S. Fogarty, T. Solie, T. Phillips
Phase II, Virginia, United States
Keywords: cybersecurity, attack, disruption, IoT, OTThe current narrative in network security is troubling: Big data analytics solutions aren’t working. They are difficult to implement and tune, after-the-fact and make ever growing demands on incident response teams. Delivering intrusion insights after-the-fact means the adversary has already won. Ridgeback is built on the strategies of conflict. Its patented methods expose adversary discovery and enumeration, engaging intruders automatically to impose costs on them during connection. Ridgeback is instant-on, immediately delivering a higher level of security – easily within limited budgets and workforce constraints - immediately improving security posture while saving money and time in the out years.