Attack Surface Management
,
Governance & Risk Management
,
Next-Generation Technologies & Secure Development
Yevgeny Dibrov on How Silk Security and CTCI Strengthen Armis’ Cyber Capabilities
Armis emerged in 2015 as a formidable competitor in the attack surface management market, with a focus on asset discovery and management. But customers also needed solutions for vulnerability management and threat intelligence, which is why the company earlier this year made its first two acquisitions, said CEO Yevgeny Dibrov.
See Also: How to Empower IT with Immutable Data Vaults
Dibrov said Armis’ asset intelligence platform incorporates CTCI’s threat hunting technology, which aligns with its goal of delivering timely and actionable threat intelligence, and the purchase of Silk Security addressed a significant customer need for improved cyber risk prioritization and remediation. The decision to acquire rather than continue building in house was driven by the urgency of customer needs and the potential for faster growth, according to Dibrov (see: Armis Buys Cyber Remediation Startup Silk Security for $150M).
“This is a need that is super urgent for the organization,” Dibrov said. “It’s something that is also big. It’s not just a small feature, but actually a product, and something that would take six months or a year to build. But actually, we can have it today via acquisition, not miss the market, and grow with our customers. In this case, it is something that we would go and buy.”
In this video interview with Information Security Media Group, Dibrov also discusses:
- The importance of integrating Silk’s cyber risk prioritization in Armis’ platform;
- How CTCI’s threat hunting technology enhances Armis’ asset intelligence;
- Future plans for further mergers and acquisitions in the cybersecurity space.
Dibrov co-founded Armis in December 2015. He previously spent three years at cloud access security broker Adallom prior to its acquisition by Microsoft, during which time he led global business development. Prior to that, Dibrov spent 15 months as a firmware engineer at Mellanox Technologies and two years as a software engineer in the Israeli Intelligence Corps.