Do you feel that cyber threats are becoming more sophisticated and where should the responsibility for mitigating threats lie within an organization?
As technology becomes more and more sophisticated, so do the perpetrators of this medium. It is generally accepted that a successful cyberattack is not a question of “if”, but of “when”. Cybercrime is an extremely lucrative business, opportunities for the “digital mafioso”, criminals, “hacktivists” and even nation states that are only driven by Covid-accelerated digitization programs (remote working), the speed and size that today’s high-tech Connectivity offers and the increased attack surface that is offered by the employees and the supply chain of a company. Whether it’s theft of personal data or IP, DDOS attacks, ransomware or fraud – the associated organizational risk can be enormous. Fines, reputational damage, loss of business and credibility make cyber an important issue for the board of directors and the responsibility of every single employee. Cybersecurity must encompass people, processes and culture – supported by ICT. Bridging the gap between technology, culture and information governance is critical if organizations are to build a successful defensive. It is no longer acceptable to blame the technology department when âhuman errorâ is repeatedly recognized as the main character.
Tell us about RevBits – and how your past paved the way for differentiated solutions in a crowded market?
RevBits was originally founded in 2016 as a tier 3 cybersecurity service provider that effectively solves these perceived unsolvable problems. This “out of the trenches” period led to the development of our core portfolio of patented next-gen solutions, which are designed to close the gaps left by established suppliers and the specific needs “and wishes” of the customer. The early support period also provided valuable insights into the interaction between the business-critical information, weaknesses and risks of a company. This in turn ensured that a strong information security feature was incorporated into the design of the RevBits product set to reflect the requirements for accessibility, availability, authentication, integrity, non-repudiation, and confidentiality of information. RevBits understands the problems businesses face and has developed a number of products and services to address them.
The following is just a snapshot of where requirements have driven product development. The reputation of a very large retailer was at stake when a malicious entity took control of the kernel of one of their mission-critical systems. Since the ‘kernel’ is widely considered to be the brain of any computer system, it is widely believed that if it is inappropriately accessed, it is game over. Through intensive forensics and development, RevBits solved the problem and then patented this technology to ensure that such unauthorized access to the kernel and file registry is blocked. No other organization can operate at the kernel level this way. Unauthorized access to business-critical systems, a lack of integration and lengthy product rollouts also drove the development of our Privileged Access Management (PAM) tool. RevBits PAM uses “jump servers” that native clients can handle for a variety of protocols such as SSH, RDP, VNC, MSSQL, PostgreSQL, Oracle, and more. As a result of reverse engineering all of these protocols, native client traffic can be intercepted, recorded, and redirected. RevBits PAM is Unmatched in the market for configuration, least privilege options, verifiability, integration and rapid implementation. Numerous industry certifications now require companies to have such PAM solutions. From a forensic analysis perspective, frustration at the inadequacies of established solutions drove the development of arguably the best forensic EDR feature on the market with triple endpoint analysis – to include machine learning and signature scanning as well as behavior analysis. A recent study by an independent ICSA laboratory 0 false positives and 99.3% detection rate. Phishing is responsible for well over 92% of all cyber breaks, ransomware and credential harvesting attacks, all of which start as phishing. The market accepts that leading SEGs have an email âmiss rateâ of over 24%. To fight this RevBits Email Security solution uses patented algorithmic endpoint analysis to detect and block complex complex phishing attacks and impersonation attacks. This product is “complementary” to existing SEGs, but is instrumental in eliminating this failure rate. To address the other half of the phishing problem – human error – RevBits is in the process of finalizing a complete and comprehensive phishing simulator solution that mimics likely attack paths and techniques, provides advanced reporting capabilities, and allows users to be redirected to an integrated computer – based cyber awareness training course.
Over a million hours of skilled DevOps development has culminated in the widest range of core cyber products on the market today from any pile. Building on this range of services and using behavior analysis, artificial intelligence and machine learning, RevBits award-winning “Cyber ââIntelligence Platform” (CIP) integrates ALL important components within the cyber defense implementation a tailored unified platform for actionable information in real time. The CIP automates and integrates RevBits security modules to detect, attract, alert, respond, and intelligently analyze multi-layer security data across the security stack, greatly improving SecOps productivity and reducing vendors. Across all product groups, the goal was to close gaps and weaknesses with the most effective solution and to provide improvements in all relevant “properties”, namely: visibility, functionality, agility, proactivity, scalability, flexibility, affordability, usability and compatibility.
