Contract worker Edward Snowden’s notoriety came after he stole masses of data from the National Security Agency. Now, the former No. 2 guy at the NSA has teamed up with security software firm Securonix in West Los Angeles to help businesses avoid the type of security breach that burned his old employer.
Securonix’s products monitor a company’s network and identify suspicious activity. They’re not looking for viruses or malware but rather track abnormal behavior by people with inside access.
That’s why the founder and chief executive of Securonix, Sachin Nayyar, cold-called John Chris Inglis earlier this year and asked him to join the firm’s advisory board. Nayyar thought Inglis, who served as deputy director of the NSA from 2006 until January of this year, a period that included the Snowden firestorm, was the perfect spokesman for his company as the NSA was hacked by someone who had legitimate access through the “perimeter” – passwords or signatures that secure entry to a network.
“He’s an example that the focus cannot be on the perimeter but on the data,” Nayyar said.
He sold his previous Internet security company, Vauu, to Sun Microsystems in 2007 and took an executive position with the Santa Clara software giant, which is now a part of Oracle Corp. in Redwood City, but left the firm to start Securonix in 2008 because he saw a market opportunity for an analytics-based security company. He brought Tanuj Gulati on board as chief technology officer to spearhead the design of the company’s algorithms.
Securonix, headquartered on Century Boulevard near Los Angeles International Airport, has about 100 employees, located in several offices throughout the country and one in India. Nayyar said it has been profitable from the beginning and does more than $10 million a year in revenue.
The company offers several tiers of service, ranging in cost from $30,000 a year to north of $1 million. Its pricing is on the high end of the industry scale. It has about 30 customers, most in the United States; some are in the banking and finance sectors. Nayyar did not want to name any customers.
The type of data analysis performed by Securonix is comparable with what credit card companies have used to combat fraud for years. They look at charges that fall outside of normal spending patterns to make judgment calls about whether a card is being used legitimately.
However, many network administrators still rely on access protection such as passwords and signatures as their main forms of security. This doesn’t account for people like Snowden who have legitimate access to the network but are themselves compromised, or last year’s security breach at Target Corp. in Minneapolis, when perpetrators got access to the retailer’s network through credentials stolen from a third-party vendor. Although the Target hack was technically done by people outside the company, they used insider access to do their damage.
You May Also Like
- Before Sony Hack, NSA Breached North Korea
- Contractor Admits He Is Source of NSA Leak
- 51 UPS Stores Hit by Breach
- Banks’ Commercial Customers Face Online Risks
- Report: NSA and British Intelligence Hacked Dutch SIM-Card Provider
- Siblings in Documentary Accuse Director of Plot
- Forever 21 Finds Point-of-Sale Data Breach at Stores
- Hacker Attacks Spur Fear, Sales