Where do you see the current security threats your products are guarding against in 5 years from now? What kind of evolution do you expect?
Software will always contain vulnerabilities, and hackers will always do their best to exploit them. But the danger will come from the reduced time between the discovery of vulnerability and the first exploit. This will require tight integration of vulnerability management and remediation solutions, as well as on-demand scanning of systems for network access control.
What are Criston's strengths in the market? How are you building on these advantages?
For the last ten years, our expertise has been both in the Infrastructure and Security fileds. Therefore, we are a key driver of the convergence of these two areas. Today, we are the only provider delivering the following four critical services, either in one single fully integrated solution, or individually through individual modules of the complete solution: scanning missing patches, deploying patches, scanning configuration issues and fixing configuration issues.
Customers using our products can answer truly business-critical questions relating to their infrastructure and its security, such as: do I know my Infrastructure? How do I check device health before connection? How do I support mobile workers? How fast do I react to vulnerability disclosure? How do I deploy security policies? How do I secure your USB ports? and many more! Because we have developed our solutions upon one single intelligent agent technology, answering these questions and solving the issues can be done on one single console, with one single database. For our clients, this reduces deployment and costs complexity and increases the manageability of the entire solution
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.