Governance & Risk Management

Specialized Threat Analysis and Protection: The New Model

Comodo's John Peterson on How This Approach Improves Security

The complexity of cybersecurity creates new headaches for organizations, says John Peterson of Comodo. The cure? Specialized Threat Analysis and Protection. Peterson discusses how to implement this new model with Comodo's recently launched Comodo 360 solution, which encompasses endpoint, boundary and internal network security solutions.

See Also: SOC: Build vs. Buy - When Is It Right?

In a video interview at RSA Conference 2016, Peterson discusses:

  • The complexity of modern cybersecurity;
  • The STAP model and how Comodo is delivering an integrated approach to security;
  • The new Comodo 360 security and IT management solution.

As vice president of product marketing, Peterson is responsible for shaping the enterprise product roadmap for Comodo, along with the execution of the company's product marketing strategy. He works across the leadership, engineering, sales and marketing teams within Comodo to integrate the product strategy and ensure the success of all enterprise product lines. Before joining Comodo in November of 2015, Peterson led sales engineering efforts at Zscaler, managing a team focused on Internet security delivered through the cloud. Over his 25 year career in B2B and cybersecurity engineering, he has held engineering and leadership positions at Barracuda Networks, Juniper Networks, Websense, Montego Networks, Cisco Systems, 3Com and Fortinet.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.