RedSeal Reports Record Growth As Market Embraces Digital Resilience and Cybersecurity Preparedness

Commercial and government agency appetite for incident response propels adoption of RedSeal Cybersecurity Analytics Platform

SUNNYVALE, Calif.— January 27, 2016—RedSeal (redseal.net), the cybersecurity analytics company, today announced record 2015 sales growth and business momentum. Increased market realization that digital resilience and cyber security preparedness are now business critical strategies has been a key factor in increased adoption of the RedSeal analytics platform. The company achieved several milestones in 2015 including its highest year-over-year revenue growth, and record numbers of new customer acquisitions and customer renewals. In addition, all of these milestones helped drive positive cash flow for RedSeal for the last two quarters.

RedSeal achieved significant new customer acquisition, adding 59 new customers in 2015, including 15 federal agencies, counting among them the US Senate, USAF, US Navy, FEMA, and NASA. This past year the company also added a number of major box retailers, and leading brands in software, media, hospitality and services sectors. Federal business bookings grew 55 percent year-over-year and commercial bookings grew 83 percent in the last half of 2015 alone. The company sold 53,000 licenses in 2015. As well as new customer acquisition, RedSeal achieved its best year ever in customer confidence and continuity with renewal rates of 85 percent across all sectors and geographies.

The company’s international presence and channel strength made an important contribution to 2015 success. RedSeal plans to accelerate momentum in 2016, including expanding its global channel partner program, continuing to scale global expansion with new offices in Canada, and increasing headcount by 50 percent in order to expand engineering and sales groups.

“2015 was an extraordinary year of growth and accelerated business performance for RedSeal across all sectors,” said Ray Rothrock, chairman and CEO of RedSeal. “The market has clearly signaled the importance and value of the RedSeal platform in its ability to provide the actionable intelligence and insight needed to build continuously digitally resilient and hardened cyber prepared organizations.”

About RedSeal (redseal.net)
RedSeal is an essential step in building digitally resilient organizations people can trust. RedSeal’s security analytics platform builds an accurate, up-to-date model of an organization’s entire, as-built network to visualize access paths, prioritize what to fix, and target existing cybersecurity resources on the most valuable assets. With RedSeal’s Digital Resilience Score, decision makers can see the security status and benchmark progress toward digital resilience in the inevitable attack. RedSeal’s customers are Global 2000 corporations and government agencies that depend on the most sophisticated security. Founded in 2004, RedSeal is headquartered in Sunnyvale, California and serves customers in North America, Europe and Asia.

– end –

RedSeal and the RedSeal logo are trademarks of RedSeal, Inc. All other names and trademarks are the property of their respective owners.

Press Inquiries:
Michelle Sieling
Finn Partners/Horn Group
+1 (415) 905-4013
michelle.sieling@finnpartners.com

Ray Rothrock: “Assume attackers are in your system”

SC Magazine | January 26, 2016

As cyber attacks increase, IT departments continue to be challenged by older techniques, such as targeted phishing attacks because the attacks bypass perimeter defenses and are difficult to prevent. Ray Rothrock, CEO of RedSeal Networks, spoke with SCMagazine.com on how to mitigate risks.

Security Now: 9 Experts, 5 Bullish Predictions

Channel Partners Online | Jan 13, 2016

“Technology that encourages and promotes intelligence, preparedness and response also will take a radically increased profile in cybersecurity through 2016 and beyond — so organizations will invest more heavily in security solutions that deliver deeper understanding and analysis of their structural, digital and network maps. These types of security technologies will have massive impact on organizations in 2016.” —Ray Rothrock, CEO, RedSeal

Blog: Planning, Training and Automation Are Key to Successful Cyber Hunting

SIGNAL Magazine | Jan 12, 2016

Experts need to write scripts to parse through mountains of data and leverage analytic tools that automate the search. RedSeal’s Chief Technology Officer, Mike Lloyd, likes to say: “We don’t need more mountains of data; we need more data mountaineers.”

Using Technology to Drive Diversity in Your Business

Huffington Post | Jan 12, 2016

Removing bias can start with something as seemingly innocuous as a job post. In one case reported by NPR, cybersecurity firm RedSeal used a program from Unitive to adjust their job descriptions: “Job applications shot up 30 percent, and the percentage of women among the company’s three-dozen engineers has doubled.”

Closing (and bolting) the back door in ScreenOS

by Dr. Mike Lloyd, CTO RedSeal

The recently disclosed back door in Juniper’s ScreenOS software for NetScreen firewalls is an excellent reminder that in security, the first and foremost need is to do the basics well.  The details of the vulnerability are complex and interesting (who implanted this, how, and what exactly is involved?), but that is not what matters for defenders.  What matters is knowing whether or not you have basic network segmentation in place.  This may sound counterintuitive – how can something as routine as segmentation solve a sophisticated problem like this?  But this is a textbook example of the benefits of defense in layers – if you think too much about only one method of protection, then complex things at that layer have to be dealt with in complex ways, but if you have layers of defense, you can often solve very complex problems at one layer with very simple controls at another.

The vulnerability in this instance involves a burned-in “skeleton key” password – a password capable of giving anyone who can use it potentially catastrophic levels of control of the firewall.  To compromise your defenses when you have this particular version of software installed, an attacker needs only two things – 1) the magic password string itself, which is widely available, and 2) ability to talk to your firewall.  For point 1, the cat (saber-toothed in this instance) is long since out of the bag, but point 2 remains.  If someone can talk to your firewall and present a credential, they can present the magic one, and in they go, with full privilege to do whatever they want (for example, disabling all the protections you bought the firewall for in the first place).  No amount of configuration hardening can prevent this, since the issue is burned in to the OS itself.  But what if the attacker cannot talk to the firewall at all?  Then the magic password does no good – they cannot present a credential if they cannot talk to the firewall in the first place.

So note that someone who relies on strong password policies has a real problem here.  If you think “it’s OK to allow basic access to my firewalls, nobody can get in unless I give them a credential”, well, that’s clearly not true.  Unfortunately, many network defenses are set up in this way.  If you think about this problem at the password or credential layer, the situation is a disaster.  But if you think about multiple layers, something more obvious and more basic emerges – why do you need to allow anyone, coming from anywhere, to talk to you firewalls at all?  You should only ever need to administer your infrastructure from a well-defined command and control location (using “C&C” in the positive sense used by the military), and you can lock down access so that only people in this special zone can say anything AT ALL to your firewalls and the rest of your infrastructure – you can effectively reduce the attack surface for an attack, directly mitigating the huge risk of this kind of vulnerability.  Thinking in layers moves the question from “how do I prevent someone using the magic password?” (Answer: if you have the vulnerable software, you can’t), over to the easier and better question, “How do I limit access to the management plane of the firewall, to only the zone I run management from?”

For Enterprise Cyber Security, Think Modern Metropolis, not Fortress

Information Security Buzz | Jan 1, 2016

Once upon a time, cyber security was like a bank vault. We built thick walls and a big door and we put an armed guard out front. This was more than enough to keep valuable assets secure, because we didn’t have sensitive corporate data and credentials sitting on multiple servers and devices outside a business’s physical headquarters.  Read Dr. Mike Lloyd’s byline about the best way to secure an enterprise network.