Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Zafran: From SOC to CEO: Get the Message Right

Truth in IT
05/05/2025
39
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett Small World Big Data. We are here at RSAC 2025 live talking to some of the latest and greatest cybersecurity vendors, finding out what's innovative, what's new, and what's challenging for you. Welcome to our show. Thank you very much. So is it Anthony or Tony Anthony? You can call me Tony. I got Tony a decent amount. Oh. Anthony's fine. Um, let's talk a little bit. First, I just have to ask about the theme. What's with the theme here about Saffron High? Saffron high school? We just want to make it fun and get people to come take a look. If you take a look at the actual booth, uh, it doesn't say security anywhere, which was kind of a goal because, you know, people stop and ask, say, what is going on here? And the simple answer is, you know, we're just trying to have fun and bring people back to high school. Yeah. It's strangely one of the most intriguing booths I've seen here at the show. So congratulations on that. Um, so let's talk a little bit then about cyber security and specific. Can you give me sort of the high level pitch about what you guys do in this space? Yeah, absolutely. So we're continuous threat exposure management platform. We help other companies mitigate and remediate all your threats and vulnerabilities. The difference is we're going to integrate with your already existing security stack to prove to you that 90% of your critical vulnerabilities are actually not exploitable at all, and will help you mitigate and remediate that remaining 10%. All right. So it's kind of a great way to prioritize what you should be working on by saying, you know, you have this thing came up in a CV, but it's not exposed. It's not going to be a problem. Absolutely. One of the biggest issues in today's world is, you know, people are prioritizing the wrong threats and vulnerabilities and you're wasting time and money. So we're going to show you that originally what you thought might have been, uh, you know, a 9.7 critical vulnerability actually might be more like a 4.4. And you don't have to worry about that one. All right. Just just really at a high level, we don't really have a whole lot of time to go in depth. How does how do you do that? How do you prioritize vulnerabilities. Yeah, exactly. So we're going to we're going to integrate with your already existing security stack and run it through your EDR controls, you know, your cloud controls and stuff like that. And uh, after that entire process, you know, we're going to, um, see if it's internet facing. We're going to see, uh, you know, if it's actually a threat exposed in the wild and through all that, then the vulnerability score potentially will go down and you'll see the the true risk of that vulnerability or threat. And I just want to check, is this something you do operationally on an ongoing basis or something you do like kind of on a quarterly or monthly basis? No. It's ongoing. Absolutely. Yeah. Yeah. So we're agentless we're API based. So realistically we could have the platform up and running within 5 to 10 minutes. All right. That's pretty cool. Looking at RSAC I'm telling this to everybody. There's 25,000 people here. Uh, if you wanted to get a key message out to everyone about what you guys do. What Saffron's all about? What would you tell him? I'd say, you know, the important thing is we're not here to rip and replace your security. Your current security stack. We're here to integrate with it. You know, a lot of people get scared that, you know, we're going to take away everything that you've worked on, but we're going to integrate with whatever you guys have, and then we're going to go from there. So realistically, um, you know, that's kind of the goal. Yeah. And I think that that prioritization is really critical when you don't have a lot of staff, you don't have a lot of time and you want to be responsive, right? You got to get to that, get that point. All right. Um, if someone wants to learn a little bit more about saffron and saffron. Hi. No. Doesn't have to be the high school part. Uh, obviously, you probably have a website, but is there something when you're talking to the security crowd that you point them at to start? Yeah. So we have a data sheet that gives a good visual of, you know, everything I've already previously mentioned. And then that kind of resonates with people the most. Okay. Yeah. All right. Uh, anything online? Absolutely. I mean, yeah, go to go to saffron io. You know, you'll be able to figure out, you know, everything about us. Um, you can easily book a demo through our website as well, which would, you know, is extremely helpful, but. Yeah. Saffron. All right. Thank you so much, Anthony. All right. Take care.
Zafran turns cybersecurity strategy into human-friendly narratives—making it easier for CISOs to communicate risk, value, and roadmap priorities to stakeholders. They’re not a tech vendor; they’re a messaging layer for security leadership. Because no one cares how your firewall works if they don’t understand why it matters.
Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • zafran
  • security
  • leadership
  • ciso
  • communication
  • cyber
  • strategy
  • executive
  • messaging
  • security
  • storytelling
  • cyber
  • risk
  • reporting
  • board-level
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Zafran: From SOC to CEO: Get the Message Right

            Upcoming Spotlight Events

            • Sep
              11

              Cyera: An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              • Sep
                16

                KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                09/16/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Sep
                  25

                  360View: Email Security & Social Engineering Defense

                  09/25/202512:00 PM ET
                  • Oct
                    23

                    360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                    10/23/202512:00 PM ET
                    • Nov
                      20

                      360View: Budget Optimization: Doing More with Less

                      11/20/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Sep
                        16

                        SOC 2 for Startups: Strategies to Reduce Costs, Enhance Efficiency, and Achieve Compliance

                        09/16/202512:00 PM ET
                        • Sep
                          16

                          HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence

                          09/16/202501:00 PM ET
                          • Sep
                            18

                            Trend Micro Webinar: Risk in Real Time: Agentic SIEM

                            09/18/202511:00 AM ET
                            More events

                            Recent Industry Events

                            • Aug
                              26

                              Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats (Abnormal Security Webinar)

                              08/26/202501:00 PM ET
                              • Aug
                                25

                                Cyera: Harnessing AI to Transform the Landscape of Data Security

                                08/25/202510:55 AM ET
                                • Aug
                                  19

                                  Secureframe: CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                                  08/19/202512:00 PM ET
                                  More events

                                  Upcoming Events Calendar

                                  • 09/11/2025
                                    01:00 PM
                                    09/11/2025
                                    Cyera: An Executive’s Guide to Secure AI Adoption
                                    https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                  • 09/16/2025
                                    12:00 PM
                                    09/16/2025
                                    SOC 2 for Startups: Strategies to Reduce Costs, Enhance Efficiency, and Achieve Compliance
                                    https://www.truthinit.com/index.php/channel/1410/soc-2-for-startups-strategies-to-reduce-costs-enhance-efficiency-and-achieve-compliance/
                                  • 09/16/2025
                                    01:00 PM
                                    09/16/2025
                                    KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                    https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                  • 09/16/2025
                                    01:00 PM
                                    09/16/2025
                                    HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence
                                    https://www.truthinit.com/index.php/channel/1411/ciso-to-ciso-a-human-conversation-about-artificial-intelligence/
                                  • 09/18/2025
                                    11:00 AM
                                    09/18/2025
                                    Trend Micro Webinar: Risk in Real Time: Agentic SIEM
                                    https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
                                  • 09/25/2025
                                    12:00 PM
                                    09/25/2025
                                    360View: Email Security & Social Engineering Defense
                                    https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                  • 10/23/2025
                                    12:00 PM
                                    10/23/2025
                                    360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                    https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                  • 11/20/2025
                                    12:00 PM
                                    11/20/2025
                                    360View: Budget Optimization: Doing More with Less
                                    https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                  • 12/18/2025
                                    12:00 PM
                                    12/18/2025
                                    360View: 2026 IT Predictions & Emerging Trends
                                    https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                  Truth in IT
                                  • Sponsor
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Preference Management
                                  Desktop version
                                  Standard version