior to founding
802 Secure, Mr. Drummond worked with
Silicon Valley start-up nCircle Network
Security (a pioneerof Vulnerability Man-
agement), and Motorola Solutions Air
Defense (Wireless Intrusion Detection).
Mr. Drummond left Motorola Solutions
Air Defense in July 2014. In the same
year, Mr. Drummond founded 802 Secure,
and began developing theAirDecoy™ and
WRAT™technology for Securing IoT.
Garry Drummond, Founder
Secure’s cloud platform, security
teams can prevent RF data leakage
across the broader radio spectrum
by identifying wireless IoT vulnera-
bilities prior to loss or incident.
802 Secure’s primary market focus
is on North America, with immedi-
ate growth expected in Canada, the
Pacific Rim, and Europe.
Offering Exclusivity
through WRAT
802 Secure’s Wireless Risk Audit
Tool (WRAT) ™ is a low cost on
premise hardware device that con-
nects to 802 Secure’s cloud-based
analytics. WRAT helps defend orga-
nizations across a broad spectrum of
wireless attacks (Wi-Fi, Bluetooth,
ZigBee, RFID, NFC, and licensed
band).Designed by industry leading
wireless network architects who un-
derstand information security and
have proven track records building
and deploying large enterprise
networks, the WRAT was developed
to be the most advanced proactive
defense-in-depth wireless IoT risk
auditing and mitigation solution.
Customer’s Reviews
“Never has it been so crucial for
the industry to get its arms around
wireless security. 802 Secure offers a
new approach. Their method of using
proactive attack profiling through
deceptive networking for measuring
risk and exposure state is world class.
I look forward to working with Garry
and his team going forward.” – Bill
Worthington,Chief Security Officer
and Vice President of Security Oper-
ations, CaesarsEntertainment
“We would be very interested in the
technology 802 Secure are describ-
ing. I’ve been looking for exactly what
they are describing for some time.
Not only do I think they could have
great success with us, but I think you
could dominate the market.” – Sr.
Director, Network & Security
Architecture,
Fortune 25 company
“I have worked with Garry for
10+ years. Having purchased and
deployed mission critical security
solutions from him, I trust him
completely. A new proactive wire-
less security product with Garry’s
unique approach will fill a large
gap in the world of wireless secu-
rity. I cannot wait to evaluate the
solution. Count me in.” – Jonathan
Wong, Chief Information Officer,
PlayboyEnterprises
802 Secure: Now and in
the future…
802 Secure has gained clients across
multiple industries including Retail,
Financial, Hospitality, Healthcare
and Transportation. 802’s P25Clean-
RF product is also gaining traction
within government clients.
With the number of active wireless
connected devices expected to reach
50 billion by 2020 and the related
IoT solutionsmarket forecasted
to grow to $7.1 trillion by 2020,
802 Secure is focusing on securing
wireless connected devices against
emerging Internet of Things (IoT)
threats. As 802 Secure, Inc. con-
tinues to release additional inno-
vative market-leading solutions in
the wireless security market, the
company expects sales will grow
dramatically over the next 3 years.
“The present focus
of 802 Secure is on
securing the “In-
ternet of Things”
through proactive
auditing, monitoring
and defensive solu-
tions”

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...Priyanka Aash
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...PiyushHipparkar
 
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon (SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon Priyanka Aash
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurityIndy Dh
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based SecurityLiwei Ren任力偉
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealthInvest
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & ApproachPriyanka Aash
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020Ulf Mattsson
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
 

Was ist angesagt? (20)

Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon (SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 

Ähnlich wie Silicon Valley top 20

The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Cybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptxCybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptxSonaliG6
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020Mirror Review
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxMetaorange
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicNetmagic Solutions Pvt. Ltd.
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxSonaliG6
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iotramesh209
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 

Ähnlich wie Silicon Valley top 20 (20)

The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Cybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptxCybersecurity Trends in Telecom Industry.pptx
Cybersecurity Trends in Telecom Industry.pptx
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 

