Page 76 - index
P. 76
BAE Systems
We interviewed Jim Anderson, President – Applied Intelligence, BAE Systems and learnt about
the acquisition of SilverSky, a Security-as-a-Service platform which delivers cloud-based
software and managed services, such as Email Protection Services with advanced Data Loss
Prevention, Targeted Attack Protection, Network Security Services, and Managed Application
Services that protect critical information simply and cost effectively. SilverSky’s highly skilled
sales, marketing and engineering workforce and experienced management team will join
Applied Intelligence’s Commercial Solutions division. Visit them online at
http://www.baesystems.com/
Daon
We were introduced to the Daon IdentityX Platform which allows organizations to mix and match
entire security systems into their overall security schema, which includes the IdentityX
Authenticator, legacy systems such as RSA tokens, Active Directory password systems and
new emerging device capabilities such as mobile phones with embedded fingerprint readers.
Daon’s IdentityX Mobile Biometrics Solution makes use of Facial Authentication with Liveness,
Voice Recognition and PIN verification. This triumvirate of Face, Voice and PIN options allows
users to select their desired means of identity verification based on the circumstance at the
moment. Visit them online at http://www.daon.com/
Grier Forensics
Jonathan Grier of Grier Forensics educated us about the dangers of malware hidden in
Microsoft Office documents which can be used to exploit devices and networks resulting in
costly data breaches, cyber espionage and more. Microsoft Office is the preferred choice for
hackers because of its popularity, and the fact that it is almost an OS in terms of functionality.
He explained that each page of a document comprises of parts and every part has a content
types and relationships. Documents can be dissected using the OfficeDissector tool which can
be found here (http://www.officedissector.com/) and the tutorial can be found here
(http://www.officedissector.com/doc/rst/ANALYZING_OOXML.html). Visit them online at
http://www.grierforensics.com/
Nuro Secure Messaging
Nuro Secure Messaging is a cognitive enterprise-grade secure group-messaging platform
designed for employees and external trusted partners to communicate in a controlled and
compliant private messaging environment. Over 3 billion people use instant messaging and that
is Nuro’s target market. They have four layers of security: at the user’s device, encryption during
transit, encryption at rest, and cognitive security that predicts breaches. Nuro can be deployed
as a SaaS solution or on-premises for complete control. It offers cross-platform support and
APIs for deployment in any IT environment along with white labeling. Visit them online at
http://nuro.im/
76 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide