This podcast explores innovative cybersecurity solutions such as browser plugin-based security, dynamic firewalls, and mobile threat hunting. They discuss identity management challenges, streamlining security measures with tools like Knock Knock, and the evolving landscape of mobile security. The creators of Push Security and Knock Knock share insights on their tools' unique features and benefits for organizations.
Push Security offers a browser plugin for identity security against attacks, including app control and phishing detection.
Knoc Knoc provides dynamic firewalling based on user authentication, enhancing enterprise system security with IP restrictions.
Deep dives
Push Security: Browser Plugin for Identity-Based Threat Prevention
Push Security offers a browser plugin that enhances identity security by detecting and responding to various attacks. The platform includes features for proactive monitoring like mapping vulnerable identities and implementing app control to restrict access to certain applications. The plugin can also prevent corporate password reuse and detect phishing attempts, providing a comprehensive solution for identity-based threats.
Knock Knock: Dynamic Firewalling Solution for Enterprise Security
Knock Knock provides a dynamic firewalling solution that controls access based on user authentication status, enhancing security for enterprise systems. The product enables IP restrictions for services like RDP or Citrix based on user sign-in status, adding a layer of protection against unauthorized access. Its user-friendly approach simplifies security management and offers a pragmatic solution for optimizing security posture across various applications.
Iverify: Mobile Threat Hunting Platform with EDR Capabilities
Iverify offers a mobile threat hunting platform with EDR services that focus on detecting and mitigating advanced threats in iOS and Android devices. The platform combines deep access and automated detections to monitor for potential spyware or malicious applications. By leveraging its forensics capabilities, Iverify has successfully identified threats like the Pegasus spyware in the wild, providing crucial insights and protection against mobile-based attacks.
Targeted Verticals and Compliance-Focused Use Cases for Iverify
Iverify caters to organizations in high-risk sectors like defense and government, cryptocurrency, and other industries vulnerable to espionage or economic threats. Additionally, the platform is ideal for compliance-driven environments where organizations prioritize employee privacy and security without imposing intrusive MDM solutions. It serves as a dual solution, offering stringent security measures while maintaining operational efficiency and user trust.
In this edition of Snake Oilers we’ll be hearing from:
Push Security: A browser plugin-based security company that combats identity-based attacks. (Much more compelling that it sounds in this description.)
Knocknoc: The tool Risky Business uses to protect our own applications and services. (Restrict network/port access to users who are authenticated via SSO.)
iVerify: Mobile security and threat hunting for iOS and Android. (Caught Pegasus in the wild!)
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode