Ridgeback Network Defense Team
Raj Kulkarni - Ridgeback Network Defense

Raj Kulkarni

Co-CEO

Scott Fogarty - Ridgeback Network Defense

Scott Fogarty

Co-CEO

Thomas Phillips - Ridgeback Network Defense

Thomas Phillips

CTO
Founder

Steve Rixse - Ridgeback Network Defense

Steve Rixse

VP – Sales
Co-founder

Suren Kulkarni - Ridgeback Network Defense

Suren Kulkarni

VP – Sales
APAC & MEA

Ridgeback Network Defense Team
Raj Kulkarni - Ridgeback Network Defense

Raj Kulkarni

Co-CEO

Scott Fogarty - Ridgeback Network Defense

Scott Fogarty

Co-CEO

Thomas Phillips - Ridgeback Network Defense

Thomas Phillips

CTO
Founder

Steve Rixse - Ridgeback Network Defense

Steve Rixse

VP – Sales
Co-founder

Suren Kulkarni - Ridgeback Network Defense

Suren Kulkarni

VP – Sales
APAC & MEA

Ridgeback - Our Story

This is how it started . . .

Deception Technology Enables Corporations to fight fire with fire
There are two parallel threads. The first thread was learning how analysis breaks down. Scientists use analysis all the time to explain natural phenomena. This works out great because the laws of physics don’t change. (Not that we know of, at least.) Analysis techniques like signal detection and hypothesis testing worked so well in the physical sciences, people started applying them to other fields. Fields like natural language processing, hedge fund trading, and eventually cybersecurity. The problem was that the analysis techniques always depended on an underlying model . . . and the models changed. Fields of study that involve humans always seemed to have models that changed on a regular basis. People are unpredictable — go figure! So when we wonder why our security methods don’t work, it’s because our adversaries work very hard to break our models of security.

Ridgeback - Our Story
Ridgeback - Our Story

This is how it started . . .

Deception Technology Enables Corporations to fight fire with fire
There are two parallel threads. The first thread was learning how analysis breaks down. Scientists use analysis all the time to explain natural phenomena. This works out great because the laws of physics don’t change. (Not that we know of, at least.) Analysis techniques like signal detection and hypothesis testing worked so well in the physical sciences, people started applying them to other fields. Fields like natural language processing, hedge fund trading, and eventually cybersecurity. The problem was that the analysis techniques always depended on an underlying model . . . and the models changed. Fields of study that involve humans always seemed to have models that changed on a regular basis. People are unpredictable — go figure! So when we wonder why our security methods don’t work, it’s because our adversaries work very hard to break our models of security.

The second thread was military operations. I have a military background and learned fairly quickly that plans, while a good exercise for preparation, do not hold up under contact with the enemy. Funny thing — the enemy wants your plans to fail. Better yet, the enemy is constantly trying to trick you. Simple analysis, while a good tool, never is enough when facing a determined adversary.

Mixing these two threads together gives us deception technologies.

That is, we can deploy information technology tools that actively deceive attackers. Things like this have been around for a while and have been used by experts in the field of cybersecurity. The problem is that these kinds of solutions are a lot of work to set up, maintain, and the solutions are usually very fragile.

I wanted a platform that would let me easily and quickly (in 5 minutes or less) deploy a massive armada of deception tools. And, I did not want to have to configure or maintain this stuff. I wanted to overwhelm any adversary with the push of a button. Ridgeback was the answer to my problem.

Ridgeback takes the idea of deception one step further, allowing me to deploy any sort of interactive defense at incredibly large scale. I can now completely overwhelm even the most sophisticated adversary by simply typing “start-ridgeback.” Better still, I can even run it on my laptop.

– Thomas Phillips, CTO, Ridgeback Network Defense.

Ridgeback - Our Story
Ridgeback - Our Philosophy

Reduce the hostile chiefs by inflicting damage on them; and make trouble for them, and keep them constantly engaged; hold out specious allurements, and make them rush to any given point.

— Sun Tzu, The Art of War

Sun Tzu was a Chinese general, military strategist, and philosopher who lived over 2,000 years ago. He wrote a famous book called “The Art of War”, in which he described strategies to be employed to achieve victory in war.His strategies not only still apply to war today, but they also apply to cyber conflict. Sun Tzu argued that to win a war one should endeavor to cause the enemy to unnecessarily exhaust their resources. He also cautioned that certain mistakes would lead to defeat.

Ridgeback - Our Philosophy
Reduce the hostile chiefs by inflicting damage on them; and make trouble for them, and keep them constantly engaged; hold out specious allurements, and make them rush to any given point.

— Sun Tzu, The Art of War

Sun Tzu was a Chinese general, military strategist, and philosopher who lived over 2,000 years ago. He wrote a famous book called “The Art of War”, in which he described strategies to be employed to achieve victory in war.His strategies not only still apply to war today, but they also apply to cyber conflict. Sun Tzu argued that to win a war one should endeavor to cause the enemy to unnecessarily exhaust their resources. He also cautioned that certain mistakes would lead to defeat.

One of the “dangerous faults” that Sun Tzu warned against was “over-solicitude” for one’s resources, which exposes one to “worry and trouble.” Unfortunately, this fault is the security strategy most commonly employed by organizations. Security tools and professionals spend an inordinate amount of resources trying to monitor and evaluate the security status of every last IT resource, while doing nothing to influence adversary behavior. The end result is an ever-escalating cost of defense.

Ridgeback Network Defense advocates taking the fight to the enemy and causing the adversary to needlessly exhaust resources. This aggressive strategy results in the cost of attack outweighing the benefits of attack.
With Ridgeback, take the fight to the enemy!

Protect Your Network. Win the Cyber War.

Download RIdgeback

Download RIdgeback

Download RIdgeback White Paper

Download RIdgeback White Paper

Talk to a cyber security expert

Talk to a cyber security expert