Be a part of high executives in San Francisco on July 11-12, to listen to how leaders are integrating and optimizing AI investments for achievement. Learn More
VentureBeat sat down (just about) with David Canellos, president and CEO of Ericom Software, to realize his insights into the distinctive challenges and alternatives of helming a number one cybersecurity supplier as we speak. Beforehand, Canellos was SVP of worldwide service suppliers for Symantec, which he joined by the acquisition of Blue Coat Methods. He has additionally held numerous government positions with the Oracle Corporation, Versatility and SAIC.

The next is an excerpt of VentureBeat’s interview with David Canellos:
Why cybersecurity?
VentureBeat: How did you get began within the cybersecurity trade, and what retains the sector fascinating to you?
David Canellos: Almost 20 years in the past, I peered across the nook and realized that the tempo of technological development and digitalization of each facet of life was escalating — the web was increasing, ecommerce was difficult the brick-and-mortar mannequin, smartphones had simply been launched, premium digital content material was obtainable on-line, cloud computing was beginning to emerge, Google search had develop into a factor — however cybersecurity wasn’t maintaining. If something, it was an afterthought, bolted on versus being inbuilt by design.
Occasion
Remodel 2023
Be a part of us in San Francisco on July 11-12, the place high executives will share how they’ve built-in and optimized AI investments for achievement and averted widespread pitfalls.
Since insiders have been trusted, community safety was “castle-and-moat,” designed to guard in opposition to exterior threats like distributed denial of service assaults on standard or essential web sites. The gaps that this mannequin left open symbolize a big assault floor that continues to develop as digital transformation proceeds.
Again then, I lucked out and located Cloakware, an early-stage cybersecurity supplier that created software program to guard supply code. A captivating proposition — to safe delicate software program like digital rights administration and on-line gaming, defend army gear from reverse-engineering by a possible adversary to get at extremely delicate software program secrets and techniques, safe root passwords of vital infrastructure, and so forth. As soon as bitten, I went all in on cyber and haven’t regarded again.
What retains me going is the dynamic, continually evolving nature of the cybersecurity trade — all the time one thing new to be taught and new challenges to deal with. And the stakes are increased than ever, which makes the trade thrilling.
VentureBeat: What led you to tackle the CEO position at Ericom? What are the favourite elements of your position?
Canellos: Ericom is a captivating firm that went past intriguing for me.
After I joined, the corporate was within the early innings of an intentional pivot from its profitable heritage of distant entry to cybersecurity, and the foundational items have been in place: a blue-chip buyer base, actual revenues from manufacturing clients vs. pilots or POCs, know-how and GTM companions and, most significantly, a proficient core workforce. My perception was I may have an effect by stimulating additional development, specifically, by extending the technique to develop a cybersecurity entry platform on the general public cloud, delivered globally as a real, cloud-native service.
The roots and epicenter of Ericom are in Israel, a rustic referred to as a startup nation largely on account of its disruptive cybersecurity improvements. Safety is intertwined within the tradition and lifestyle in Israel, and therefore the entry to proficient and artistic folks — particularly engineers — aiming for cybersecurity careers was enticing.
The corporate was and is bootstrapped. There’s no enterprise capital or non-public fairness, so buyer gross sales are what funds the corporate. So no most well-liked class of shares, a easy cap desk and a degree taking part in subject for all Ericom stakeholders. This leads to a way of possession and shared mission throughout our workers, permitting us to really feel related to what actually issues and that the work we do has a better sense of objective.
It’s been a heavy carry for all of us. For me personally, it’s been satisfying that Ericom scratched my itch to (1) be taught and develop professionally, (2) make some cash, and (3) have enjoyable. Wrapping all of this into one phrase, it’s the creation of an organization tradition embodied in what we name #OneEricom.
Zero belief and the safety stack
VentureBeat: What’s Ericom’s imaginative and prescient of zero belief, and the way does that information the roadmap of your services?
Canellos: In line with the view of our chief technique officer, Chase Cunningham, who helped validate and lengthen the zero-trust idea whereas at Forrester, our merchandise implicitly belief nobody, confirm typically, and ensure if and when an attacker will get in, they’re restricted by segmentation to allow them to’t trigger widespread harm. In impact, minimizing the blast radius of something that goes mistaken.
Our roadmap is guided by our dedication to creating merchandise that assist our clients actualize that zero-trust imaginative and prescient of their organizations.
VentureBeat: Ericom’s first transfer into the cybersecurity market was with a distant browser isolation (RBI) resolution for net safety. Why did the corporate begin there?
Canellos: Ericom has a powerful historical past of creating distant entry and connectivity options. At one level, we discovered that our virtualization options have been being utilized in Japan, considered one of our key markets, to assist organizations adjust to an “web separation” requirement — principally making certain that any system accessing the online was separated from the remainder of the community for safety functions.
Whereas these clients have been attaining efficient separation, virtualization was not an excellent resolution from both the consumer expertise or value perspective.
By creating a extremely scalable and cost-effective distant browser isolation resolution, we made an actual distinction for our clients.
VentureBeat: How has your resolution advanced over the previous few years?
Canellos: Greater than our RBI resolution has advanced; our product portfolio has advanced properly past RBI to offer a full cybersecurity stack.
Ericom now delivers a full-stack cybersecurity platform aligned with Gartner’s Safety Companies Edge (SSE) mannequin on a world cloud infrastructure. This multi-tenant platform contains an built-in set of controls that simplifies operations and improves safety outcomes. It features a safe net gateway with built-in RBI core, clientless and client-based zero-trust community entry (ZTNA) choices, cloud entry safety dealer (CASB), knowledge loss prevention (DLP), and extra.
