SlideShare a Scribd company logo
1 of 1
Download to read offline
siliconindia | |February 2014
29siliconindia | |February 2014
28
iScan Online, Inc.
20 Most Promising Enterprise Security Companies in
ChristoJacob
Managing Editor Editor-in- Chief
recognized by Magazine as
An annual listing of CIO Enterprise Security 20 represents not only the glory 20 high value
Enterprise SecurityCompanies in U . S. but also recognizes companies impacting the marketplace.
20 Most Promising Enterprise Security Companies
Company
iScan Online, Inc.
Carl Banzhof,
CEO
Key Person
2012
A provider of BYOD security scan-
ning solutions for addressing the
security assessment of mobile de-
vices and remote workers
Founded
Description
T
he recent technological advancements at the enterprise level
have exceeded assumptions, attributing mainly to fastphased
upgradation into cloud and emergence of mobility. These
trends though continue to transform the sector, highlight
the need for advanced enterprise security strategies as well. Large-
scale investments are expected in security sector in the coming years.
Currently, the spotlight is on apt and effective strategies that stand-out
from the rest, and address the security requirements of ever-changing
technological trends. Amidst the sudden surge of security threats and
emergence of innovative security approaches, enterprise security firms
that are able to function as a catalyst in connecting the industry with
the cutting-edge security solutions, would dominate the market. Since
an organization’s success is impacted greatly by the security methods
implemented, the time is ripe for companies offering purpose-specific
enterprise security solutions.
With more funding predicted and threats from hackers being
prominent than ever, this is the appropriate time to identify some of
the right enterprise security companies that provide unique solutions.
To help CIOs navigate and find the right enterprise security solution
providers, CIOReview present you the “20 Most Promising Enterprise
Security Companies”. We believe these companies have achieved
significant momentum and will rise above the rest. A distinguished
panel comprising of CIOs and CEOs of public companies, analysts,
and the CIOReview editorial board finalized the 20 Most Promising
Enterprise Security Companies. We congratulate the 20 finalists for
achieving this vote of respect and wish them a great future ahead.
CIOREVIEW.COMAPRIL - 2014
CIOReviewT h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s
Opinion:
Richard D. Calder, Jr.,
President & CEO, GTT, Inc.
CIO Insights:
Larry Conrad, CIO & AVP, IT,
University of California, Berkeley
CEO View Point:
John Feland,
CEO, Argus Insights $10
20 Most Promising Enterprise Security & Consulting Companies
2014
CIOEnterprise Security
Ricardo Villadiego,
CEO, Easy Solutions
| |April 2014
35CIOReview
20 Most Promising Enterprise Security Companies 20 Most Promising Enterprise Security Companies
2014
CIOEnterprise Security
W
ith all the recent headlines surrounding
data breaches, organizations are struggling
to find a way to avoid becoming the next
data breach victim. In today’s world of disconnected
systems, remote offices and BYOD, it is increasingly
more difficult to accurately detect vulnerabilities and
unprotected data on endpoints.
Enter Plano, TX based iScan Online, Inc., a provider
of security scanning solutions for Microsoft Windows
and Apple OSX servers, desktops and laptops, as well
as Apple iOS and Android smartphones and tablets.
Founded in 2012, the firm offers customers the ability
to proactively identify endpoints at risk before a data
breach occurs.
Combined Intelligence
ThepoweroftheiScanOnlinesolutionisthatitcombines
the detection of vulnerabilities with the discovery of
unprotected sensitive data at rest on endpoint devices
including mobile devices. Vulnerability scans detect
vulnerabilities in the operating system and applications
installed on the device. Data discovery scans identifies
unprotected credit card data, as well as PII/PHI related
data such as social security numbers, drivers license,
passports, date of birth and so on. Administrators
can also construct their own search patterns for
sensitive corporate data.
Any Endpoint Anytime Anywhere
The iScan Online solution is designed to
work seamlessly with all size organizations.
By providing several scan delivery mechanisms
administrators can decide how best to scan
devices in their organization. Instead
of traditional network scanning,
iScan Online delivers scanning via
a browser plugin, command line or
native mobile app.
“The challenge most
organizations have today is that
they do not have visibility into all
the devices that are connecting
to their network, applications
and data. These devices are
largely left unsecured and contain a huge amount of
unprotected sensitive data that could ultimately end up
in the wrong hands,” mentions Carl Banzhof, CEO of
iScan Online.
