home
Boardroom
Extenua

HP Banner

In The Boardroom With...

Mr. Steve Visconti
President & CEO

Extenua


Updated November 10, 2016

SecuritySolutionsWatch.com: Thank you for joining us again today, Steve.  May we have an update regarding the Extenua and ImageWare relationship ?

"Last July we announced a strategic relationship with ImageWare in which Extenua would integrate the ImageWare’s GoverifyID biometric user authentication.  We saw the need to strengthen user authentication vulnerabilities which continue to plague the enterprise.  Cloud2Drive meets and even exceeds the challenges of securing data in flight and data at rest in today’s environment.  We felt it important to add the best in class GoVerifyID biometric authentication to fulfill a true end-to-end mobile and stationary data access platform. 

Extenua has made great inroads into large enterprise and government opportunities.  The significance of an end-to-end security solution cannot be understated in this hostile and turbulent world of attacks – both from abroad and the occasional bad actors within.  The size and magnitude of the opportunities are compelling as the markets are beginning to spend more resources on security.  We are engaged in multiple opportunities which run into the 10’s of thousands of users.  With each opportunity, it is a good feeling to know that ImageWare has solved the third factor authentication with GoVerifyID giving Extenua a competitive weapon unmatched in the market. 

Extenua recently announced a new product called Extenua SAFE AI which secures data behind web servers.  This is a game changer for SaaS vendors, users of Office 365 Enterprise as well as small and large web server farms that require security.  In those environments, the users connect to the servers with a secure browser with HTTPS.  On the back end storage Extenua SAFE AI chops the data into small chunks and encrypts each chunk of data with a unique encryption key that is generated in RAM only for the moment of encryption and decryption of those data chunks.  They key is then wiped from memory so there is no key to be found in the event of an intruder.  All of the encrypted data chunks are then scattered about in random encrypted directories with all metadata encrypted and obfuscated as well.  This presents an impossible environment for hackers or bad actors.  We know from our experience and news reports, the weak link will be the user’s authentication.  Extenua is pleased to work in partnership with ImageWare  in making GoVerifyID available to enhance the security for the secure browser users.  They will then have a true end-to-end secure environment."

Jim Miller, Chairman and CEO, ImageWare SystemsOTCQB : IWSY, added, “Data breaches averaged $4 million per incident last year and C level executives are in the crosshairs for failing to adequately secure valuable network endpoints and data. Sadly, the damage caused to brand intellectual property and other enterprise assets is increasing and the attendant loss of reputation is an incalculable cost.

Extenua’s Cloud 2 Drive and their new Extenua Safe AI offer the enterprise exceptional and unparalleled data security to combat this growing threat. ImageWare's GoVerify ID for Enterprise use teams up with Extenua to provide the missing third factor of identity in place of the obsolete, easy to compromise password - easy biometric authentication showing who you really are!

 

 


Steve Visconti is responsible for Extenua’s strategic direction and day-to-day business operations. As CEO, Mr. Visconti brings to Extenua over 25 years’ experience in both domestic and international business development, sales, marketing, and management success. Steve’s leadership experience includes top technology companies and startup ventures including Cisco Systems, Inc., Airespace, Ascend, Chipcom, and Banyan Systems. His understanding of technology and market conditions, together with the ability to lead high growth companies and build shareholder value, has contributed to his proven performance record and several successful startup successes.


SecuritySolutionsWatch.com: Thank you for joining us today, Steve, at this very exciting time in the growth of Extenua. Before discussing today’s cybersecurity threat environment and Extenua solutions in greater detail, please tell us about your background.

Steve Visconti: I would characterize myself as a serial entrepreneur.  There are five qualities that have led to my success, they are character, integrity, strategic thinker, decisive and energetic. In the early 80’s it became obvious to me that I like to build businesses particularly when it involves new ideas and breakthrough technologies.  I have been fortunate to have had several great outcomes with startup companies.

SecuritySolutionsWatch.com: One will read on Extenua.com that, “Cloud2Drive is the most secure cloud access software. Cloud2Drive delivers complete security, compliance (PCI & HIPAA), and unlimited access.” And, that it would take it would take 25 eons to break Cloud2Drive’s data encryption. Please walk us through the major features and benefits.

Steve Visconti: Cloud2Drive has been developed to solve a number of problems that previously presented a problem to the enterprise in fully utilizing cloud object storage. We first observed cloud services were growing exponentially particularly Software as a Service, Infrastructure as a Service although for some reason cloud object based storage lagged far behind the growth curve.   What we found was a complex problem set in that cloud storage security was not trusted, it was difficult to connect to, not suitable for use as primary storage and it suffered from frustrating outages.  Cloud2Drive was designed to solve this complex problem set.  The results are transforming how the enterprise not only utilizes the financial utility of cloud storage but doing it in a way which allows their business to flourish in this highly mobile society. 

Extenua’s Cloud2Drive provides a rich set of features unmatched by industry competitors thus creating genuine breakthrough technology.    There are six features wrapped into this easy to deploy and use software platform:

1.Cloud2Drive by far is the most secure platform for unstructured data storage both on-premise and cloud object storage.   Not only is it secure end-to-end, it eliminates the need for cumbersome and slow VPN connections and eliminates the need for AES encryption key management platforms. 

2. Mobility in this BYOD environment is easy and secure.  Users can access their data from anywhere securely as long as there is an internet connection.

