From The Sip Trunking Experts

TMCNet:  Co3 Systems Gathers C-Level Security and Privacy Expertise in New Advisory Board

[February 26, 2013]

Co3 Systems Gathers C-Level Security and Privacy Expertise in New Advisory Board

(Marketwire Via Acquire Media NewsEdge) CAMBRIDGE, MA -- (Marketwire) -- 02/26/13 -- Co3 Systems, a pioneer in Incident Response software, today announced the founding members of its Advisory Board. Comprised of senior information security, privacy risk and compliance executives, researchers, high tech innovators, and entrepreneurs, the Board's charter is to help Co3 drive the next phase of innovation in security incident response.

With the launch this week of a major platform expansion to bring Co3's value to a range of security incident response scenarios such as Distributed Denial of Service attacks (DDoS) and malware infections, Co3 is gearing up to accelerate the momentum it achieved in 2012 -- including a fourfold increase in year-over-year bookings and customer base. The new module is built upon and expands beyond the company's highly successful Privacy Breach Response module that addresses Personally Identifiable Information (PII)/regulated data breaches. The Advisory Board was assembled to provide broad and deep experience in technology, business and legal dynamics to inform and optimize continued development of the Co3 solution.

The Co3 Systems Technology Advisory Board includes: -- Joseph DeSalvo, Managing Director, Zero Point Risk Research DeSalvo served as Chief Security Officer (CSO) for Iron Mountain and was a Special Agent at the Federal Bureau of Investigation (FBI).

"Today's reality includes facing a state of perpetual threats and compromise. This doesn't mean however, that organizations must remain easy prey. What sets a business apart in this predatory environment is a balanced strategy of prevention, robust incident response capabilities and following an incident, a quick and decisive response. Co3 represents an opportunity for organizations to empower themselves and consistently ensure a complete, comprehensive and compliant response." -- Gerhard Eschelbeck, CTO & Senior Vice President (SVP), Sophos Gerhard is the author of the "Laws of Vulnerabilities" and one of the inventors of the Common Vulnerability Scoring System (CVSS). As a technology pioneer, he held numerous senior executive positions at Webroot, Qualys and McAfee. He is a widely regarded expert on network and system security, and was invited to present his research in information security to the U.S. Congress.

"As technologists and innovators, we need a feedback loop, especially in security. Understanding where certain controls succeed or fail is how we improve -- the more input we have, the better we can be, and the faster we can get there. While Co3 provides tremendous value as a tool for preparedness and response, it also represents a great opportunity for technologists to understand the relative strengths and weaknesses in how technologies, controls and the people who interact with them are deployed." -- Samir Kapuria, Vice President, Business Strategy and Security Intelligence, Symantec Kapuria has held management and technical positions at @stake; BBN Technologies, and Bankers Trust.

"Better security is built on better intelligence. The more information we have at our disposal, the better we can handle the unpredictable nature of threats to the business. While most think of attack profiles and malware samples when they think of security 'intelligence,' equally important is capturing how business processes and audiences consume that intelligence. By creating a rich structure and tools for guiding preparedness and response, Co3 is creating additional value in security intelligence and helping to build better security overall." -- Eugene Kuznetsov, Executive & Entrepreneur Kuznetsov is Founder of DataPower and Abine, angel investor, recipient of the InfoWorld Top 25 CTOs award and Ernst & Young Entrepreneur of the Year.

"In today's world, organizations have to not only defend against cyber threats, but to also plan for the virtual inevitability of their networks being breached. What impresses me about Co3's innovation is that it provides a pragmatic solution to the problem of responding to serious security incidents while complying with all relevant regulations. " -- Stuart McClure, CEO, President and Founder, Cylance, Inc.

McClure is the founding author and lead writer of "Hacking Exposed" and has held numerous senior executive positions at McAfee, with the most recent being Executive Vice President, Worldwide Chief Technology Officer (CTO) and General Manager.

"As we've highlighted in 'Hacking Exposed,' to completely respond to today's advanced threats, organizations must enhance their incident response capabilities. Co3 allows organizations to be thoroughly prepared when the next big attack hits, and ready to move when it does." -- Chris McLellan, Chief Security Officer, HubSpot Inc.

