Interview with Ratmir Timashev, CEO of Aelita Software
by Mirko Zorz - Friday, 5 February 2003.
Ratmir Timashev brings a rare combination of business savvy and technical knowledge to his role as CEO of Aelita Software, allowing him to create a vision for the company that is forward-looking, realistic, and in sync with customer needs. Timashev has extensive entrepreneurial experience. In 1993, he founded and served as CEO for Midwestern Commerce, the predecessor to Aelita. Timashev holds a Master's Degree in Chemical Physics from The Ohio State University.

Introduce Aelita Software to our readers.

Aelita provides software that focuses on migration and deployment, administration and provisioning, operations and security, and backup and recovery. Aelita products improve the usability and security of Windows, Active Directory, Microsoft Exchange and .NET infrastructures, while also extending Windows-centric network management to multi-platform enterprises. While we offer security-specific products in InTrust and Enterprise Directory Reporter, all our products are designed with security considerations in mind.

Which challenges do you face in the marketplace? What do you see as your advantages?

As an industry, I believe we need to rethink our definition of security. If you were to ask most technology people to define security, they would likely point to the blinking light in the data center, or their pager, or some other device that would alert them to an intrusion as it was happening. And that's great. But there's more to security than real-time monitoring.

IT security needs to be regarded in a holistic way, not just as a solution for a single point in time. We call that concept "operational security." It means considering the security implications of every aspect of how you deploy and operate your systems.

Take, for example, the concept of building security. Generally, there are two types of security. The first is the door or window monitor that sounds when the door is forced open or the window is broken. The second is the video camera that records what happened leading up to the break-in, and what happened when the intruder entered the building. Most IT security products offer real-time monitoring. But organizations need to also consider the IT equivalent of a security "video camera."

One of your products, InTrust, "offers consolidated security auditing and monitoring for Windows-centric and heterogeneous networks." Introduce its features.

Aelita InTrust is that IT security "video camera." It consolidates, archives, and analyzes IT audit data from across the network. InTrust allows companies to "recreate" the past to see what happened leading up to an attack, as well as what happened after the attack occurred. This type of information is essential to determine the scope of a security breach.

InTrust can also be used proactively. With the vast amount of IT audit data available through InTrust and its 1,100 reports, you can correlate seemingly unrelated events to detect a possible attack before it occurs.

Lastly, because of heightened security awareness, more and more organizations (and even industries as a whole) are setting forth new security policies and regulations. InTrust's flexible reporting console can be used to create new reports specifically addressing compliance with these policies and regulations.

In your opinion, how important is a backup and disaster recovery strategy?


What's the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 million.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 11th