Jean-Michel Henrard, Dust Mobile: Our solution is efficient and simple to deploy, and has no impact on uses, users and governance

Jean-Michel Henrard, Dust Mobile: Our solution is efficient and simple to deploy, and has no impact on uses, users and governance

For its new participation in the FIC, Dust-Mobile a Cyberdefense operator, will announce on the one hand its new generation of SIM card called Dsim. On the other hand, it will formalize its partnership with Pradeo which, through the combination of their two offers, will make it possible to offer a sovereign high-security solution for smartphones in sensitive sectors. For Jean-Michel Henrard, Founder and CEO of Dust Mobile, his solution is efficient and easy to deploy, and does not impact usage, users or the governance put in place by CIOs.


168

Global Security Mag: What will be your news at the International Cybersecurity Forum 2022?

Jean-Michel Henrard: Our news at the 2022 International Cybersecurity Forum will be marked by two announcements.

The first is the launch of our new generation of SIM card called Dsim. Dust-Mobile, the leading Cyberdefense operator, is launching its new offer aimed at professionals and French, European and international government entities. Embedded in a hardened and controlled SIM card, offering its own mobile plans, Dust-Mobile provides a solution for protecting critical mobile communications (calls, SMS and data).

This new offer strengthens the existing native solution on:

• the resilience of 2G / 3G / 4G Lte, 5G nsa connectivity,

• the protection and detection of intrinsic attacks on mobile networks, its core network and its SIM cards,

• managing a fleet of SIMs,

• the reporting of alerts in real time,

• automatic deployment of countermeasures

The second highlight for us during the FIC will be the announcement of our partnership with Pradeo. We combine our solutions into a sovereign high security offer for smartphones in sensitive sectors

The two French companies, which have specialized since their inception in complementary fields of mobile security, now combine their cutting-edge technologies to enable security teams in critical sectors to effectively combat espionage and cyberattacks exploiting mobile terminals and transmissions.

Global Security Mag: What are the strong points of the solutions that you are going to present on this occasion?

Jean-Michel Henrard: The Dust Mobile solution contributes to the response to the following operational objectives:

๏ Transmissions: provide carrier-grade 2G / 3G / 4G Lte / 5G NSA global cellular connectivity

๏ Security: protect critical signaling and sensitive transmissions from cyber threats intrinsic to mobile networks (Data, Voice and SMS) and SIMs.

๏ Resilience: adapting to the available cellular environment (multi-network) and increasing the ability to exploit it to improve operational performance. (Connectivity in 214 countries and territories with 810 partner cellular networks).

๏ Stealth: ensure confidentiality of use, traceability and user identity.

๏ Control and supervision: supervise the quality of services and the integrity of the security of transmissions, control and command the SIMs remotely. Our Selfcare (C2) platform provides real-time visibility into communications security, cellular environment, network signaling and threats. It also supports the deployment and management of the SIM fleet as well as associated mobile services.

๏ Transparency and accessibility: guarantee the transparency of the solution vis-à-vis any application and equipment, offer improved operational capacity, manage scalability, deploy usage governance, ensure a high level of availability and offer an appropriate business model.

๏ Agnostic: The solution compatible with any connected equipment compliant with GSMA/3GPP standards (Smartphone, Laptop, router, IoT, IIoT, M2M, failover gateways, sensor, tracker)

Global Security Mag: Since the beginning of the year, have you noticed the rise of new cyber threats?

Jean-Michel Henrard: Cyber-threats linked to mobile usage have been observed for several years. The news shows it almost every day. They are more and more visible because they are detected due to the appearance of dedicated and innovative technical solutions such as those proposed by Dust for the cellular transmissions segment.

Geopolitical situations, issues of competitiveness and sovereignty, mobility, telework are all factors that favor the emergence of attacks that must encourage everyone to think about protecting themselves against these threats. We see a broadening of targets. No one today is safe when they partially or globally hold critical information.

Our monitoring and our daily exchanges with our partners, our customers and the various interlocutors working on these subjects show an increase in these threats and an acceleration in the use of these attack surfaces.

They are constantly and rapidly evolving, with increased performance in interceptions, denials of service, geolocation, identity theft, to name a few examples.

Global Security Mag: How should technologies evolve to counter these threats?

Jean-Michel Henrard: Solutions must be designed from the outset to include the target safety level in their DNA.

They must also consider the security ecosystem they serve. Indeed, a single solution cannot be a global response to all threats and maintenance in operational condition. It is thus necessary to interact with other solutions, other specialists. It is this entire value chain that brings resilience

They must also take into account the human factor and thus adapt to changes in user expectations, as we have seen for international mobility or the generalization of telework.

We favor solutions Dust which are transparent for users, which correspond to their concepts of use and to the operational field concerned, which are compatible with the equipment and applications they choose.

Global Security Mag: In your opinion, what place can humans have to reinforce the defense strategy to be deployed?

Jean-Michel Henrard: People are THE major factor that must be taken into account when designing a safety system.

The user will reject or circumvent any cyber defense solution that is too complex, too restrictive or whose interest is not perceived. To counter this, we are convinced that we must be able to offer reliable solutions that will not upset the habits and uses of employees.

It is also necessary to make users aware of the risks, to alert them to current threats if necessary, to train them and to make the solutions as “transparent” as possible. Safety is everyone’s business.

Global Security Mag: There has been a shortage of talent for years, what actions can cybersecurity players put in place to attract new talent?

Jean-Michel Henrard: It is important to make the cyberdefense environment attractive and accessible, to provide quality training, whether for the pool of young talent, people in retraining or to improve the skills of talents who make up the cybersecurity companies themselves. It is also necessary to offer prospects for development either in the technological scope addressed by an employee, or in a management role if he so wishes.

Closer partnerships need to be established between companies and schools that offer cybersecurity training, especially at the apprenticeship level. We have excellent feedback on the recruitment of competent and motivated trainees, trained in the company before becoming remarkable actors in our teams.

The sector must also succeed in attracting more women by acting at school level and attracting more applications. The responsibility of the companies and players concerned is to convince that all talents and skills have a place in the construction of a sovereign cyber offer.

Global Security Mag: What message would you like to convey to CISOs?

Jean-Michel Henrard: All companies actively protect their “classic” IT infrastructure and services, while mobile communication tools such as smartphones, tablets, routers and other connected equipment such as IoT, iIoT or M2M are often the great forgotten while the threats are real, recurring, growing strongly, with increasingly significant and even dramatic business impacts and consequences.

According to recent studies, 40% of corporate cyber attacks today go through an object connected to mobile networks. Anticipation and protection against these attack vectors attacking information systems has become necessary, as was the case in the past for Lan and Wan networks.

Dust-Mobile now offers an effective and easy-to-deploy solution that does not impact usage, users or the governance put in place by CIOs.

- Contact: Virginie Chapuis at contact@dustmobile.com


172

We would like to give thanks to the writer of this short article for this remarkable content

Jean-Michel Henrard, Dust Mobile: Our solution is efficient and simple to deploy, and has no impact on uses, users and governance


Find here our social media profiles , as well as other pages that are related to them.https://yaroos.com/related-pages/