search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
44


START UP OF THE MONTH Taking security seriously


With 75 years of combined security technology experience, Simon Bain, Damion Hänkejh and Ken Hawkins have launched BOHH Labs to combat data breaches and protect FinTech ventures’ banking infrastructure, brand and bottomline from the imminent threat of attacks. IBS Journal got the lowdown from Simon Bain


Interview by Scott Thompson


yourself. I


BS Journal: Tell us about


Simon Bain: We are a small, world class technology team with an interconnected background in enterprise software, enterprise search, data security, financial services transactions and customer services solutions. Many of us have worked together throughout our careers and felt that there needs to be a change in how today’s security solutions are adopted, and more importantly, how security works as a core function of the infrastructure.


Myself and other members of the leadership team have wanted to team up for a new venture for several years now. We felt the time was right, as we are all questioning where the current security landscape is heading, especially the skyrocketing costs security breaches are having on banking, and felt we could offer a solution which can lead impactful change. With our extensive experience in technology and IP, we have started a journey to bring the world a new and different way of looking and dealing with security issues within IT and banking.


www.ibsintelligence.com © IBS Intelligence 2017


IBS Journal: What’s your business model?


SB: The security market has become very lucrative. We are seeing a host of new companies and solutions entering the market to capitalise on these profits, which has subsequently led to many enterprises trying to outcompete one another for the next game-changing solution.


As such, our initial strategy is to set ourselves apart and prove our technology solution works. We will focus our efforts in 2017 on this and legitimise our value. After we have proven that our solutions work, we will focus on building out the platform while simultaneously demonstrating how the solution works in real-world applications with proof of concepts trials. Going forward, we will begin selling our solution-as-a-service based model on the marketplace.


IBS Journal: What sets you apart?


SB: Our uniqueness comes from how we approach the intensifying cyber security landscape. Current methods are failing, so we have had to come up with a way to focus on protecting the data from within. We call it immunisation. Not only do we stop external thieves accessing


your data, but we come at it from a new view point, which renders an internal theft useless. Just like a vaccine renders a specific bacterium or virus useless without interfering with the body, we render data useless to a thief, without interfering with the users and their requirement for the same data.


Our approach is not reliant on web security or keystores, and we implement an extra security layer between the user and the database which reveals no infrastructure details, such as the location of firewalls, keystore, the database, or other secure assets, to an attacker.


Each incoming and outgoing data packet is uniquely encrypted using a dynamic transient key known only by the user, surviving for a fractional second in memory, with no data stored. This renders partial data useless to any intercepting party and terminates their network connection in real-time.


IBS Journal: Who or what inspired you to set the company up?


SB: We read about new data breaches on an almost daily basis and it’s clear we are in an ever-escalating security drama and most institutions are not winning.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52