1
iScan Online, Inc. 20 Most Promising Enterprise Security Companies in Christo Jacob Managing Editor Editor-in- Chief recognized by Magazine as An annual listing of CIO Enterprise Security 20 represents not only the glory 20 high value Enterprise SecurityCompanies in U . S. but also recognizes companies impacting the marketplace. 20 Most Promising Enterprise Security Companies Company iScan Online, Inc. Carl Banzhof, CEO Key Person 2012 A provider of BYOD security scan- ning solutions for addressing the security assessment of mobile de- vices and remote workers Founded Description T he recent technological advancements at the enterprise level have exceeded assumptions, attributing mainly to fastphased upgradation into cloud and emergence of mobility. These trends though continue to transform the sector, highlight the need for advanced enterprise security strategies as well. Large- scale investments are expected in security sector in the coming years. Currently, the spotlight is on apt and effective strategies that stand-out from the rest, and address the security requirements of ever-changing technological trends. Amidst the sudden surge of security threats and emergence of innovative security approaches, enterprise security firms that are able to function as a catalyst in connecting the industry with the cutting-edge security solutions, would dominate the market. Since an organization’s success is impacted greatly by the security methods implemented, the time is ripe for companies offering purpose-specific enterprise security solutions. With more funding predicted and threats from hackers being prominent than ever, this is the appropriate time to identify some of the right enterprise security companies that provide unique solutions. To help CIOs navigate and find the right enterprise security solution providers, CIOReview present you the “20 Most Promising Enterprise Security Companies”. We believe these companies have achieved significant momentum and will rise above the rest. A distinguished panel comprising of CIOs and CEOs of public companies, analysts, and the CIOReview editorial board finalized the 20 Most Promising Enterprise Security Companies. We congratulate the 20 finalists for achieving this vote of respect and wish them a great future ahead. CIOREVIEW.COM APRIL - 2014 CIO Review The Navigator for Enterprise Solutions Opinion: Richard D. Calder, Jr., President & CEO, GTT, Inc. CIO Insights: Larry Conrad, CIO & AVP, IT, University of California, Berkeley CEO View Point: John Feland, CEO, Argus Insights $10 20 Most Promising Enterprise Security & Consulting Companies 2014 CIOEnterprise Security Ricardo Villadiego, CEO, Easy Solutions 20 Most Promising Enterprise Security Companies 2014 CIO Enterprise Security W ith all the recent headlines surrounding data breaches, organizations are struggling to find a way to avoid becoming the next data breach victim. In today’s world of disconnected systems, remote offices and BYOD, it is increasingly more difficult to accurately detect vulnerabilities and unprotected data on endpoints. Enter Plano, TX based iScan Online, Inc., a provider of security scanning solutions for Microsoft Windows and Apple OSX servers, desktops and laptops, as well as Apple iOS and Android smartphones and tablets. Founded in 2012, the firm offers customers the ability to proactively identify endpoints at risk before a data breach occurs. Combined Intelligence The power of the iScan Online solution is that it combines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices. Vulnerability scans detect vulnerabilities in the operating system and applications installed on the device. Data discovery scans identifies unprotected credit card data, as well as PII/PHI related data such as social security numbers, drivers license, passports, date of birth and so on. Administrators can also construct their own search patterns for sensitive corporate data. Any Endpoint Anytime Anywhere The iScan Online solution is designed to work seamlessly with all size organizations. By providing several scan delivery mechanisms administrators can decide how best to scan devices in their organization. Instead of traditional network scanning, iScan Online delivers scanning via a browser plugin, command line or native mobile app. “The challenge most organizations have today is that they do not have visibility into all the devices that are connecting to their network, applications and data. These devices are largely left unsecured and contain a huge amount of unprotected sensitive data that could ultimately end up in the wrong hands,” mentions Carl Banzhof, CEO of iScan Online. Using iScan Online’s scan browser plugin delivery technique, organizations could scan a device anywhere a user logs in to a web app. The iScan Online service integrates with the industry’s most common PCI DSS portals, online banking portals, guest wifi authentication web pages, Time Sheet and CRM web applications and much more. The iScan Online command line scanner scans the host that is executed in lightening fast speed. This unique approach allows administrators to embed powerful scheduled and ad-hoc scanning via existing infrastructure such as Microsoft Windows Active Directory, McAfee ePO, Remote Monitoring and Management Tools, VPN on connect scripts and other use cases. The firm’s services have attracted major companies in various sectors in North America and Europe. Still young, the company has already made a great impact in the security industry and moving forward a lot is expected from a company of such caliber. iScan Online: Identifying Potential Data Breaches Before they Happen By Thomson Antony The power of the iScan Online solution is that it combines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices to proactively identify endpoints at risk before a data breach occurs. Combined Intelligence The power of the iScan Online solution is that it combines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices. Vulnerability scans detect vulnerabilities in the operating system and applications installed on the device. Data discovery scans identifies unprotected credit card data, as well as PII/PHI related data such as social security numbers, drivers license, passports, date of birth and so on. Administrators can also construct their own search patterns for sensitive corporate data. Any Endpoint Anytime Anywhere The iScan Online solution is designed to work seamlessly with all size organizations. By providing several scan delivery mechanisms administrators can decide how best to scan devices in their organization. Instead of traditional network scanning, iScan Online delivers scanning via a browser plugin, command line or native mobile app. “The challenge most organizations have today is that they do not have visibility into all the devices that are connecting to their network, applications and data. These devices are a user logs in to a web a integrates with the ind DSS portals, online b authentication web pages applications and much m The iScan Onlin the host that is exe This unique app to embed pow scanning via as Microsoft McAfee ePO, Management scripts a at in A y the discovery of u sensitive data at devices including Carl Banzhof, CEO