As a company, how do you see the cybersecurity market?
The RevBits approach is to understand the “pain points” within the customer base in order to mitigate and remedy them.. The name “RevBits” is a symbol for “reverse” engineering and “bits”. Like Sun Tzu, the Chinese military strategist once said: “If you do not know your enemy and yourself, you are certainly in danger.” The market is inundated with well-intentioned vendors offering everything from awareness training, health checks, and a million different breakthrough technologies to address the various vulnerabilities identified. What tends to be lacking is an affordable means for organizations to identify the “most likely risks” and translate that into a finite number of governance and technology control measures. While no single organization can have all the answers, we believe that with the integration of RevBits Next Gen technology; a pragmatic logical approach to business; By targeting complementary organizations and increasing cultural awareness, it is possible to significantly reduce risks and improve an organization’s cybersecurity position.
Can RevBits act as a one-stop shop for businesses to combat cyber threats?
Given that “information governance” and “technology” are different sides of the same cyber coin, there are certain mitigation measures an organization can take to reduce the likelihood and severity of a cyber attack. RevBits has developed a wide range of leading-edge products and services that will greatly improve a company’s efficiency and efficiency and enhance digital security for better security outcomes and an improved cybersecurity posture. These solutions include: –
- RevBits core portfolio which offers the most complete, effective, and complete suite of cybersecurity products on the market today to encompass RevBit’s Cyber ââIntelligence Platform – CIP / XDR; Email security; Endpoint Security / EDR; Privileged Access Management – PAM; Deception Technology and Zero Trust Networking – ZTN.
- RevBits Integrated Awareness Training. People are the greatest asset and the greatest threat to companies. Since human error is responsible for the majority of reported ICO violations, âawareness trainingâ is key. To remedy this, RevBits is evaluating various options for integrating computer-based training modules into our software.
- RevBits ‘Knowledge Center’ provides useful information and sample templates to highlight some of the other important areas of information governance that can contribute to an organization’s cyber defense strategy.
What is your channel strategy for the UK and can you discuss the key components of your channel program?
Absolutely. RevBits’ business model is based on an 80:20 indirect: direct business, our success is directly aligned with that of our resellers. RevBits has a multi-pronged approach that includes:
- Signing only a finite number of VARs / VADs / MSSPs to avoid channel conflicts plus multi-tenancy for MSSP and MSP customers;
- The ‘reseller portal’ offers a central point of contact for sales and technical training; Sales collateral; Contracts; Customer voices and escalation processes;
- “Continuous Improvement” from an ongoing commitment to reviewing the product portfolio in line with the ever-changing market and threat landscape to ensure that gaps are filled quickly and market needs are met;
- âKnowledge Centerâ with useful documentation, facts and templates that will help you to help âyourâ customers;
- Marketing. A range of national and global marketing initiatives including: – Press releases, editorials, advertisements, virtual and physical trade events, round tables and seminars. The following inquiries are directed to our resellers in the country;
- RevBits understands the problems our customers are facing and is uniquely able to help you improve their security situation in an economically advantageous manner. The pricing structure is simple, scalable and reflects the projected customer requirements.
About Kristina Holland
âI am very excited to have the opportunity to launch the RevBits product portfolio in the UK and Ireland.
We are actively looking for “suitable” sales partners to expand our presence in this region. RevBits is small enough to be flexible, new enough to be current, and agile enough to respond to market changes. If you are interested in becoming a partner, please contact: [emailÂ protected] or visit us at the upcoming International Cyber ââExpo in London. Stand A30: – https://www.internationalcyberexpo.com/revbits-visitor. “
Kristina is an experienced, security cleared, commercially minded, and successful business woman with a proven track record in providing information assurance and cybersecurity solutions; outsourced technology and professional C-level products and services in diverse industrial sectors within the UK and global markets.