TUX is an intention-based graphical user interface that offers the ability to simply tell tux in natural language what you want done. An example would be “Secure all of my web servers”. Tux does all of the natural language parsing, discerns the meaning, and more importantly, your intention, and then queues up all of the tasks that are necessary to carry out your intention. The user is presented with a list of planned actions that are recommended and all systems were secured in about 9 seconds.
3. Mutant Insider Threats
Mutant Insiders
Professional Services
Infrastructure Providers
Vendor Partners
Service Providers
Threaten
Intellectual Property
Customer Information
Confidential Information
Negotiations
Logistics
Financial
Company Dealings
4. Determining risky suppliers?
By the number of incidents in a given period?
By the severity of damage those incidents caused?
Impact on supply chain?
5. Audits & Internal Reviews?
Costly (time and money) but not really useful.
Information received will always be dated.
Most likely too late...breaches aren’t discovered
until they’ve already happened.
At which point you are in the…
7. tux is Effective Proactive Security
Stop the bad before it happens.
Operates on the belief that there is no such thing as
coincidences;
Figures out when smaller, almost insignificant events, which on
their own are probably meaningless but put together means
something is afoot
8. Because you deserve easy
Understands everyday speech, tell tux what you want and it
works continuously to achieve them, autonomously;
No need for technical, complicated cyber-security knowledge;
AI processor anticipates, understands, determines, and
achieves what you want;
tux understands and constantly learns ways to protect;
automatically chooses the best, most effective method
10. Easy integration
See, manage, and secure all connections in one place
Works on any network; protects all parts
Web servers, Email servers, DNS server, Intellectual Property
protection, files, workstations, mobile devices, anything and
everything connected to the network
Scales to meet need: 3, 300 or 3000
Traditionally we think of insider threats as someone directly inside your organization. We started researching the insider threat in 1999 (we have all seen these before)
Then there are mutant insider threats from vendors and suppliers, like legal advisors, accounting professionals and other providers who have permissible access to your information.
You might actually trust your supplier but what if they are already compromised?
What do we mean by them?
So how do we know who in the supply chain is A risk?
How do you figure out which suppliers pose the greatest risk?
How do you currently figure out who’s really the risk.
Off the top of your head, How many of you actually know the results of your supplier’s audits?
The truth is that it doesn’t matter, because you are always going to be stuck in the reactive security process
Today This is the standard operating procedure when it comes to information breach. But it’s also often after the fact. (read it out)
Stop playing the catch-up game.
Imagine a better way
This new way is proactive instead of reactive
Eliminates both traditional and mutant insider threats
It even catches colluding and aggregate attacks
Cyber security is complicated, we’ve made it easy for you.
You talk to it, just like I’m talking to you now
You don’t have to know tech speak
You don’t have to be a cyber security expert
You just have to know what you want, even if it is just as simple as ‘secure everything’
tux protects anything you want, including your fridge and coffee maker, if they are connected to your network.
It works with what you have right now
get tux now
because your supply chain is worth it
I want to thank Dave Frasier for allowing us to take part in this presentation