Description and Background
Mandiant Cyber Security Company is a data safekeeping company that renders risk detection and response solutions to Fortune 500 companies, financial organizations, authorities, inland and overseas police departments, and distinguished law companies. Kelvin Mandia, the company’s Chief Executive Officer, founded the company as Red Cliff Consulting in 2004; it was later rebranded as Mandiant Corporation in 2006.
Mandiant obtained financial support from Kleiner Perkins Caufield and Byers to enlarge its staff capacity and grow its operations, and currently has 333 permanent personnel (Fleddermann, 2013). The business rendered safety incident administration products and services to major financial organizations and aided some Fortune 500 companies with income of over 200 million dollars in 2012.
The company is based in Alexandria, Virginia with additional offices in New York and Washington, DC just to mention a few. Mandiant advisors and engineers held top government safety authorizations and official recognitions and advanced degrees from some of the most esteemed computer science institutions.
Mandiant is the leading company in sophisticated risk detection and reaction solutions and was awarded both the 2012 and 2013 SC Magazine honor for excellent professional administration in information technology safety. The company demonstrated its relentless efforts in fighting cyber crime when it released a report implicating China with cyber attacks of over 140 institutions in Europe and America.
Innovation style of the company
Innovation is the use of technical, industrial, economic, and business activities to make, execute, and market products and services. Mandiant uses chain-linked innovation framework, which signifies the technological actions taking place in the innovation development and the exterior market pressures (Harms, 2006). This innovation style is composed of five main tracks of the innovation procedure.
The five tracks include the fundamental series of innovation, which begins with the discovery of a blueprint. The other four tracks are analyzing the market signs and customer needs, perfecting the company’s blueprint, redesigning and producing the blueprint, and finally distributing the innovation results and seeking for opinion.
Mandiant has manifested the aptitude to perform the various types of innovative and all-inclusive IT security appraisals required to fight the increasing complications of cyber attacks. Mandiant joins the dots linking a company’s system safety resolutions and the company’s ends. The company does this through its innovative style known as “Mandiant and Machine”, which makes them assist companies when their networks and systems are attacked.
Various innovation theories that connect to the company’s product or service growth and development
The company uses various innovation theories such as the institutional theory, evolutionary theory and the diffusion theory to enhance and develop their products and services. Institutional theory guarantees that the gains obtained from discovery of the new company products such as the Mandiant intelligence are safeguarded to provide additional benefits that lead to future innovation.
However, because product rights’ costs are encouraging in America, the rights are not absolutely defined and enforced consequently influencing the appropriability of proceeds. The evolutionary theory used by the company evaluates the securities and networks of different companies. This theory takes into consideration the innovation scheme of the entire company’s products and examines the available market gap; this requires the innovation of a new product.
For instance, the company noticed that many organizations systems were breached, and the IT department failed to detect the breach immediately; therefore, they came up with product- Mandiant for Security Operations, which assisted companies to make fast and perfect decisions about supposed compromised systems, and corrected them before hackers attacked.
Mandiant also uses incidence reply programs, which conducts a complete appraisal of the available event response potentials, processes, and tools to provide cost efficient suggestions on how to advance the security position (Hejazi, Talhi, & Debbabi, 2009).
Company’s product and service growth and development
The company has developed various products that assist their team of experts to identify high priority risks in order to stop them. The Mandiant intelligence, a solution for security organizations reacts, discovers, and controls aimed attacks that get through their protective securities.
Mandiant intelligence can be applied directly and can be incorporated to the Mandiant Platform and next generation network safety solutions to recognize threats that are present in the network in order to stop advanced attacks immediately they start to spread out. Mandiant for security operations are innovations that certainly identify, scrutinize, and resolve suspected security incidents in a very short time using exceptional approaches (Howard, LeBlanc, & Viega, 2005).
This software established solution constantly examines terminals of breach based on alarms created in system safety solutions, and logs administration functions. The solution allows front-line safety consultants to make good and quick decisions about suspected safety events, and make sure efforts are directed on the most significant issues. The lightweight manager deployed on the endpoints enables their users to find out what is happening without the help of forensics.
The Mandiant intelligence centre provides customers with efficient tools, and appropriate analysis about the strategies, objectives, and behavioral patterns of advanced threat groups. This innovation product draws on proprietary intelligence collected from the company’s many hours on the front lines to furnish safety teams with the background required to react to and guard against the most advanced risk thespians efficiently.
The product provides a comprehensive outline of high priority threat groups incorporating their most recent tactics, proficiencies, and dealings, in addition to the analysis of trends in targeted industries, and features of the information each group chases. Many institutions have used this product to reduce the occurrence and range of security incidents.
The company also provides risk and exposure evaluation services to their customers by applying their expert knowledge on scrutinizing their clients’ computer systems and networks against any intrusion (Pilbeam & Nagle, 2009).
Recommendations to improve the company’s innovation styles
The various innovation theories used by Mandiant have proved to be effective since they have made the company make significant landmarks in the information Technology industry. The company has hit major media houses headlines especially when it implicated China with espionage attacks to the US and other European countries with the famous APT1 report (Sanger, Barboza, & Perlroth, 2013).
However, the company needs to improve its innovation theories further in order to accommodate the current market needs. The company’s theories are more focused on technological competition rather than technological development, thereby creating higher levels of uncertainty. This is evidenced by the release of the detailed Chinese cyber attacks, which left many other cyber security companies complaining that the company was exposing sensitive information to hackers while pursuing fame.
Mandiant innovation theories only cover groups of companies that have business models that need to be shielded from intrusion (Singleton, 2013). The company’s innovation theories and products need to accommodate other companies that do not view cyber crime as a major risk on their systems.
References
Fleddermann, E. (2013). Cybersecurity in the Media Industry: The Growing Threat of Cybercrime and the Strategic Options to Defend Against it. New York: Nerd Press.
Harms, K. (2006). Forensic analysis of system restore points in microsoft windows XP. Digital investigation, 3(3), 151-158.
Hejazi, S. M., Talhi, C., & Debbabi, M. (2009). Extraction of forensically sensitive information from windows physical memory. Digital investigation, 6, 121-131.
Howard, M., LeBlanc, D., & Viega, J. (2005). 19 deadly sins of software security. California: McGraw-Hill/Osborne.
Pilbeam, K., & Nagle, F. (2009). High-tech IPOs in the USA, UK and Europe after the dot-com bubble. International Journal of Financial Services Management, 4(1), 64-75.
Sanger, D. E., Barboza, D., & Perlroth, N. (2013). Chinese Army Unit Is Seen as Tied to Hacking Against US. The New York Times, 1(1), 5-6.
Singleton, T. (2013). Fighting the Cybercrime Plague. Journal of Corporate Accounting & Finance, 24(5), 3-7.