Alexa

30 Best Small Companies to Watch 2020

VIRTIS is revolutionizing the cybersecurity segment the with its unparalleled shielding technology

thesiliconreview-michelle-wilner-ceo-virtis-20.jpg

We live in a digital age where companies today must offer data access to customers, partners, and employees to stay efficient. For enabling access, we will need the internet, and this furthermore exposes the organizations to hostile environments. Employees can voluntarily or involuntarily threaten the network with their actions, and companies must be ready for imminent threats. Cybercriminals are always on a lookout to find vulnerabilities in network protection devices. The main motto of the devices placed in the network perimeter is to protect the organizations from ever-evolving threats constantly. We must protect the integrity, availability, and confidentiality of the internal network, along with that, we must also protect the information resources because we rely on it.

With 48% of all breaches coming from Web Apps, Exposure is no longer an option. VIRTIS eliminates the exposure gap in Web App & API Security IMMEDIATELY, Protecting organizations from ALL their known vulnerabilities within hours, even minutes upon deployment. Its revolutionary award-winning SHIELDING Technology is the safer, faster, and more cost-effective choice over traditional Web App Protection methods that fall short, leaving you exposed. VIRTIS currently offers the only stateful, 24/7/365 fully managed Web APP & API service. It fully manages the application lifecycle and de-risking the application development process by bringing DevOps and SecOps closer together, ensuring safe delivery of applications quickly, securely, and in a cost-effective, pragmatic way. Risk acceptance is no longer needed. Exposure is immediately eliminated. No tools, no resources, and no developers need—nothing to manage on your end. VIRTIS will do it all. SHIELDS UP! Cover Your Assets!

VIRTIS was founded in 2016, and it is based in Los Angeles, California.

In conversation with Michelle Wilner, Co-Founder and CEO of VIRTIS

Q. There are other providers in the network security segment. How is your services unique?

We don’t touch a single line of source code. We focus on vulnerability and not the application. Hence, we remove the vulnerability from being exploited without touching the application code itself. This enables us to provide remediation of application vulnerabilities without breaking the application, or its dependencies, making VIRTIS the safer, faster & more cost-effective choice over any other method out there today. VIRTIS picks up and protects where WAFs fall short. WAFs cannot protect against business logic flaws and is only a small piece of the security puzzle. We protect against business logic flaws IMMEDIATELY. Developers are too slow (4-6 months, on average, to fix critical & high vulnerabilities) VIRTIS protects against ALL your known vulnerabilities IMMEDIATELY. Legacy Apps often cannot be fixed by developers. VIRTIS also protects legacy Apps from vulnerabilities IMMEDIATELY. So even with static and dynamic code scanning, pen-testing, vulnerability scanning from multiple tools, and bug bounties, why not have a dynamic shielding layer that will wrap and fully protect your Apps and APIs IMMEDIATELY eliminating any exposure.

No WAF can protect what VIRTIS can. No developer can do what VIRTIS does at the speed that VIRTIS can. We have a Best-In-class WAF in their baseline policy.  We are happy to work alongside your WAF. We can sit in front of or behind your WAF. Or you can choose to use our WAF. We don’t charge any more or less to use our WAF. VIRTIS automatically risk prioritizing issues based on issue severity and the system value at risk. It’s easy to gain deep, risk contextualized insight into your third parties’ cybersecurity risk performance.

Stop digging through mountains of issues to get to the most important ones. With risk prioritization, you know exactly where to start. CEOs & Board level executives love this because CISOs can provide reports showing their risk score and how they benchmark against industry peers. They can defend the money they’re spending with confidence. CISOs can sleep at night, knowing there is a fully managed service available that will secure their entire digital network perimeter immediately.

Q. “Earning the trust and respect of consumers all around the world is possible by delivering high quality in all of their actions.” How do you interpret this statement?

