Intelligent CISO Issue 37 | Page 68

decrypting myths their business models are evolving to this new norm and we are ahead of that curve in innovation . We are designing solutions that help businesses address the traditional challenges of security while enabling them to learn and adapt to threats on the horizon .
Our solutions incorporate breakthrough AI and Machine Learning capabilities to accelerate threat detection and mitigation . Our patent-pending Real- Time Deep Memory Inspection ( RTDMI ) is able to weed out false positives and block unknown , evasive threats that have not previously been identified , enabling always-on , real-time , continuously updated protection . It enables security systems to guard against emerging threats rather than being purely reactive .
In the new normal working environment , to simplify the management needs associated with distributed locations , campuses and branch offices , new SonicWall secure SD-Branch capabilities deliver single-pane-of-glass management across LAN , WAN and security controls .
Cost-effective secure SD-WAN allows organisations to leverage less expensive
Internet links . Organisations can also choose cost-effective subscription license models to control costs and reduce operational overhead .
How have customer requirements changed recently and how far have these shaped your product strategy ?
Customers are looking for integrated solutions with a layered approach over point products . They need solutions that can scale with their business needs , pivot from corporate to remote working and continue to provide them with the security protection for the evolving threats they face every day .
At SonicWall , we include our partners and customers in these discussions ; look at the threat landscape , their needs , their expected outcomes and focus on a strategy that provides innovation to the market and value to our customers . The net result of this collaboration is that SonicWall has created a new Boundless Cybersecurity model to offer advanced solutions to organisations seeking to close the security gaps in their business .
Boundless Cybersecurity operates under three core principles :
• Know the unknown – Under which our Capture Advanced Threat Protection ( ATP ) cloud sandbox service , Real-Time Deep Memory Inspection ( RTDMI ), Machine Learning and deep cyberthreat intelligence work to detect and block evasive , cutting-edge and neverbefore-seen threats .
• Visibility and control – Using the Capture Security Center tool along with Cloud Edge Secure Access , customers can control and protect network access based on identity , location and device parameters .
• Disruptive economics – We help customers scale TCO by offering disruptive , scalable pricing that makes Boundless Security cost-effective for organisations of any size .
From your conversations with CISOs , what are their key priorities right now and how do your solutions align with these ?
The CISOs we have spoken with are first and foremost looking for a partnership –
68 www . intelligentciso . com