Experienced Global Cybersecurity expert with a proven track record of delivering innovative solutions to international corporates which enhance complex frameworks and lead to process efficiencies and cost savings.
Threat Removal solution allows a high value protected network to be connected to a low trust external network. It implements content transformation, through a process of information extraction, to protect against content level attacks and leaks and, can operate in conjunction with a verifier to deliver a high assurance protocol break and an independent verification of the information extraction process.
The bad guys are good at evading detection-based defences
Inventing new detection based cyber defences is not going to solve the problem
Poor detection efficacy means cybersecurity has become complex, slow, expensive, and energy-intensive
A fundamentally different approach to the problem of malware
Stop chasing the bad guys as they evolve and increase the number of attacks.
Focus on extracting the business information from the rest of the data and discard the rest.
Render the business information in a consistent format (XDS) which can be checked.
Use a single highly assured filter component which can verify the business information against your security policy
Re-present the business information to the recipient in a format that is in line with your security needs.