Providing a phenomenal, fully managed service coupled with an overall stellar customer experience approach will yield customer retention in perpetuity. Customer service is truly a dead art. You very seldom hear stories about how a prospect and or client received service that results in, “and they really went above and beyond for me.” An integral cog in the VIRTIS wheel is making sure that ALL of our customer’s needs are met (if not exceeded), questions answered, and concerns addressed with the type of disposition that lets them know that they are our number one priority 24/7/365 days a year.

thesiliconreview-virtis-cover-30-best-small-companies-to-watch-20

Q. How do you deal with the “never-ending change” in digital transformation?

Having dual headquarters in Los Angeles, California, and Auckland, New Zealand, a country known for adopting leading-edge technology long before the rest of the world is even aware, we provide proven bleeding-edge technology to our US customers first. As an organization, we pride ourselves on being futurists.

Q. Do you provide tailor-made solutions depending on the clients’ requirements?

Absolutely. Every business is unique, having its own vulnerabilities. We take the time to learn theirs and develop a tailor-made plan to resolve their security issues. Whether it be Enterprise, SMBs, government, financial institutions dealing with payment and compliance, or healthcare dealing HIPAA compliance, our real-time protection an advisory reporting allows us to identify vulnerabilities, detect cyber threats faster, and proactively shield against in-progress attacks more effectively than anyone else in the industry. We facilitate compliance requirements for FlNRA, NIST, GDPR, and CCPA as well.

Q. How do you source talented individuals to maintain the quality for the various services that you offer?

We tap into our global network of experts: engineers, developers, security researchers, and analysts.

Q. How do you gather insights to update your offerings?

As mentioned, we are futurists who are continually looking to the horizon while learning from the past so that we are always at the forefront of cybersecurity. Observing current security trends, staying vigilant on the latest industry pain points, and an outside-the-box approach keeps us ahead of the curve. While many cybersecurity professionals use AI/ML tools for preventing cyberattacks, there is a chance that hackers will also use these innovative technologies for performing more sophisticated attacks. How do you manage to fight fire with fire? It’s a constant game of cat & mouse. Hackers do nothing all day but try to find vulnerabilities. This leaves the cybersecurity community at a disadvantage, so it’s about keeping your finger on the pulse of every aspect of cybersecurity. Paying attention to what the hackers are doing, how they are doing it, and implementing tried & true methods as well as new methods to stop them.

Q. How do you market your services?

We have built champions in major industries such as Healthcare, Finance, Oil & Gas, Water & Power, and IT, to name a few. Word of mouth, case studies, and references are powerful testaments to what we do and how we do it. We focus on industry-specific campaigns to address their specific pain points and challenges.

Q. Do you have any new services ready to be launched?

We recently partnered with Riskrecon, who was recently acquired by MasterCard to improve their cybersecurity capabilities. Not only will RiskRecon confirm your improvement in your Web App & API security posture, but RiskRecon also builds a detailed profile of every asset discovered. This asset profile provides you with an intimate understanding of how the organization has constructed their business-computing architecture. This profile includes:

  • Software
  • IT Infrastructure
  • Geolocation
  • Hosting Providers
  • Fourth Parties
  • Domains
  • Systems
  • Configurations

For each security domain, VIRTIS can now report overall current performance, trends, and industry benchmarks. Each issue is supported with detailed information issue summary and detailed descriptions, related CVEs, hostname, IP address, asset value, issue severity, and risk priority. RiskRecon’s Third-Party Risk Management is unparalleled. Know everything about the companies you keep—get full insight into your third-and fourth-party vendors’ cybersecurity postures. Again, Exposure is no longer necessary when you have fully managed services available to protect your digital network perimeter.

Q. What are your trajectories for the next 5 years?

Currently we are growing at 150% year on year compounding.

Meet the leader behind the success of VIRTIS

Michelle Wilner is the Co-founder and CEO of VIRTIS. She is a serial entrepreneur reshaping the dynamics of Web & API security with globally unique, game-changing solutions and services. Cybersecurity has always been her passion and has found a way to make cyberspace a safer place. She was named Women in IT, Entrepreneur of the Year in 2019. She is also on the California State Assembly Cybersecurity Advisory Council. US Congress has recognized their innovative technology and VIRTIS was recently named Top 10 Web App Solutions Providers for 2020 by Enterprise Security Magazine.

“Our false positive rate is significantly lower sitting at .0002% compared to industry best practice of .2%. In addition, we provide traffic compression whereby decreasing page load times, as well as, regional and global load balancing.”