Using iScan Online’s scan browser plugin delivery
technique, organizations could scan a device anywhere
a user logs in to a web app. The iScan Online service
integrates with the industry’s most common PCI
DSS portals, online banking portals, guest wifi
authentication web pages, Time Sheet and CRM web
applications and much more.
The iScan Online command line scanner scans
the host that is executed in lightening fast speed.
This unique approach allows administrators
to embed powerful scheduled and ad-hoc
scanning via existing infrastructure such
as Microsoft Windows Active Directory,
McAfee ePO, Remote Monitoring and
Management Tools, VPN on connect
scripts and other use cases.
The firm’s services have
attracted major companies
in various sectors in North
America and Europe. Still
young, the company has
already made a great impact
in the security industry and
moving forward a lot is
expected from a company of
such caliber.
iScan Online: Identifying Potential Data
Breaches Before they Happen
By Thomson Antony
The power of the iScan Online
solution is that it combines the
detection of vulnerabilities with
the discovery of unprotected
sensitive data at rest on endpoint
devices including mobile devices
to proactively identify endpoints at risk before a data
breach occurs.
Combined Intelligence
ThepoweroftheiScanOnlinesolutionisthatitcombines
the detection of vulnerabilities with the discovery of
unprotected sensitive data at rest on endpoint devices
including mobile devices. Vulnerability scans detect
vulnerabilities in the operating system and applications
installed on the device. Data discovery scans identifies
unprotected credit card data, as well as PII/PHI related
data such as social security numbers, drivers license,
passports, date of birth and so on. Administrators
can also construct their own search patterns for
sensitive corporate data.
Any Endpoint Anytime Anywhere
The iScan Online solution is designed to
work seamlessly with all size organizations.
By providing several scan delivery mechanisms
administrators can decide how best to scan
devices in their organization. Instead
of traditional network scanning,
iScan Online delivers scanning via
a browser plugin, command line or
native mobile app.
“The challenge most
organizations have today is that
they do not have visibility into all
the devices that are connecting
to their network, applications
and data. These devices are
a user logs in to a web app. The iScan Online service
integrates with the industry’s most common PCI
DSS portals, online banking portals, guest wifi
authentication web pages, Time Sheet and CRM web
applications and much more.
The iScan Online command line scanner scans
the host that is executed in lightening fast speed.
This unique approach allows administrators
to embed powerful scheduled and ad-hoc
scanning via existing infrastructure such
as Microsoft Windows Active Directory,
McAfee ePO, Remote Monitoring and
Management Tools, VPN on connect
scripts and other use cases.
attracted major companies
in various sectors in North
America and Europe. Still
young, the company has
the discovery of unprotected
sensitive data at rest on endpoint
devices including mobile devices
Carl Banzhof,
CEO

More Related Content

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

CIO Review - iScan Online

  • 1. siliconindia | |February 2014 29siliconindia | |February 2014 28 iScan Online, Inc. 20 Most Promising Enterprise Security Companies in ChristoJacob Managing Editor Editor-in- Chief recognized by Magazine as An annual listing of CIO Enterprise Security 20 represents not only the glory 20 high value Enterprise SecurityCompanies in U . S. but also recognizes companies impacting the marketplace. 20 Most Promising Enterprise Security Companies Company iScan Online, Inc. Carl Banzhof, CEO Key Person 2012 A provider of BYOD security scan- ning solutions for addressing the security assessment of mobile de- vices and remote workers Founded Description T he recent technological advancements at the enterprise level have exceeded assumptions, attributing mainly to fastphased upgradation into cloud and emergence of mobility. These trends though continue to transform the sector, highlight the need for advanced enterprise security strategies as well. Large- scale investments are expected in security sector in the coming years. Currently, the spotlight is on apt and effective strategies that stand-out from the rest, and address the security requirements of ever-changing technological trends. Amidst the sudden surge of security threats and emergence of innovative security approaches, enterprise security firms that are able to function as a catalyst in connecting the industry with the cutting-edge security solutions, would dominate the market. Since an organization’s success is impacted greatly by the security methods implemented, the time is ripe for companies offering purpose-specific enterprise security solutions. With more funding predicted and threats from hackers being prominent than ever, this is the appropriate time to identify some of the right enterprise security companies that provide unique solutions. To help CIOs navigate and find the right enterprise security solution providers, CIOReview present you the “20 Most Promising Enterprise Security Companies”. We believe these companies have achieved significant momentum and will rise above the rest. A distinguished panel comprising of CIOs and CEOs of public companies, analysts, and the CIOReview editorial board finalized the 20 Most Promising Enterprise Security