WEBVTT 1 00:00:13.226 --> 00:00:14.446 I'm Craig Shue. 2 00:00:14.446 --> 00:00:15.776 I'm a professor of computer science 3 00:00:15.776 --> 00:00:17.606 at the Worcester Polytechnic Institute 4 00:00:17.606 --> 00:00:19.496 and CEO of ContexSure Networks. 5 00:00:20.086 --> 00:00:21.116 Wouldn't it be easier 6 00:00:21.116 --> 00:00:22.436 if we had security software 7 00:00:22.436 --> 00:00:23.526 that could tell the difference 8 00:00:23.526 --> 00:00:24.826 between malicious software 9 00:00:24.906 --> 00:00:26.666 and legitimate end-user activities? 10 00:00:27.236 --> 00:00:28.416 Our technology is PEACE, 11 00:00:28.636 --> 00:00:29.666 the Policy Enforcement 12 00:00:29.666 --> 00:00:31.496 and Access Control system for End-hosts. 13 00:00:32.256 --> 00:00:34.256 PEACE is designed to allow organizations 14 00:00:34.256 --> 00:00:35.666 to understand their networks 15 00:00:35.666 --> 00:00:36.646 and see all the traffic 16 00:00:36.646 --> 00:00:38.216 that is originating on their computers. 17 00:00:38.606 --> 00:00:39.416 What we're doing 18 00:00:39.416 --> 00:00:40.956 with our approach is allowing 19 00:00:40.956 --> 00:00:43.126 organizations to see all the traffic 20 00:00:43.126 --> 00:00:45.196 inside of their networks and to be able 21 00:00:45.196 --> 00:00:46.586 to make decisions on whether 22 00:00:46.586 --> 00:00:48.056 to allow something or deny it. 23 00:00:48.596 --> 00:00:50.706 We change the game by creating software 24 00:00:50.706 --> 00:00:52.176 that sits on each of the end hosts 25 00:00:52.176 --> 00:00:54.256 at the organization that asks 26 00:00:54.256 --> 00:00:55.686 for permission before it creates 27 00:00:55.686 --> 00:00:56.496 network traffic. 28 00:00:56.736 --> 00:00:57.936 The benefits of this approach is 29 00:00:57.936 --> 00:00:59.836 that we'll be able to write policies 30 00:00:59.836 --> 00:01:01.866 that will allow organizations to be able 31 00:01:01.866 --> 00:01:03.786 to distinguish between legitimate 32 00:01:03.786 --> 00:01:05.096 and malicious activities. 33 00:01:05.676 --> 00:01:07.286 In doing so, we're able 34 00:01:07.286 --> 00:01:08.506 to beat our competition, 35 00:01:08.506 --> 00:01:09.046 which isn't able 36 00:01:09.046 --> 00:01:10.476 to see any traffic inside 37 00:01:10.476 --> 00:01:12.686 of a local organization's subnet. 38 00:01:13.346 --> 00:01:15.326 Perimeter defenses miss all the traffic 39 00:01:15.326 --> 00:01:17.206 that's happening within an organization. 40 00:01:17.546 --> 00:01:19.296 End-host firewalls don't have the 41 00:01:19.296 --> 00:01:20.216 detailed information 42 00:01:20.216 --> 00:01:21.796 about what's happening within the rest 43 00:01:21.796 --> 00:01:22.916 of the organization. 44 00:01:23.626 --> 00:01:25.596 With PEACE from Contexture Networks, 45 00:01:25.596 --> 00:01:27.176 you'll finally be able to be at peace 46 00:01:27.176 --> 00:01:29.226 with your users and your data.