CIO Review - iScan Online

Embed Size (px)

DESCRIPTION

Identifying Potential Data Breaches Before They Happen - iScan Online Named Top 20 Most Promising Security Company by CIOReview.

Citation preview

Page 1: CIO Review - iScan Online

siliconindia | |February 201429siliconindia | | February 201428

iScan Online, Inc.

20 Most Promising Enterprise Security Companies in

Christo JacobManaging Editor Editor-in- Chief

recognized by Magazine as

An annual listing of CIO Enterprise Security 20 represents not only the glory 20 high value

Enterprise SecurityCompanies in U . S. but also recognizes companies impacting the marketplace.

20 Most Promising Enterprise Security Companies

Company

iScan Online, Inc.

Carl Banzhof,

CEO

Key Person

2012

A provider of BYOD security scan-

ning solutions for addressing the

security assessment of mobile de-

vices and remote workers

Founded

Description

The recent technological advancements at the enterprise level

have exceeded assumptions, attributing mainly to fastphased

upgradation into cloud and emergence of mobility. These

trends though continue to transform the sector, highlight

the need for advanced enterprise security strategies as well. Large-

scale investments are expected in security sector in the coming years.

Currently, the spotlight is on apt and effective strategies that stand-out

from the rest, and address the security requirements of ever-changing

technological trends. Amidst the sudden surge of security threats and

emergence of innovative security approaches, enterprise security firms

that are able to function as a catalyst in connecting the industry with

the cutting-edge security solutions, would dominate the market. Since

an organization’s success is impacted greatly by the security methods

implemented, the time is ripe for companies offering purpose-specific

enterprise security solutions.

With more funding predicted and threats from hackers being

prominent than ever, this is the appropriate time to identify some of

the right enterprise security companies that provide unique solutions.

To help CIOs navigate and find the right enterprise security solution

providers, CIOReview present you the “20 Most Promising Enterprise

Security Companies”. We believe these companies have achieved

significant momentum and will rise above the rest. A distinguished

panel comprising of CIOs and CEOs of public companies, analysts,

and the CIOReview editorial board finalized the 20 Most Promising

Enterprise Security Companies. We congratulate the 20 finalists for

achieving this vote of respect and wish them a great future ahead.

CIOREVIEW.COMAPRIL - 2014

CIOReviewT h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s

Opinion: Richard D. Calder, Jr., President & CEO, GTT, Inc.

