14.02.2017 Views

CloudMask - Top 10 Security Solution Providers 2017

An annual listing of 10 companies that are at the forefront of providing security solutions for the government sector and impacting the marketplace CloudMask Inc. From the U.S. presidential election being interfered to government IT assets and public utilities being breached, federal agencies are no longer alien to cyberattacks. The intrusions not only disrupt the everyday processes, but also pose a great risk to citizen data. Government organizations are required to be more vigilant in safeguarding their infrastructure, firewalling internal data and networks, and zeroing in on cyber criminals. However, the agencies find themselves in a catch-22 situation where they have to incorporate new age technologies like mobility and cloud to offer better citizen services, while also effectively dealing with security lacunas integral to them. This impels decision makers to prioritize the security of data and assets during resource planning. Next generation, sophisticated security solutions de-risk the state of affairs for federal bodies and create a safe operating environment. The time has come for governments to be proactive and collaborate with the private sector to take their cybersecurity measures to the next level. Keeping up with the industry changes, security solution providers are today delivering superior encryption, access control, and other novel security mechanisms that can be embedded in digital as well as hardware assets to protect government networks. In this scenario, to help CIOs find the right security solution provider, a distinguished panel comprising CEOs, CIOs, analysts and the Government CIO Outlook editorial board has selected the leading players in the arena. In our selection, we looked at the vendor’s capability to fulfill the burning need for cost-effective and flexible solutions that add value to the complex security landscape. We present to you Government CIO Outlook’s Top 10 Security Solution Providers 2017

An annual listing of 10 companies that are at the forefront of providing
security solutions for the government sector and
impacting the marketplace
CloudMask Inc.
From the U.S. presidential election being interfered to
government IT assets and public utilities being breached,
federal agencies are no longer alien to cyberattacks. The
intrusions not only disrupt the everyday processes, but
also pose a great risk to citizen data. Government organizations are
required to be more vigilant in safeguarding their infrastructure,
firewalling internal data and networks, and zeroing in on cyber
criminals. However, the agencies find themselves in a catch-22
situation where they have to incorporate new age technologies
like mobility and cloud to offer better citizen services, while also
effectively dealing with security lacunas integral to them.
This impels decision makers to prioritize the security of data
and assets during resource planning. Next generation, sophisticated
security solutions de-risk the state of affairs for federal bodies
and create a safe operating environment. The time has come for
governments to be proactive and collaborate with the private sector
to take their cybersecurity measures to the next level.
Keeping up with the industry changes, security solution
providers are today delivering superior encryption, access control,
and other novel security mechanisms that can be embedded in
digital as well as hardware assets to protect government networks.
In this scenario, to help CIOs find the right security solution
provider, a distinguished panel comprising CEOs, CIOs, analysts
and the Government CIO Outlook editorial board has selected the
leading players in the arena.
In our selection, we looked at the vendor’s capability to
fulfill the burning need for cost-effective and flexible solutions
that add value to the complex security landscape. We present
to you Government CIO Outlook’s Top 10 Security Solution
Providers 2017

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FEBRUARY - <strong>2017</strong><br />

GOVCIOOUTLOOK.COM<br />

<strong>Top</strong> <strong>10</strong> <strong>Security</strong> <strong>Solution</strong> <strong>Providers</strong> <strong>2017</strong><br />

From the U.S. presidential election being interfered to<br />

government IT assets and public utilities being breached,<br />

federal agencies are no longer alien to cyberattacks. The<br />

intrusions not only disrupt the everyday processes, but<br />

also pose a great risk to citizen data. Government organizations are<br />

required to be more vigilant in safeguarding their infrastructure,<br />

firewalling internal data and networks, and zeroing in on cyber<br />

criminals. However, the agencies find themselves in a catch-22<br />

situation where they have to incorporate new age technologies<br />

like mobility and cloud to offer better citizen services, while also<br />

effectively dealing with security lacunas integral to them.<br />

This impels decision makers to prioritize the security of data<br />

and assets during resource planning. Next generation, sophisticated<br />

security solutions de-risk the state of affairs for federal bodies<br />

and create a safe operating environment. The time has come for<br />

governments to be proactive and collaborate with the private sector<br />

to take their cybersecurity measures to the next level.<br />

Keeping up with the industry changes, security solution<br />

providers are today delivering superior encryption, access control,<br />

and other novel security mechanisms that can be embedded in<br />

digital as well as hardware assets to protect government networks.<br />

In this scenario, to help CIOs find the right security solution<br />

provider, a distinguished panel comprising CEOs, CIOs, analysts<br />

and the Government CIO Outlook editorial board has selected the<br />

leading players in the arena.<br />

In our selection, we looked at the vendor’s capability to<br />

fulfill the burning need for cost-effective and flexible solutions<br />

that add value to the complex security landscape. We present<br />

to you Government CIO Outlook’s <strong>Top</strong> <strong>10</strong> <strong>Security</strong> <strong>Solution</strong><br />

