We have just recently added some new sites to our homepage. New pages will take you to dedicated space for industries such as:

We have decided to create these sites so it's easier for the people who visit us from these specific industries to find what they are looking for. Our service and product are pretty straight forward and easy to explain:

Secfense protects against phishing and other credential theft by enabling any multi-factor authentication on any application. In just minutes.

However there are always some market specific industry specific nuances that are worth to address separately. Each market has different use cases and something that would never be a problem in the financial sector can in fact be a pretty common problem in healthcare. And the other way round.

Why only three markets?

We are a growing start-up and we take one thing at the time. Every week we take two or more discovery calls that often end up in moving forward to POCs (proofs of concept). Since in the last couple of months most of the calls have come from these three verticals we have decided to start with financial services, healthcare and corporate businesses (pretty general, we know).

It's more than certain that we will be creating more and more market specific content as we discover new markets where our technology could bring the most value.

Soon, we will be visiting next big show called Total Telecom Congress, this time dedicated to telecommunications business and we are already working on an offer designed for this vertical.  

Why Telecoms next?

Because Secfense User Access Security Broker brings the most value in big organizations with thousands of employees and hundreds of applications ands that's exactly the landscape of telecom businesses.

Just recently a huge news has popped out in the telecoms data security. One of renowned cybersecurity portals called KnowBe4 reported after Wall Street Journal story that Chinese hackers have infiltrated Global Telecom Networks with spear phishing techniques. That wouldn't be such a big story (since successful phishing attacks  happen every single day) if not the scale of the criminal campaign.

It was said that the campaign took many years to plan and perform and involved 20 military officials, dissidents, spies and law enforcement personnel. The whole thing, believed to be tied to China, was spanned across Asia, Europe, Africa and the Middle East.

What can be done?

There's no 100% security. In case of campaigns were the whole bunch of people are involved, spy networks and governments there's probably no technology that will eliminate compromise risk completely.

In many cases however, the weakest link and the place were the breach usually comes from is where human meets the machine and when the authentication happens, and many times successful phishing attack and credential theft happens.

The trend shows that cyber attacks move in one specific direction. Quoting Verizon's 2017 Data Breach Investigations Report:

In 2017 more than 80% of security breaches came from phishing and credential theft.

One year later the statistic showed that this number has increased even more. The report from the same company has shown the following statistics:

Verizon Report concludes that phishing is represented in 93% of data breaches.

One at the time

Secfense focuses on one specific space where the breach can come from. Authentication. We believe that this process can be protected in a way that the phishing risk and credential theft can be completely eliminated. Google was able to do that in 2017 and now any other business can do too.

You can schedule a quick discovery call with us to learn how or if you don't like to talk with the strangers you can also watch this 5-minute live demo where we show the complete deployment of Google's battle-tested technology on a live web application.