Cymbel
www.cymbel.comCymbel Corporation is an Information Security Solutions Provider, helping our clients reduce the risks of confidential data breaches since 2000. In response to changes in business requirements, technologies, and the methods and motives of malicious third parties and insiders, Cymbel has applied a Zero Trust approach to updating our clients defense-in-depth architectures. Cymbel has no outside investors and is beholden to no third parties who could influence our recommendations. Cymbel has been profitable for 54 straight quarters. Zero Trust, as originally conceptualized by Forrester Research, means there are no longer "trusted" networks, devices, or users. Zero Trust Guidelines 1. Balance budget across Prevention, Detection, and Response controls. 2. Use a Kill Chain model to select technical controls Zero Trust Recommendations 1. Update network security with real Next Generation Firewalls (Next Gen is really technology, not just marketing.) 2. Use a "sandbox" control to detect threats in unknown files 3. Use a specialized anti-phishing email protection service 4. Use Threat Intelligence to prioritize vulnerability remediation 5. Use advanced machine learning algorithms to analyze logs 6. Implement an Incident Response system to minimize incident costs 7. Discover, analyze, and control Shadow IT 8. Monitor your supply chain for breaches using a cloud-based service 9. Deploy an Enterprise Key & Certificate Management system 10. Deploy a backup, cloud-based DDoS Mitigation Service 11. Deploy a non-signature-based endpoint malware detection control
Read moreCymbel Corporation is an Information Security Solutions Provider, helping our clients reduce the risks of confidential data breaches since 2000. In response to changes in business requirements, technologies, and the methods and motives of malicious third parties and insiders, Cymbel has applied a Zero Trust approach to updating our clients defense-in-depth architectures. Cymbel has no outside investors and is beholden to no third parties who could influence our recommendations. Cymbel has been profitable for 54 straight quarters. Zero Trust, as originally conceptualized by Forrester Research, means there are no longer "trusted" networks, devices, or users. Zero Trust Guidelines 1. Balance budget across Prevention, Detection, and Response controls. 2. Use a Kill Chain model to select technical controls Zero Trust Recommendations 1. Update network security with real Next Generation Firewalls (Next Gen is really technology, not just marketing.) 2. Use a "sandbox" control to detect threats in unknown files 3. Use a specialized anti-phishing email protection service 4. Use Threat Intelligence to prioritize vulnerability remediation 5. Use advanced machine learning algorithms to analyze logs 6. Implement an Incident Response system to minimize incident costs 7. Discover, analyze, and control Shadow IT 8. Monitor your supply chain for breaches using a cloud-based service 9. Deploy an Enterprise Key & Certificate Management system 10. Deploy a backup, cloud-based DDoS Mitigation Service 11. Deploy a non-signature-based endpoint malware detection control
Read moreCountry
State
Massachusetts
City (Headquarters)
Newton
Industry
Employees
11-50
Founded
2000
Estimated Revenue
$1,000,000 to $5,000,000
Social
Employees statistics
View all employeesPotential Decision Makers
Vice President and General Manager
Email ****** @****.comPhone (***) ****-****Managing Partner
Email ****** @****.comPhone (***) ****-****Managing Partner
Email ****** @****.comPhone (***) ****-****Business Development Manager at Cymbel Corporation
Email ****** @****.comPhone (***) ****-****
Technologies
(34)