CIO Insights: Larry Conrad, CIO & AVP, IT, University of California, Berkeley

CEO View Point: John Feland, CEO, Argus Insights $10

20 Most Promising Enterprise Security & Consulting Companies

2014CIOEnterprise Security

Ricardo Villadiego,

CEO, Easy Solutions

�|��|April 201435CIOReview

20 Most Promising Enterprise Security Companies 20 Most Promising Enterprise Security Companies2014CIOEnterprise Security

With all the recent headlines surrounding data breaches, organizations are struggling to find a way to avoid becoming the next

data breach victim. In today’s world of disconnected systems, remote offices and BYOD, it is increasingly more difficult to accurately detect vulnerabilities and unprotected data on endpoints.

Enter Plano, TX based iScan Online, Inc., a provider of security scanning solutions for Microsoft Windows and Apple OSX servers, desktops and laptops, as well as Apple iOS and Android smartphones and tablets. Founded in 2012, the firm offers customers the ability to proactively identify endpoints at risk before a data breach occurs.

Combined IntelligenceThe power of the iScan Online solution is that it combines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices. Vulnerability scans detect vulnerabilities in the operating system and applications installed on the device. Data discovery scans identifies unprotected credit card data, as well as PII/PHI related data such as social security numbers, drivers license, passports, date of birth and so on. Administrators can also construct their own search patterns for sensitive corporate data.

Any Endpoint Anytime AnywhereThe iScan Online solution is designed to work seamlessly with all size organizations. By providing several scan delivery mechanisms administrators can decide how best to scan devices in their organization. Instead of traditional network scanning, iScan Online delivers scanning via a browser plugin, command line or native mobile app.

“The challenge most organizations have today is that they do not have visibility into all the devices that are connecting to their network, applications and data. These devices are

largely left unsecured and contain a huge amount of unprotected sensitive data that could ultimately end up in the wrong hands,” mentions Carl Banzhof, CEO of iScan Online.

Using iScan Online’s scan browser plugin delivery technique, organizations could scan a device anywhere

a user logs in to a web app. The iScan Online service integrates with the industry’s most common PCI DSS portals, online banking portals, guest wifi authentication web pages, Time Sheet and CRM web applications and much more.

The iScan Online command line scanner scans the host that is executed in lightening fast speed.

This unique approach allows administrators to embed powerful scheduled and ad-hoc scanning via existing infrastructure such as Microsoft Windows Active Directory, McAfee ePO, Remote Monitoring and

Management Tools, VPN on connect scripts and other use cases.

The firm’s services have attracted major companies in various sectors in North America and Europe. Still young, the company has already made a great impact in the security industry and moving forward a lot is expected from a company of such caliber.

iScan Online: Identifying Potential Data

Breaches Before they HappenBy Thomson Antony

The power of the iScan Online solution is that it combines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices

to proactively identify endpoints at risk before a data breach occurs.

Combined IntelligenceThe power of the iScan Online solution is that it combines the detection of vulnerabilities with the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices. Vulnerability scans detect vulnerabilities in the operating system and applications installed on the device. Data discovery scans identifies unprotected credit card data, as well as PII/PHI related data such as social security numbers, drivers license, passports, date of birth and so on. Administrators can also construct their own search patterns for sensitive corporate data.

Any Endpoint Anytime AnywhereThe iScan Online solution is designed to work seamlessly with all size organizations. By providing several scan delivery mechanisms administrators can decide how best to scan devices in their organization. Instead of traditional network scanning, iScan Online delivers scanning via a browser plugin, command line or native mobile app.

“The challenge most organizations have today is that they do not have visibility into all the devices that are connecting to their network, applications and data. These devices are

a user logs in to a web app. The iScan Online service integrates with the industry’s most common PCI DSS portals, online banking portals, guest wifi authentication web pages, Time Sheet and CRM web applications and much more.

The iScan Online command line scanner scans the host that is executed in lightening fast speed.

This unique approach allows administrators to embed powerful scheduled and ad-hoc scanning via existing infrastructure such as Microsoft Windows Active Directory, McAfee ePO, Remote Monitoring and

Management Tools, VPN on connect scripts and other use cases.

attracted major companies in various sectors in North America and Europe. Still young, the company has

the discovery of unprotected sensitive data at rest on endpoint devices including mobile devices

Carl Banzhof,

CEO