We invested closely in creating this cloud-native resolution, together with the underlying structure, which we name the Ericom International Cloud. It’s a high-availability, elastic, cloud-native infrastructure that scales to ship an impressive, low-latency consumer expertise. We constructed it on public cloud IaaS, so it’s not tied to any particular supplier’s infrastructure, which leads to distinctive flexibility, efficiency and value benefits. So far, greater than 50 Ericom International Cloud factors of presence (POPs) can be found, and we’re including extra this yr.
VentureBeat: What are the first safety use instances you’re seeing organizations deal with together with your SSE resolution?
Canellos: Regardless of some return to the workplace, distributed distant/home-based work has develop into a everlasting fixture in a lot of the markets we serve. There’s a enormous want to attach these employees to company apps securely — whether or not to SaaS apps like Salesforce or ServiceNow, or company cloud or legacy apps, so this can be a key use case. We deal with this want with the ZTNA capabilities in our platform and our CASB resolution.
On the subject of securing work at home, I’m notably enthusiastic about our clientless ZTNA resolution, which protects company apps and knowledge from dangers and threats from unmanaged gadgets and BYOD — a giant problem for organizations.
Use of unmanaged gadgets is on the rise. For instance, new distributed work environments and versatile workforce buildings have made use of third-party contractors the norm in most organizations. Contractors usually have to entry lots of the similar apps and knowledge that a company’s salaried workers use every day.
However in contrast to workers, contractors usually don’t use laptops which are provisioned and managed by IT departments, so it’s difficult — or unattainable — to deploy and configure the required VPN software program and endpoint safety on their laptops. Because of this, unmanaged gadgets symbolize a singular risk to an organization’s knowledge, in addition to the safety of their complete community.
Our resolution permits IT groups to set and implement granular app entry and data-use insurance policies for unmanaged gadgets within the cloud with out putting in any brokers or altering configurations on contractors’ gadgets. Utilizing their normal net browser, contractors log in as regular, but their privileges and utility use could be managed. The in depth, policy-based safety controls offered by the answer are noteworthy in an answer that’s easy to make use of and deploy.
Our clients additionally want to guard all customers as they work together with the online, whether or not they’re onsite or distant. To deal with net safety, our SWG has net isolation capabilities built-in, in addition to DLP for knowledge safety.
Phishing prevention is a specific concern since, regardless of widespread necessary antiphishing coaching, customers maintain clicking on emails and hyperlinks. Our platform’s distinctive antiphishing resolution permits IT groups to have web sites launched from hyperlinks in emails open in a read-only, remoted mode to assist forestall credential theft and block malware.
Not like almost all different SSE distributors, Ericom’s platform contains identification administration capabilities with multifactor authentication as a normal part. Zero-trust begins with understanding identification. As soon as an enterprise authenticates an identification, it will probably implement the suitable user-level authorization and entry insurance policies. That is elementary to zero belief, so it’s core to our platform.
Constructing a world cloud infrastructure
VentureBeat: I’ve seen quite a few bulletins concerning the build-out of your world cloud infrastructure. Why are extra POPs essential sufficient that you simply announce them?
Canellos: Having differentiated safety capabilities in your SSE service is barely half the equation for a safety vendor like us. Equally essential is the way you ship these capabilities — and that’s what makes our rising quantity and distribution of POPs newsworthy.
We’re very happy with the cloud infrastructure we’ve developed. The Ericom International Cloud is a high-availability, elastic, cloud-native infrastructure that scales to ship an impressive, low-latency consumer expertise. It’s constructed on public cloud IaaS with out being tied to any particular supplier’s infrastructure, giving it distinctive flexibility, efficiency and value benefits.
As you talked about, we’re fairly energetic in constructing it out. So far, greater than 50 Ericom International Cloud POPs can be found.
VentureBeat: Are you able to talk about any challenges Ericom has confronted in creating its know-how or bringing its options to market and the way it overcame them?
Canellos: Nicely, on the know-how entrance we’ve mentioned a number of, corresponding to designing an IaaS provider-agnostic world cloud infrastructure or creating new options for thorny points like unmanaged system entry, phishing or digital assembly safety. We tackled all of those as a boot-strapped group, taking in no outdoors institutional capital.
This required us to remain very disciplined on the know-how aspect of the home, working aspect by aspect with clients and companions, staying laser-focused on key priorities, and carefully following the build-measure-learn method outlined in The Lean Startup, Eric Ries’ well-known guide (which lives proper right here, on my desk).
On the go-to-market entrance, we took the time up entrance to establish strategic companions with sturdy mutual know-how/product/service alignment in an effort to create environment friendly routes to market.
Constructing a cybersecurity profession
VentureBeat: What recommendation would you give somebody concerned about pursuing a profession in cybersecurity?
Canellos: Three issues come to thoughts:
- To embark on a profession in cybersecurity, it’s essential to familiarize your self with the assorted areas of specialization in an ever-broadening subject. This could embody community safety, utility safety, cloud safety, cryptography, and different areas. Organising a private lab setting to experiment with completely different instruments and strategies might help you acquire sensible expertise and develop your abilities.
- The cybersecurity panorama is frequently evolving. Staying present with the newest tendencies and applied sciences is crucial for achievement. So learn blogs, take heed to webinars, attend conferences like RSA and Black Hat, and skim trade publications.
- Constructing a community of cybersecurity professionals can provide you alternatives to find out about new prospects, receive trade insights and set up helpful relationships that may assist advance your profession. Take into account that staying engaged and related is vital in such a aggressive and quickly evolving trade.