Is There a Dog in That Picture?

by Cymatic | Mar 19, 2019 | Cyber Security

You might hear something like “Cymatic Security implements in a way that’s familiar to your user and your administrators.” It’s worth clarifying that, because it’s a really powerful statement.

No one likes to be told that a solution to a problem is “simple.” Probably for a few reasons, among them:

  • Nothing in the enterprise is simple
  • If it’s simple, you’re implying that it should have been figured out already
  • Even if the solution is simple, the integration with the enterprise is not

It’s that last point that’s the wasteland of great software products. Incentives have to align properly (the executive paying for the solution better be the one who gets the benefit) and the solution has to be modular so that it can fit into the existing environment without too much integration.

Often companies will say their solution is simple, trying to mean a few different things, not really implying the above. But, when you use words and want people to not layer on their own meanings you’re setting yourself up for failure.

In our internal conversations here at Cymatic we stuck on the word “familiar” and we’ve come to really like it. Familiar doesn’t mean simple, and it respects the complexities present in any large organization. Familiar is comforting, without judging.

It also implies that you likely have seen something like this before, and so you might have worked through some of the complexity for how to trial the solution, implment and manage the solution, and train your users to maximize the benefits. Let’s have a look what we mean.

Implementation Familiarity

One way that the Cymatic Security is implemented is just like Google Analytics. You insert a tracking code in your web site, and the rest happens automatically. (The other ways are via a browser plug-in similar to another Google project called Password Checkup, and via SDK.)

These days no one would implement a website without analytics, or to have a social marketing program without analytics. Our intention is to have companies feel the same way about user-born cybersecurity threat analytics and we wanted to create a familiar implementation strategy so that the insight we delivered is available to every company that wants to be more secure from breaches.

Administrator Familiarity

We’ve modeled our analytics dashboard after Google Analytics as well. We enable administrators to view aggregate data to get an idea of high-level trends (how risky are you?) and then drill into the most prominent risks to make it easier to improve your overall threat posture.

Similarly, just like you’d set goals and flows with website tracking, we can watch real-time activity to assess the threat in real-time and improve knowledge of new threat vectors. And, we can take mitigating action for specific threats on the fly to optimize results.

User Familiarity

It’s gotten to the point where every website has a chatbot for customer support, and users seem to love them. We do all this interesting AI processing of threat signals behind the scenes and then deliver user awareness behavioral recommendations to the user through a coachbot. It’s like having a real-time security coach giving each user personalized habit improvements.

One Final, Important Point

Enpoint security is predicated on having some level of control of the endpoint. Yet the number of endpoints under control is significantly fewer than the number of users bearing threats. There’s a huge blindspot in how we’re tracking threats, especially considering that almost 90% of threats are due to user behavior!

Imagine, 90% of your “problem” is due to users and you only track a fraction of your users because you limit yourself to endpoint protection on devices you know?

Now you don’t have to, because we can track ALL of your users, at internet-scale, in real-time, and deliver threat analytics to adminstrators to watch/remediate threats and to users to coach them into having better cybersecurity habits.