Taking Aspirin for a Headache Caused by a Brain Aneurysm? The Most Popular Cyber Security Solutions Are Just That.

Billions of dollars are spent each year for cyber security solutions that simply don’t work. Even the newest and most popular solutions providers fail to deliver genuine cyber security because their solutions focus on symptoms and not the real problem. Nearly all cyber security solutions providers have failed to correctly identify the fundamental problem which lies in a legacy computing architecture that did not anticipate the Internet. As a result, implementing these solutions is not unlike taking aspirin to get rid of a headache caused by a brain aneurysm.
In the case of cyber security, the aneurysm is embedded malware and unknown threats that simply can’t be stopped by the most popular solutions providers in the market today. This includes McAfee, Symantec, Fire Eye, Palo Alto Networks and virtually all legacy solutions providers. The problem for corporate executives and their boards becomes exacerbated when, after spending potentially millions of dollars on these flawed solutions, IT managers are put in the difficult position of having to defend the expense or explain why they must spend even more.
The truth is that nearly all of the most popular cyber security solutions providers are completely ineffective against embedded and foreign language malware. Remarkably, these same solutions providers readily admit that over 90% of computers are already compromised with exactly this type of malware that their solutions can do almost nothing to stop. As a result, the annual RSA Conference of security solutions providers held in San Francisco each year has become like a cosmetics convention that offers help and hope but few genuine solutions.

The good news is that genuine cyber security is being achieved by a core group of Silicon Valley technology experts with some new and patented technologies that are quickly being recognized as the way forward by industry and government experts. These solutions secure endpoints by isolating files and applications in secure containers and use secure processes that can make cyber threats irrelevant. So if your solutions provider does not secure computing endpoints with secure containerization, isolation and kernel level built in secure processes your headache may be the least of your problems.

Posted by Ed Brinskele on Thursday, April 28, 2016