WebRTC Solutions Industry News

TMCNet:  Co3 Systems Gathers C-Level Security and Privacy Expertise in New Advisory Board

[February 26, 2013]

Co3 Systems Gathers C-Level Security and Privacy Expertise in New Advisory Board

(Marketwire Via Acquire Media NewsEdge) CAMBRIDGE, MA -- (Marketwire) -- 02/26/13 -- Co3 Systems, a pioneer in Incident Response software, today announced the founding members of its Advisory Board. Comprised of senior information security, privacy risk and compliance executives, researchers, high tech innovators, and entrepreneurs, the Board's charter is to help Co3 drive the next phase of innovation in security incident response.

With the launch this week of a major platform expansion to bring Co3's value to a range of security incident response scenarios such as Distributed Denial of Service attacks (DDoS) and malware infections, Co3 is gearing up to accelerate the momentum it achieved in 2012 -- including a fourfold increase in year-over-year bookings and customer base. The new module is built upon and expands beyond the company's highly successful Privacy Breach Response module that addresses Personally Identifiable Information (PII)/regulated data breaches. The Advisory Board was assembled to provide broad and deep experience in technology, business and legal dynamics to inform and optimize continued development of the Co3 solution.

The Co3 Systems Technology Advisory Board includes: -- Joseph DeSalvo, Managing Director, Zero Point Risk Research DeSalvo served as Chief Security Officer (CSO) for Iron Mountain and was a Special Agent at the Federal Bureau of Investigation (FBI).

"Today's reality includes facing a state of perpetual threats and compromise. This doesn't mean however, that organizations must remain easy prey. What sets a business apart in this predatory environment is a balanced strategy of prevention, robust incident response capabilities and following an incident, a quick and decisive response. Co3 represents an opportunity for organizations to empower themselves and consistently ensure a complete, comprehensive and compliant response." -- Gerhard Eschelbeck, CTO & Senior Vice President (SVP), Sophos Gerhard is the author of the "Laws of Vulnerabilities" and one of the inventors of the Common Vulnerability Scoring System (CVSS). As a technology pioneer, he held numerous senior executive positions at Webroot, Qualys and McAfee. He is a widely regarded expert on network and system security, and was invited to present his research in information security to the U.S. Congress.

"As technologists and innovators, we need a feedback loop, especially in security. Understanding where certain controls succeed or fail is how we improve -- the more input we have, the better we can be, and the faster we can get there. While Co3 provides tremendous value as a tool for preparedness and response, it also represents a great opportunity for technologists to understand the relative strengths and weaknesses in how technologies, controls and the people who interact with them are deployed." -- Samir Kapuria, Vice President, Business Strategy and Security Intelligence, Symantec Kapuria has held management and technical positions at @stake; BBN Technologies, and Bankers Trust.

"Better security is built on better intelligence. The more information we have at our disposal, the better we can handle the unpredictable nature of threats to the business. While most think of attack profiles and malware samples when they think of security 'intelligence,' equally important is capturing how business processes and audiences consume that intelligence. By creating a rich structure and tools for guiding preparedness and response, Co3 is creating additional value in security intelligence and helping to build better security overall." -- Eugene Kuznetsov, Executive & Entrepreneur Kuznetsov is Founder of DataPower and Abine, angel investor, recipient of the InfoWorld Top 25 CTOs award and Ernst & Young Entrepreneur of the Year.

"In today's world, organizations have to not only defend against cyber threats, but to also plan for the virtual inevitability of their networks being breached. What impresses me about Co3's innovation is that it provides a pragmatic solution to the problem of responding to serious security incidents while complying with all relevant regulations. " -- Stuart McClure, CEO, President and Founder, Cylance, Inc.

McClure is the founding author and lead writer of "Hacking Exposed" and has held numerous senior executive positions at McAfee, with the most recent being Executive Vice President, Worldwide Chief Technology Officer (CTO) and General Manager.

"As we've highlighted in 'Hacking Exposed,' to completely respond to today's advanced threats, organizations must enhance their incident response capabilities. Co3 allows organizations to be thoroughly prepared when the next big attack hits, and ready to move when it does." -- Chris McLellan, Chief Security Officer, HubSpot Inc.

McLellan served as Vice President, Risk and Compliance, Enterprise Technology Services for State Street Bank and SVP/CISO, Technology Risk Management for Fidelity Investments.

"No matter how big you are or how well you think you are prepared, breaches can and will happen. Maintaining trust in the face of this requires confidence that any breach will be dealt with swiftly and decisively. Many organizations struggle with manual, error-prone, and time-consuming approaches to breach response. What Co3 has built allows organizations to remain confident of the continuity of their business and ensure that they protect the trust of their constituents." -- Larry Ponemon, Chairman and Founder of the Ponemon Institute Dr. Larry Ponemon's research firm is dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.

