The Silicon Review - Best Business Review Magazine 50 Most Trustworthy Companies 2019 | Page 98

powerful and highly destructive cyber-weapons to use for nefarious reasons as well as for use against their enemies in this new cyber- war which the world is facing with greater frequency each day. We’ve already seen large portions of entire infrastructure dramatically impacted and, in a few cases, entire continents shut off from communications with the outside world. And this is just the opening salvo of what could become an all- out cyber-centered slug-fest – one that ends with dire consequences for the loser in the war.” The Internet was never designed to do what the world does with it today. As a result, the very fabric of the worldwide web is fundamentally incapable of providing even the basic security for transactions and so is the main reason for such a dramatic rise of cyber-attacks and cyber-thefts. And it’s only getting worse. Conventional cyber security solutions are fundamentally “Hackable by Design.” It’s impossible to construct a cohesive secure environment using a hodgepodge of “point solutions.” “The challenge is the security tools in the market today do not provide adequate protection 98 against these powerful cyber- weapons. Security architectures largely grew organically over the past 10 years, as organizations addressed a variety of new threats and tactics. This resulted in an army of deployed technologies like firewalls, IDS/IPS, network proxies, gateways, sandboxes, endpoint suites, etc. Over time, this patchwork approach became more difficult to manage and significantly less effective at blocking legitimate threats. You cannot cobble together a comprehensive cyber-security solution using any of the current tools available and expect to succeed against the sophisticated cyber-weapons being deployed by the bad guys. The real proof of this is that the cyber-thieves are winning the battle and unfortunately will continue at greater frequency and at more destructive levels if nothing changes.” Looking ahead to what the future holds for Ghost Systems, Mr Ritzman reveals what developments he foresees within the industry, and how the firm will adapt around these changes. “Cybersecurity as a whole is ever-changing. Cyber-criminals continually invest billions of dollars developing malware. As a result, they are very successful pulling off large cyber-thefts costing billions of dollars in damage and personal losses to hundreds of millions of individuals. This continues to get worse as they gain more knowledge and experience.” “Existing cybersecurity problems telegraph what’s needed for security in the future. Specifically, enterprises need a comprehensive solution that offers scalability, protects against both known and unknown threats, automates manual processes, and replaces a patchwork of ineffective tools with an integrated set of security services – in short, they need the Ghost built SafePlace™ Ecosystem.” “Ghost continually builds cybersecurity solutions capable of preventing attacks. We invest heavily in R&D, constantly updating cyber-defenses using modern techniques and technologies to mitigate cyber-attacks.” “We continually strive to change the fundamental dynamics of the war between cyber-criminals and the good guys by reformulating the fundamental structure of the Internet. Our “The Internet of Trust” is built to make a difference, providing a safe environment for individuals and businesses alike.” SR