12.07.2015 Views

GITEX 2012 INTERVIEWS ITU TELECOM World 2012 - Teletimes

GITEX 2012 INTERVIEWS ITU TELECOM World 2012 - Teletimes

GITEX 2012 INTERVIEWS ITU TELECOM World 2012 - Teletimes

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

services. One, the inspectionand termination of traffic musthappen in the country. Andsecond, the logs and data muststay in the country. We actuallymeet both requirementsThat’s why we are theapproved cloud service (andthe only one).TT - Besides Dubai do you haveany other operating offices inthe region or do you plan toopen any offices here?JC - From a cloud perspectivewe have Telecom Egypt, ZajilKuwait and a telco in SaudiArabia who we cannot nameright now. But yes we aretargeting every major telco inthe middle East to have thesame partnership that we havewith Etisalat and leverage morein country footprint as we goover time.TT - You’ve recently launched afree mobile app profiler. Couldyou tell us a little more aboutthat?JC - There are all kinds ofmobile apps being built anduploaded to all these mobilestores. All those apps aren’tgood though. Some aremalicious, some have securityissues, some have privacyissues wherein they send yourpersonal data out there andsending it to people who runads. So our mobile app profilerallows you to check what levelof security and privacy issuesare associated with a givenmobile app.TT - How are you able toprovide that?JC - Our research team inspectsthese apps. We have thetechnology to figure out andthen verify how good or badan app is. And then we scoreit and make that informationavailable to the public sothat they can make informeddecisions about whether or notto download the app or not.TT - Since you are the founderof this company would you liketo share something about thefounding of this company andthe big achievements?JC - I had before this company5 startups with a lot of goodluck, good timing, good teamsand hard work. This time mygoal was to solve some veryhard problems and built alasting business. We were veryambitious and decided to takea major undertaking of buildingthis kind of technology fromground up. We put about 230man years into this technologyso far. Now it was in stealthmode for about 20 months. Wewere just building. We’ve beenselling this for about 3 and ahalf years now. So what do wehave? 9 million users acrossthe globe who use our cloud toprotect themselves everyday.And they come from over160 countries. This is a bigachievement of having so manypaying users all over the globewith our technology deployedin hundreds of data centers.We are very proud of this.TT - Are you planning to launchany new software applicationsin the future- like the appprofiler?JC - So actually that is thenatural thing for us. There are 2kinds of things. There are coreapplications and there are addon services like the app profilerand we also did another toolcalled Zulu which checksmalicious URLs. Obviously thatwork will continue.On the core services side ofit, we will keep on enhancingand adding functionality. It isnatural for us to do that.TT - There have been numeroushigh profile security breachesin the Middle East like AramcoNidal Taha, VP-ME and Craig Hicks-Frazer, VP-Service ProviderBusiness Unit, Zscaler during the interviewand RasGas. So how wouldyou tell our users that by usingsuch services they could getaround this?JC - If you look at securityhacks and attacks years ago,hackers used to target servers.Now servers are pretty wellprotected these days withbig firewalls sitting in from onthem. So what do they do?Now they are targeting endusers. They are compromisingthe machine of the end userand then using it as beachheadto go and attack the networkand the servers.So really the point that’s notdefended is the mobile userand the mobile device. Ifpeople use Zscaler services,we can make sure that yourmobile users are well protectedand we’re seeing that everycompany has about 5-10% oftheir pcs infected with Botnets.These are like spies that callcommand and control centersand get instuctions fromthem. This could say- startcapturing passwords and ids,start a phishing attack. Wecan identify machines that areinfected and users can cleanthem up and this is importantfor security.We are the best protection forattacks against end users so wecan make sure that they do notbecome beachheads.TT - Could you talk in detailabout your long term plans forthe region?JC - This region is rapidlygrowing from internetadoption point of view. Asinternet adoption grows,security becomes an importantarea. That’s why we’re here.We think there is greatpotential for growth and weare counting on investingin resources and buildingour business along with ourpartnerships with local servicesproviders.TT - Do you intend to expandto South Asian markets?JC - We are already in southAsian markets. We havepresence in Asia-pac from HongKong to Singapore to Taiwan toMalaysia and further India.TT - Is there anything elsethat you would like to add forpublication?JC - I think if I were to addsomething I would said cloudis happening and as cloudhappens companies will needproper security that is bothin the cloud and requiresproper technology and properarchitecture. And really that’swhat we’ve built.32 November <strong>2012</strong>www.teletimesinternational.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!