3. Data migration real-time in the background with no service interruption is key to any successful cloud storage deployment.  Cloud2Drive provides automatic in the background data migration whether it is on-premise to cloud or cloud to cloud.   This feature is also used for high availability with RAID like features.  

4. Collaboration with network administrator governance. Protecting the company data assets should never be left to an individual user.  Cloud2Drive is under the control of the network administrator and to make it easy there is an option for Active Directory control with single sign on. 

5. Artificial Intelligence cache at the device and user level provides offline file access with 99.998% accuracy.  This ensures access to files even when you are out of the reach of the network.

6. Wipe Clean in the case of lost devices through x509 certificate revocation field extensions which will implement a full US Department of Defense 5220.22-M Data Wipe Method.

SecuritySolutionsWatch.com: We have heard positive remarks about your SilverSHield product, “a secure fast and easy to use Microsoft Windows™ SSH & SFTP server” and SilverSHielDSaaS. Can you tell me more about SilverSHielD?

Steve Visconti: SilverSHielD is the gold standard in SSH File Transfer for Windows Server.  It has won over 45 industry awards with over 3000 well-known companies using the product to date.  SilverSHielD is not only the most secure SFTP product, it also incorporates many rich features such as one button configuration for Cisco Unified Communication server backup, a number of available scripts for tasks such as e-mail upon completion, pager notification and many others.  It also offers support for several scripting languages so the network administrator can create his own set of rules based on specific events.

SecuritySolutionsWatch.com:  Yahoo, DropBox, LinkedIn…the daily headlines unfortunately remind us just how vulnerable we are in today’ constant threat environment and the bad guys come in many forms: foreign governments, sophisticated hacker groups, and “insiders” among others.  What is your perspective, Steve, regarding the unique value proposition that Extenua brings to the table in today’s IoT, mobility and BYOD environment?

Steve Visconti: Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.  It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization.

Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed.  This is precisely why an organization or enterprise must have the most secure and hardened environments possible.  Hackers and bad actors will eventually probe and eventually move on to the easier targets.  Don’t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive.

SecuritySolutionsWatch.com: Congratulations on the Extenua wins with Boeing, BT, HSBC, IBM, NCAA, Nokia, Shell, SONY, Toyota, just to name a few. The list is indeed quite impressive! Without divulging anything confidential, of course, care to discuss any additional details regarding the solution Extenua provided to these blue-chip organizations?

Steve Visconti: Our customers are finding unique ways of utilizing our products.  We have managed service providers implementing Cloud2Drive as a secure agent for enterprise backup to cloud utilizing their existing backup software.  We have customer that use Cloud2Drive SAFE AI on their web farms to secure data on the backend while allowing the flexibility of HTTPS for access – they implement a truly secure SaaS architecture by simply running our agent.  We also offer a full set of REST API for those that want to integrate into existing management systems and other enterprise applications.

SecuritySolutionsWatch.com: "We are now living in a time of global cyberwar which is real and persistent. Highly sophisticated programs are being released against the public sector every moment of everyday. Intruders have gained access to our most sensitive data. The stakes have never been higher. Extenua's ETESS and SAFE AI software platforms offer the most comprehensive and resilient security for storage available today. At American Cyber we deal with many different complex architectures. Partnering with Extenua solves one of our main concerns - protecting data in transit and at-rest. Once implemented you no longer have to worry about securing you unstructured data."

Please tell us more, Steve, about Extenua’s traction in the government space.

Steve Visconti: I like to say we are protecting the warfighters and their assets.  You mentioned Gary Winkler.  Gary is a trusted advisor who spent 13 years as an SES officer for various Army data centers.  We are fortunate to be working with several public sector projects including various Army operations, Air Force, DISA, US TRANSCOM and the NSA.  They all recognize the threats are real and the stakes could not be higher.  The public sector is moving rapidly to deploy products like Cloud2Drive and SilverSHielD which allows them the trusted security while at the same time the expanding their mobility access programs. 

SecuritySolutionsWatch.com: You’ve got an amazing management team at Extenua. Care to elaborate?

Steve Visconti: We have a secret weapon in Federico (Fed) Simonetti.  Fed is considered one of the top cyber security and AI experts in the world.  He started coding computers at the age of 7 with a commercial product at the age of 9!His background is vast having spend time as an ethical hacker, aka DDT, 4 time successful entrepreneur, Italy’s youngest full professor at the time teaching embedded operating system security at the University of Milan and some other activities building cyber security units for law enforcement which he can’t speak about for obvious reasons.  If you get the chance, I think you will find his story intriguing.  We strengthened our board of directors with seasoned veterans and we have an active top notch technical advisory board.

SecuritySolutionsWatch.com:  Nice job with the White Papers archive, Steve – want to give us a quick overview?

Steve Visconti:  Our white papers archive is growing.  From our site, you can find interesting topics anywhere from very technical discussions on elliptic curve Diffie-Hellman public key algorithms to implementing a secure web farm or SaaS infrastructure.  We will continue to add to our library over time with our soon to be released and much anticipated “Securing Office 365 Enterprise for Todays Hostile Environment”

SecuritySolutionsWatch.com: Thanks again, Steve, for joining us today...are there any other subjects you would like to discuss?

Steve Visconti: I look forward to new challenges and you can expect to see new announcements from Extenua very soon.  Thank you for hosting me.

HP Banner