Companies. We congratulate the 20 finalists for achieving this vote of respect and wish them a great future ahead. CIOREVIEW.COMAPRIL - 2014 CIOReviewT h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s Opinion: Richard D. Calder, Jr., President & CEO, GTT, Inc. CIO Insights: Larry Conrad, CIO & AVP, IT, University of California, Berkeley CEO View Point: John Feland, CEO, Argus Insights $10 20 Most Promising Enterprise Security & Consulting Companies 2014 CIOEnterprise Security Ricardo Villadiego, CEO, Easy Solutions | |April 2014 35CIOReview 20 Most Promising Enterprise Security Companies 20 Most Promising Enterprise Security Companies 2014 CIOEnterprise Security W ith all the recent headlines surrounding data breaches, organizations are struggling to find a way to avoid becoming the next data breach victim. In today’s world of disconnected systems, remote offices and BYOD, it is increasingly more difficult to accurately detect vulnerabilities and unprotected data on endpoints. Enter Plano, TX based iScan Online, Inc., a provider of security scanning solutions for Microsoft Windows and Apple OSX servers, desktops and laptops, as well as Apple iOS and Android smartphones and tablets. Founded in 2012, the firm offers customers the ability to proactively identify endpoints at risk before a data breach occurs. Combined Intelligence ThepoweroftheiScanOnlinesolutionisthatitcombines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices. Vulnerability scans detect vulnerabilities in the operating system and applications installed on the device. Data discovery scans identifies unprotected credit card data, as well as PII/PHI related data such as social security numbers, drivers license, passports, date of birth and so on. Administrators can also construct their own search patterns for sensitive corporate data. Any Endpoint Anytime Anywhere The iScan Online solution is designed to work seamlessly with all size organizations. By providing several scan delivery mechanisms administrators can decide how best to scan devices in their organization. Instead of traditional network scanning, iScan Online delivers scanning via a browser plugin, command line or native mobile app. “The challenge most organizations have today is that they do not have visibility into all the devices that are connecting to their network, applications and data. These devices are largely left unsecured and contain a huge amount of unprotected sensitive data that could ultimately end up in the wrong hands,” mentions Carl Banzhof, CEO of iScan Online. Using iScan Online’s scan browser plugin delivery technique, organizations could scan a device anywhere a user logs in to a web app. The iScan Online service integrates with the industry’s most common PCI DSS portals, online banking portals, guest wifi authentication web pages, Time Sheet and CRM web applications and much more. The iScan Online command line scanner scans the host that is executed in lightening fast speed. This unique approach allows administrators to embed powerful scheduled and ad-hoc scanning via existing infrastructure such as Microsoft Windows Active Directory, McAfee ePO, Remote Monitoring and Management Tools, VPN on connect scripts and other use cases. The firm’s services have attracted major companies in various sectors in North America and Europe. Still young, the company has already made a great impact in the security industry and moving forward a lot is expected from a company of such caliber. iScan Online: Identifying Potential Data Breaches Before they Happen By Thomson Antony The power of the iScan Online solution is that it combines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices to proactively identify endpoints at risk before a data breach occurs. Combined Intelligence ThepoweroftheiScanOnlinesolutionisthatitcombines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices. Vulnerability scans detect vulnerabilities in the operating system and applications installed on the device. Data discovery scans identifies unprotected credit card data, as well as PII/PHI related data such as social security numbers, drivers license, passports, date of birth and so on. Administrators can also construct their own search patterns for sensitive corporate data. Any Endpoint Anytime Anywhere The iScan Online solution is designed to work seamlessly with all size organizations. By providing several scan delivery mechanisms administrators can decide how best to scan devices in their organization. Instead of traditional network scanning, iScan Online delivers scanning via a browser plugin, command line or native mobile app. “The challenge most organizations have today is that they do not have visibility into all the devices that are connecting to their network, applications and data. These devices are a user logs in to a web app. The iScan Online service integrates with the industry’s most common PCI DSS portals, online banking portals, guest wifi authentication web pages, Time Sheet and CRM web applications and much more. The iScan Online command line scanner scans the host that is executed in lightening fast speed. This unique approach allows administrators to embed powerful scheduled and ad-hoc scanning via existing infrastructure such as Microsoft Windows Active Directory, McAfee ePO, Remote Monitoring and Management Tools, VPN on connect scripts and other use cases. attracted major companies in various sectors in North America and Europe. Still young, the company has the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices Carl Banzhof, CEO