Endpoint Cybersecurity’s CEO, Sorin Mustaca proudly taking a photo together with the team.
https://www.endpoint-cybersecurity.com/wp-content/uploads/2023/11/PXL_20231108_170436494.MP_.jpg24412265Sorin Mustacahttps://www.endpoint-cybersecurity.com/wp-content/uploads/2020/11/logo-new-300x103.pngSorin Mustaca2023-11-09 10:27:232024-02-26 17:31:31Endpoint Cybersecurity Sponsoring local volleyball team
If you produce some security software (Anti-malware, Anti-ransomware, URL Filter, etc.) you should never count only on one source of knowledge to deliver your product’s value to the customers.
Many companies think that this is their core competence and they refuse to look into other directions.
This is fundamentally wrong, even if you are a large enterprise with a lot of development and research power.
Why ?
Here are the top 6 reasons:
Now matter how good your research is, you definitely have some gaps or weaknesses in the existing technology. Nobody can cover everything!
I know from real-world examples how a 3rd party technology added as complement (on top or in parallel) has been successful in other organizations, and the benefits in terms of increased security, reduced R&D costs, and improved performance are much higher than the price paid for licensing or usage.
If you use a consulting company who knows either your technology or 3rd party technologies, your skip a lot of research for finding the right solution, negotiate the terms and additionally, they can help you integrate with your existing solutions.
Your clients will appreciate that the overall security is not 100% relying on your R&D and that other approaches are used. This will help them save money on buying another layer of protection in order to cover the gaps your product/technology has (see 1) .
Working with others is the only way of staying ahead of evolving security threats and the only of benefiting of the competitive advantages that other solutions provide.
The overall return on investment might not be immediately positive, but the long-term benefits for the company and for the clients will cover the costs multiple times.
Get in touch with us today to have a first (free of charge) discussion about how we can improve your products and technologies.
https://www.endpoint-cybersecurity.com/wp-content/uploads/2023/11/c0abd1f6-ca34-4bb7-8dec-f4b909b54197.jpg10241024Sorin Mustacahttps://www.endpoint-cybersecurity.com/wp-content/uploads/2020/11/logo-new-300x103.pngSorin Mustaca2023-02-06 18:46:582024-02-26 17:32:09Why companies producing security software need 3rd party help in adding additional security technologies
A year ago, at VB2019 we presented for the first time an overview of how the anti-malware world looks from the perspective of a young company trying to enter the market: how they try to build products, how they try to enter the market, how they try to convert users, and what challenges they face in these activities.
In this new paper we will present an overview of the situation for such a company after one year of experience. We will look at the situation from several angles:
that of the consulting company helping them to build the product and enter the market
that of working with certification companies regularly, checking the products for detection and performance
that of working with Microsoft to make the company compliant and keep them compliant
One year later, many still have a hard time understanding that the security market is no longer the Wild Wild West, but we also see that a lot of visible efforts are being made to improve. This means that compliance with ‘clean software’ regulations is becoming an issue. We will present some interesting statistics and compare data from the past with current data. The young companies still have a lot of challenges in understanding that implementing AV software is not the same as implementing any other type of software. Despite the fact that they still get flagged by the established products for various reasons, there are still more and more companies trying to enter the market.
A lot of people in the audience will ask themselves ‘why would anyone want to enter the market, since the market is overcrowded, there are plenty of free products out there, and on Windows there is also Microsoft Defender?’. We will try to provide an answer to this question, but the answer is not what many think it is. Or, maybe it is …
Video
https://www.endpoint-cybersecurity.com/wp-content/uploads/2020/11/vblocalhost1.png135337Sorin Mustacahttps://www.endpoint-cybersecurity.com/wp-content/uploads/2020/11/logo-new-300x103.pngSorin Mustaca2020-11-17 17:30:132020-11-26 21:32:02One year later: challenges for young anti-malware products today (presentation Virus Bulletin 2020)
Established anti-malware vendors, who are preoccupied with getting the best scores in detection tests and capturing more market share.
Emerging anti-malware vendors, who are trying to understand what they need to do in order to enter the market.
This paper is about the second category of companies: those who are trying to enter the market either because they have identified a small market segment which they think they can serve, or simply because they’ve heard they can make some easy money. None of these emergent companies actually know what it takes to make a ‘real’ anti-virus product. They try to enter the market by creating some software that detects malware using a third-party scanning engine and soon realize that things are much more complicated than estimated: they face a multitude of problems they don’t understand and realize that there are more who want to see them fail than who are able and willing to help them.
In this paper I will discuss some of the challenges emergent anti-malware companies face:
Technical: how do you create an AV product?
Certification: how do you get tested and by whom?
Reputation: how do you establish a good reputation and remain unblocked by the ‘big guys’?
Blacklisting: what happens if you get flagged by some established companies?
Getting along with Microsoft: how do you establish a realistic ‘go-to-market’ plan?
Free product: what does it take to make a ‘free’ anti-malware product?
https://www.endpoint-cybersecurity.com/wp-content/uploads/2019/10/File-05.06.18-11-47-32.jpeg7681024Sorin Mustacahttps://www.endpoint-cybersecurity.com/wp-content/uploads/2020/11/logo-new-300x103.pngSorin Mustaca2019-10-11 11:49:552019-10-11 11:50:30Challenges for young anti-malware products today (presentation Virus Bulletin 2019)
https://www.endpoint-cybersecurity.com/wp-content/uploads/2015/01/itsec.jpg439736Sorin Mustacahttps://www.endpoint-cybersecurity.com/wp-content/uploads/2020/11/logo-new-300x103.pngSorin Mustaca2016-09-27 07:42:472020-10-19 11:17:38Participant in the Cyber Security Alliance
We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
Essential Website Cookies
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
Other external services
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Privacy Policy
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.