McLellan served as Vice President, Risk and Compliance, Enterprise Technology Services for State Street Bank and SVP/CISO, Technology Risk Management for Fidelity Investments.

"No matter how big you are or how well you think you are prepared, breaches can and will happen. Maintaining trust in the face of this requires confidence that any breach will be dealt with swiftly and decisively. Many organizations struggle with manual, error-prone, and time-consuming approaches to breach response. What Co3 has built allows organizations to remain confident of the continuity of their business and ensure that they protect the trust of their constituents." -- Larry Ponemon, Chairman and Founder of the Ponemon Institute Dr. Larry Ponemon's research firm is dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.

"When it comes to security and privacy, the devil is in the data. Years of analyzing privacy and data breach trends make it clear that the vast majority of organizations still operate -- regardless of their words or controls -- under the 'I never thought it would happen to me' mentality. This is a big mistake. Having both designed privacy programs and analyzed the aggregate of industry preparedness, no organization should ever be comfortable with its readiness. Having put the Co3 solution to the test, I can say that organizations that use a solution like Co3 can avoid this pitfall and put themselves ahead of the pack." -- Andrew Serwin, CEO and Executive Director at The Lares Institute Serwin is the founding chair of the Privacy, Security and Information Management Practice of Foley & Lardner LLP. He has authored several books, including the leading treatise on privacy, "Information Security and Privacy: A Guide to Federal and State Law and Compliance" and has received numerous accolades in data protection and privacy by Computerworld and Legal 500.

"Many businesses who experience a breach are caught off-guard and unprepared for the complicated sea of regulations with which they must comply. Such events can consume huge amounts of time across multiple parts of the organization, driving enormous expense in personnel and consulting costs, and placing the company at risk for substantial damage to the business, imposition of regulatory fines, and uncontained brand damage. Managing the breach is important, but having an actionable plan to move beyond the incident is something each organization should try to achieve. Tools like Co3 can help companies focus on tuning an organization's response and then executing it, rather than getting mired in detail that doesn't move the needle long term." "It's tremendously gratifying to have so much talent standing alongside the company -- a clear sign from industry experts that we're on the right track," said John Bruce, CEO at Co3 Systems. "It's immensely valuable to have their counsel as we build our business." Follow Co3 Systems: Co3 Systems Blog: Videos: Events & Webinar Series: Twitter: @co3sys About Co3 Systems Headquartered in Cambridge, MA, Co3 Systems is an innovator in Incident Response Management solutions. The company's SaaS-based offering enables organizations of all sizes to efficiently prepare for and rapidly manage the Response Process for Security Incidents and Privacy breach events. Companies using Co3 demonstrably minimize the costs resulting from incidents. With funding from Fairhaven Capital, the company's executive team and advisors comprise experts from world-leading security, privacy, software and service organizations. On the web at Contact: Jennifer Torode CHEN PR for Co3 Systems Email Contact (781) 672-3119 Source: Co3 Systems

[ Back To SIP Trunking Home's Homepage ]

Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner

Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.

Featured Case Studies

Case Study - Haiti
With this solution our doctors were able to reach anywhere in the world quickly and easily, to get consults from colleagues, facilitate treatment, order supplies 'on the fly' and also help victims report back to families. The solution from Business Mobility Systems and Ingate worked immediately.

Case Study - Turkish Petroleum
"With one Ingate at the customer headquarters, all of their remote workers can enjoy the benefits of Turkish Petroleum's IP-PBX from anywhere in the world.

Case Study - GCM
"The Ingate solution overcomes the NAT traversal hurdle and makes it possible to connect customers to our VoIP service, without the need of costly leased lines or support intensive VPN tunnels.

Case Study - Kool Smiles
"Ingate's solutions provide the advanced level of security necessary for this medical environment and the tools to make the interface to the service provider hassle-free."

Case Study - NMSAS
"This solution really saved the day for us," said Paul Mercier, IT Administrator, NMSAS. "We needed to leverage SIP trunks to reduce costs, and they had to work with our existing Microsoft OCS investment."

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.