Get Your Global Excellence Awards Entry Kit Now
Join the Cyber Security Worldwide Community on LinkedIn
 Home Executive Briefings Security Predictions Entry Kit Global Excellence Volunteer as Judge Register Awards About
New strategies for defending against unknown cyber-threats

Votiro delivers organizations with essential zero-day protection against unknown exploits and ongoing cyber-threats. The company’s Secure Data Sanitization solution provides a robust process and patent-pending technology for cleansing incoming files and e-mails from potential cyber-threats. The company was founded in 2010 by a team of senior security experts with backgrounds in the intelligence and cyber-security industry and is based in Tel Aviv, Israel. Customers include banks and other financial institutions, government agencies, energy and utilities companies, telecommunications service providers and large enterprises, who are relying on Votiro solutions to protect their critical IT infrastructure and sensitive data.

Info Security PG: Over the years, have any fundamental changes contributed to an increase in Cyber-threats or were such threats never taken too seriously, until now, by most enterprises? What are the biggest misconceptions around Cyber-threats?

Itay Glick: Cyber-threats and the perpetrators behind them are constantly becoming more complex and increasingly difficult to identify and defend against. This is no secret. Maybe ten, fifteen plus years ago, enterprises may have not taken cyber-threats seriously with the innocent hope that ‘it won’t happen to me’. However, for many years now, the risks have become far too high for enterprises not to understand and be prepared for the reality of ongoing and ever-changing cyber-threats. Today, with the ‘always connected’ nature conducting business, individuals and organizations are constantly exposed to threats and exploits.

As we see it, existing and widely-deployed security strategies that rely on identifying known exploits are not strong enough. To cope with increasingly sophisticated cyber-attack methods and exploits, enterprises must be in the position to neutralize potential cyber-threats, both known and unknown, before they have the opportunity to become active and operational on attacked networks.

Info Security PG: What security prediction would you make for the next 12 months? Why?

Itay Glick: Cyber-threats will continue to grow in both volume and complexity. This is an ongoing trend that will not be limited to just the next 12 months. Specifically, we believe that more and more unknown exploits will be developed, many of which will remain unknown. At the same time, we will not be surprised if there will continue to be high profile enterprises and organizations that fall victim to new forms of cyber-attacks. To be honest, I am not saying anything special with this statement and I am certain that most, if not all cyber-security experts will agree with me here.

The real question is - how will enterprises manage to deal with this reality? Our stance is that existing approaches generally employed by enterprises are not sufficient and are over-reliant on protecting against known threats. Enterprises, both large and small and everything in between, will need to be increasingly proactive and, more importantly, diversify their cyber-defense strategies to incorporate frameworks for protecting against unknown and yet-to-be identified exploits. Of course, as we know, this is easier said than done, but certainly achievable, especially with the availability of new cloud-based security solutions that can significantly enhance protection efforts against cyber-threats.

Info Security PG: Can an enterprise ever really position itself to be confidently protected against zero-day and other cyber-threats?

Itay Glick: With the understanding that security is about risk mitigation, an enterprise that is vigilant and proactive about its overall security posture can respond to this questions with a ‘yes’ answer. However, on the cyber-security side of the overall security equation, an enterprise that relies on identifying known threats will neither be confident nor protected.

We strongly believe and highly recommend that enterprises diversify their cyber-security tactics and strategy to incorporate multiple components, including endpoint protection, network behavioral analysis AND exploit neutralization. Cloud-based security solutions can also add an additional layer of diversified protection. With such an approach, an enterprise can dramatically increase its security posture against cyber-threats.

Company: Votiro
Yigal Alon 126, Tel Aviv, 67443, Israel

Founded in: 2010
CEO: Itay Glick
Public or Private: Private
Head Office in Country: Israel
Products: Secure Data Santization solution
Company’s Goals: Protect enterprises against external and ongoing cyber-threats
Key Words: Cyber protection