"When it comes to security and privacy, the devil is in the data. Years of analyzing privacy and data breach trends make it clear that the vast majority of organizations still operate -- regardless of their words or controls -- under the 'I never thought it would happen to me' mentality. This is a big mistake. Having both designed privacy programs and analyzed the aggregate of industry preparedness, no organization should ever be comfortable with its readiness. Having put the Co3 solution to the test, I can say that organizations that use a solution like Co3 can avoid this pitfall and put themselves ahead of the pack." -- Andrew Serwin, CEO and Executive Director at The Lares Institute Serwin is the founding chair of the Privacy, Security and Information Management Practice of Foley & Lardner LLP. He has authored several books, including the leading treatise on privacy, "Information Security and Privacy: A Guide to Federal and State Law and Compliance" and has received numerous accolades in data protection and privacy by Computerworld and Legal 500.

"Many businesses who experience a breach are caught off-guard and unprepared for the complicated sea of regulations with which they must comply. Such events can consume huge amounts of time across multiple parts of the organization, driving enormous expense in personnel and consulting costs, and placing the company at risk for substantial damage to the business, imposition of regulatory fines, and uncontained brand damage. Managing the breach is important, but having an actionable plan to move beyond the incident is something each organization should try to achieve. Tools like Co3 can help companies focus on tuning an organization's response and then executing it, rather than getting mired in detail that doesn't move the needle long term." "It's tremendously gratifying to have so much talent standing alongside the company -- a clear sign from industry experts that we're on the right track," said John Bruce, CEO at Co3 Systems. "It's immensely valuable to have their counsel as we build our business." Follow Co3 Systems: Co3 Systems Blog: https://www.co3sys.com/blog Videos: https://www.co3sys.com/product-videos Events & Webinar Series: https://www.co3sys.com/news/events Twitter: @co3sys About Co3 Systems Headquartered in Cambridge, MA, Co3 Systems is an innovator in Incident Response Management solutions. The company's SaaS-based offering enables organizations of all sizes to efficiently prepare for and rapidly manage the Response Process for Security Incidents and Privacy breach events. Companies using Co3 demonstrably minimize the costs resulting from incidents. With funding from Fairhaven Capital, the company's executive team and advisors comprise experts from world-leading security, privacy, software and service organizations. On the web at www.co3sys.com Contact: Jennifer Torode CHEN PR for Co3 Systems Email Contact (781) 672-3119 Source: Co3 Systems

[ Back To WebRTC Solutions's Homepage ]

FOLLOW US

Featured Podcasts

Oracle in Enterprise Communications

Most in the industry have heard of the acquisition of Acme Packet by Oracle. What you may not know is that Oracle has a number of telecommunications products including a UC suite, WebRTC Session Controller, and Operations monitoring tools. Oracle is pursuing both the enterprise and service provider.

Featured Whitepapers

WebRTC Security Concerns

This whitepaper covers two of the most relevant topics in communications industry today: WebRTC and security. We will introduce the problem of security in WebRTC including those traditional VoIP attacks that are going to be present in WebRTC services. Later we will mention ad-hoc WebRTC attacks and protection mechanisms, to close with an overview of identity management solutions.

Migrating Real Time Communications Services to the Web

In the Internet age, businesses that own fixed and mobile communication networks, including traditional Communications Service Providers (CSPs) of all kinds, are being challenged with some tough questions: How do we stay relevant to our customers?

Delivering Enterprise-Class Communications with WebRTC

WebRTC is an emerging industry standard for enabling Web browsers with real-time communications capabilities. It enables enterprises to enhance Web sites, empower BYOD users, and improve video collaboration and on-line meetings, to name but a few examples.

WebRTC Report Extract Reprint

This document examines the growing important of WebRTC, both generally and for telecom service providers. It considers the expanding range of use-cases, the multiple layers of interoperability likely to be desired by telcos, and some implications in terms of network integration and mobility.

WEBRTC SOLUTIONS PAPERS, SLIDES, COLLATERAL

Robust Enterprise Grade WebRTC Systems and Services


The emerging WebRTC standard has become one of the industry's hottest topics – and with good reason. Being able to "communications enable the web" has Communications Service Providers as well as Enterprises busily making plans for deployment. But, as these plans unfold, reality is starting to intrude on those plans. Our expectations of telephony services are much higher than web browsing. We expect the phone to connect instantly, operate with minimal disruption, and work seamless across any network, anywhere, at any time. There is also an understanding that phone service is inherently secure. With WebRTC, the expectation is for these applications to behave in the same manner.

This session looks at the user experience and expectations of a WebRTC Enterprise service. It will also cover how a WebRTC enterprise handles security, reliability, and interoperability within browsers and networks.

ORACLE COMMUNICATIONS WEBRTC SESSION CONTROLLER

The Oracle Communications WebRTC Session Controller enables communications service providers (CSPs) and enterprises to offer WebRTC services – from virtually any device, across virtually any network – with carrier-grade reliability and security.

Sales Presentation: Oracle Communications WebRTC Session Controller

Agenda:
- WebRTC Market and Opportunities
- WebRTC Challenges
- Oracle Communication WebRTC Session   Controller
- Summary

ORACLE COMMUNICATIONS WEBRTC SESSION CONTROLLER SOLUTION

Communication Service Provider (CSP) voice service revenues continue to face pressure due to shifts in communication preferences and competition from non-traditional service providers. Voice communications are now often embedded into applications outside the domain of traditional telephony voice usage. CSPs have been challenged to effectively leverage and monetize new web-oriented communications technologies.