The Silicon Review - Best Business Review Magazine 50 Most Trustworthy Companies 2019 | Page 98
powerful and highly destructive
cyber-weapons to use for nefarious
reasons as well as for use against
their enemies in this new cyber-
war which the world is facing with
greater frequency each day. We’ve
already seen large portions of
entire infrastructure dramatically
impacted and, in a few cases,
entire continents shut off from
communications with the outside
world. And this is just the opening
salvo of what could become an all-
out cyber-centered slug-fest – one
that ends with dire consequences for
the loser in the war.”
The Internet was never designed
to do what the world does with
it today. As a result, the very
fabric of the worldwide web
is fundamentally incapable of
providing even the basic security
for transactions and so is the main
reason for such a dramatic rise of
cyber-attacks and cyber-thefts.
And it’s only getting worse.
Conventional cyber security
solutions are fundamentally
“Hackable by Design.” It’s
impossible to construct a cohesive
secure environment using a
hodgepodge of “point solutions.”
“The challenge is the security
tools in the market today do not
provide adequate protection
98
against these powerful cyber-
weapons. Security architectures
largely grew organically over the
past 10 years, as organizations
addressed a variety of new threats
and tactics. This resulted in an
army of deployed technologies like
firewalls, IDS/IPS, network proxies,
gateways, sandboxes, endpoint
suites, etc. Over time, this patchwork
approach became more difficult
to manage and significantly less
effective at blocking legitimate
threats. You cannot cobble together
a comprehensive cyber-security
solution using any of the current
tools available and expect to
succeed against the sophisticated
cyber-weapons being deployed by
the bad guys. The real proof of this
is that the cyber-thieves are winning
the battle and unfortunately will
continue at greater frequency and
at more destructive levels if nothing
changes.”
Looking ahead to what the
future holds for Ghost Systems,
Mr Ritzman reveals what
developments he foresees within
the industry, and how the firm will
adapt around these changes.
“Cybersecurity as a whole is
ever-changing. Cyber-criminals
continually invest billions of dollars
developing malware. As a result,
they are very successful pulling off
large cyber-thefts costing billions
of dollars in damage and personal
losses to hundreds of millions of
individuals. This continues to get
worse as they gain more knowledge
and experience.”
“Existing cybersecurity problems
telegraph what’s needed for
security in the future. Specifically,
enterprises need a comprehensive
solution that offers scalability,
protects against both known and
unknown threats, automates
manual processes, and replaces a
patchwork of ineffective tools with
an integrated set of security services
– in short, they need the Ghost built
SafePlace™ Ecosystem.”
“Ghost continually builds
cybersecurity solutions capable
of preventing attacks. We invest
heavily in R&D, constantly updating
cyber-defenses using modern
techniques and technologies to
mitigate cyber-attacks.”
“We continually strive to change
the fundamental dynamics of the
war between cyber-criminals and
the good guys by reformulating
the fundamental structure of the
Internet. Our “The Internet of
Trust” is built to make a difference,
providing a safe environment for
individuals and businesses alike.”
SR