<strong>Providers</strong> <strong>2017</strong>.<br />

<strong>CloudMask</strong> Inc.<br />

recognized by<br />

magazine as<br />

Company:<br />

<strong>CloudMask</strong><br />

Description:<br />

Enables businesses to meet data<br />

residency and privacy regulations without<br />

the installation of any hardware or secure<br />

gateways<br />

An annual listing of <strong>10</strong> companies that are at the forefront of providing<br />

security solutions for the government sector and<br />

impacting the marketplace<br />

Key Person:<br />

Tarek El-Gillani,<br />

Co-Founder & CTO<br />

Website:<br />

cloudmask.com<br />

CIOReview<br />

| 12| JULY 2014


TOP<strong>10</strong><br />

SOLUTION PROVIDERS - <strong>2017</strong><br />

<strong>CloudMask</strong><br />

Seamless Data-Centric Protection<br />

cybersecurity<br />

defenses<br />

these days are<br />

“Most<br />

designed to<br />

keep the attackers out, which, history<br />

has shown, is not a viable strategy,”<br />

remarks Tarek El-Gillani, Co-Founder<br />

and CTO, <strong>CloudMask</strong>. He further<br />

draws the attention to recent events<br />

such as the Russian intrusion in<br />

the U.S. electoral process as a clear<br />

example of the impact a lack of<br />

security may have on an organization.<br />

In this present age, there is a dire<br />

need for rethinking how data security<br />

is approached. To ease this situation,<br />

<strong>CloudMask</strong> significantly reduces<br />

the attack surface by eliminating<br />

the impact of network, insiders, and<br />

application breaches. Whether it is<br />

protecting the individual privacy<br />

or large department sensitive data,<br />

<strong>CloudMask</strong> empowers users to take<br />

back control over their privacy.<br />

<strong>CloudMask</strong> ensures that<br />

user emails, files, and<br />

applications data can only<br />

be seen by the organizations<br />

and the persons they are<br />

collaborating with<br />

Founded in 2013 by seasoned<br />

entrepreneurs, <strong>CloudMask</strong> developed<br />

its product in conjunction with the<br />

Federal Government of Canada after<br />

winning the Canadian Innovation<br />

Commercialization Program<br />

(CICP). <strong>CloudMask</strong> addresses the<br />

strict security requirements of the<br />

sensitive government departments,<br />

by integrating with their current<br />

GOVERNMENT CIO OUTLOOK<br />

26 February-<strong>2017</strong><br />

security infrastructure. “<strong>CloudMask</strong><br />

ensures that user emails, files, and<br />

applications data can only be seen by<br />

the organizations and the persons they<br />

are collaborating with, and nobody<br />

in between—administrators, cloud<br />

providers, not even <strong>CloudMask</strong>,” states<br />

El-Gillani. These security claims have<br />

been validated through the Common<br />

Criteria certification.<br />

The firm safeguards clients’ online<br />

accounts such as Gmail, Google Drive,<br />

and Clio by running on end-user<br />

devices and transparently protecting<br />

the data before it leaves the device.<br />

<strong>CloudMask</strong> Masking for Governments<br />

is designed by combining on-premise<br />

and SaaS offering. This hybrid model<br />

is used for collaborating with external<br />

entities, such as remote employees,<br />

partners, and citizens, without the<br />

need for VPN setup. At the same<br />

time, <strong>CloudMask</strong> also protects internal<br />

on-premise applications from insider<br />

threats. “We allow enterprise and SaaS<br />

developers to embed our protection<br />

layer without the need to change their<br />

application,” explains El-Gillani. This<br />

allows developers to focus on end-user<br />

functionality, leverage commonly<br />

available infrastructure which by itself<br />

does not meet security requirements, and<br />

rely on <strong>CloudMask</strong> to protect the data.<br />

“We see IoT as a great fit for our<br />

technology since our focus lies on the<br />

data and not on the device,” emphasizes<br />

El-Gillani. Data-centric protection is<br />

becoming vital due to the sheer volume of<br />

devices and the spread of devices’ physical<br />

locations. To this end, <strong>CloudMask</strong><br />

addresses these two distinctive IoT<br />

characteristics, limited resources and the<br />

requirement for seamless provisioning.<br />

“With <strong>CloudMask</strong>, data is protected in<br />

a manner ensuring that only authorized<br />

Tarek El-Gillani<br />

IoT devices and entities can access data and<br />

execute commands,” adds El-Gillani.<br />

A common use case is in enabling<br />

departments to collaborate securely<br />

with external entities that are not<br />

under the same jurisdiction. Here, the<br />

collaboration leverages publicly available<br />

cloud and/or shared private cloud,<br />

while the data is protected by<br />

<strong>CloudMask</strong> at the end-user devices.<br />

“The department centrally manages<br />

digitally signed <strong>CloudMask</strong> policies<br />

which enforces if and for how long a<br />

data element may be accessed by a given<br />

party,” explains El-Gillani.<br />

Looking to the future, “We see<br />

ourselves expanding our ecosystem to<br />

integrate with other enterprise security<br />

providers to better address critical security<br />

issues such as Advanced Persistent<br />

Threat,” comments El-Gillani. Besides<br />

servicing the government segment, the<br />

<strong>CloudMask</strong> is also growing its partnership<br />

with SaaS and Enterprise developers to<br />

provide them the ability to independently<br />

create protection policies and embed them<br />

into their applications.<br />

CIOReview<br />

| 13| JULY 2014

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!