Silicon Valley top 20

  • 1. 802 SECURE, INC.: DEVELOPING ADVANCED TECHNOLOGY FOR SECURING THE INTERNET OF THINGS (IoT), COMBINING SOFTWARE DEFINED RADIO WITH BIG DATA ANALYTICS 802 Secure, Inc. was honored with a Gold Medal as theSilicon Valley Start-up of the Year in April 2015by Info Security Maga- zine; and has signed resale agreements with AT&T’s Cyber Security Solutions business unit. 8 02 Secure isbringing to market a new and unique approach to detecting and preventing exploitation of advanced wireless threats using software-defined-radio with deceptive networking. The problem: as more devices become internet-enabled, they can be used as a gateway to hack into a company’s IT network to steal data, or bring down systems. The IoT device can become an infection vector. To respond to the recent dramatic increase in advanced wireless threats and vulnerabilities, in particular those surrounding the Internet of Things (IoT), Garry Drummond founded 802 Secure, Inc. in July 2014 with leading industry experts. To help enterprise customers reduce their risk of network security breaches, 802 Secure is developing solutionsto help de- fend enterprise and government agencies from new attack vec- tors that cross the broader RF spectrum by offering a defense- in-depth approach through proactive wireless vulnerability assessment, target-aware de- ceptive networking and attack profiling with big data analytics. The company’s technology was selected at DEFCON and Black Hat 2015 to provide visibility into wireless threat intelligence. 802 Secure has filed several provisional patents underpin- ning their technology including new innovation for P25, voice and data trunked communica- tions. The company’s product P25CleanRF™, is a real-time wireless security system which protects mission-critical lines of communication for first re- sponders to help save lives. Legacy solutions only moni- tor the802.11 2.4GHz and 5.0 GHz frequencies for known signature-based attacks. These solutions fail to support proac- tive auditing, security validation and effectivemitigation. 802 Secure’s solution provides a comprehensive view into the broader RF spectrum to detect, assess, and prevent risk from these new attack vectors. The 802 Secure solution provides in- trusion detection, target-aware network deception, and pro- active wireless vulnerability assessment in conjunction with big data analytics. Using 802 The man behind the technology Garry Drummond, Founder– With over 20 years of experience in Consulting, Sales, and Executive positions in the Network Security Industry, Garry Drummond, CISSP, CWNA, CWSP, CCDA, hashelped many enterprise businesses implement best-practices approaches to riskmanagement. Prior to founding 802 Secure, Mr. Drummond worked with Silicon Valley start-up nCircle Network Security (a pioneerof Vulnerability Man- agement), and Motorola Solutions Air Defense (Wireless Intrusion Detection). Mr. Drummond left Motorola Solutions Air Defense in July 2014. In the same year, Mr. Drummond founded 802 Secure, and began developing theAirDecoy™ and WRAT™technology for Securing IoT. Garry Drummond, Founder
  • 2. Secure’s cloud platform, security teams can prevent RF data leakage across the broader radio spectrum by identifying wireless IoT vulnera- bilities prior to loss or incident. 802 Secure’s primary market focus is on North America, with immedi- ate growth expected in Canada, the Pacific Rim, and Europe. Offering Exclusivity through WRAT 802 Secure’s Wireless Risk Audit Tool (WRAT) ™ is a low cost on premise hardware device that con- nects to 802 Secure’s cloud-based analytics. WRAT helps defend orga- nizations across a broad spectrum of wireless attacks (Wi-Fi, Bluetooth, ZigBee, RFID, NFC, and licensed band).Designed by industry leading wireless network architects who un- derstand information security and have proven track records building and deploying large enterprise networks, the WRAT was developed to be the most advanced proactive defense-in-depth wireless IoT risk auditing and mitigation solution. Customer’s Reviews “Never has it been so crucial for the industry to get its arms around wireless security. 802 Secure offers a new approach. Their method of using proactive attack profiling through deceptive networking for measuring risk and exposure state is world class. I look forward to working with Garry and his team going forward.” – Bill Worthington,Chief Security Officer and Vice President of Security Oper- ations, CaesarsEntertainment “We would be very interested in the technology 802 Secure are describ- ing. I’ve been looking for exactly what they are describing for some time. Not only do I think they could have great success with us, but I think you could dominate the market.” – Sr. Director, Network & Security Architecture, Fortune 25 company “I have worked with Garry for 10+ years. Having purchased and deployed mission critical security solutions from him, I trust him completely. A new proactive wire- less security product with Garry’s unique approach will fill a large gap in the world of wireless secu- rity. I cannot wait to evaluate the solution. Count me in.” – Jonathan Wong, Chief Information Officer, PlayboyEnterprises 802 Secure: Now and in the future… 802 Secure has gained clients across multiple industries including Retail, Financial, Hospitality, Healthcare and Transportation. 802’s P25Clean- RF product is also gaining traction within government clients. With the number of active wireless connected devices expected to reach 50 billion by 2020 and the related IoT solutionsmarket forecasted to grow to $7.1 trillion by 2020, 802 Secure is focusing on securing wireless connected devices against emerging Internet of Things (IoT) threats. As 802 Secure, Inc. con- tinues to release additional inno- vative market-leading solutions in the wireless security market, the company expects sales will grow dramatically over the next 3 years. “The present focus of 802 Secure is on securing the “In- ternet of Things” through proactive auditing, monitoring and defensive solu- tions”