Security Operations Centers Archives - AiThority https://aithority.com/tag/security-operations-centers/ Artificial Intelligence | News | Insights | AiThority Tue, 23 Jul 2024 06:51:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://aithority.com/wp-content/uploads/2023/09/cropped-0-2951_aithority-logo-hd-png-download-removebg-preview-32x32.png Security Operations Centers Archives - AiThority https://aithority.com/tag/security-operations-centers/ 32 32 AiThority Interview with Steve Womer, SVP of Engineering at Interface Systems https://aithority.com/technology/aithority-interview-with-steve-womer-svp-of-engineering-at-interface-systems/ Tue, 23 Jul 2024 06:51:20 +0000 https://aithority.com/?p=574084 AiThority Interview with Steve Womer, SVP of Engineering at Interface Systems

The post AiThority Interview with Steve Womer, SVP of Engineering at Interface Systems appeared first on AiThority.

]]>
AiThority Interview with Steve Womer, SVP of Engineering at Interface Systems

Steve Womer, SVP of Engineering at Interface Systems, highlights the transformative impact of cloud-based technologies and the evolving role of AI in the Q&A:

_______

 

Hi Steve, given your extensive background in engineering and operational roles, please share your journey so far.

My career in technology started with an internship at a company called Educate Online, providing technical support to at-home learners using their home computers and BYO dial-up Internet. That opportunity translated to a full-time role, and it was an extremely formative time. I had some great mentors and learned about technology, customer service, problem-solving, persuasion, leadership, and having fun at work. The company experienced explosive growth through pursuing a new publicly funded vertical and I learned the importance of striking the balance between short-term scrappy solutions and fixing problems in a long-term, sustainable way. I had an opportunity to join a startup environment in a network sales engineering role, and I jumped at the opportunity to learn something new with a company called Industry Retail Group. I had a great mentor show me the ropes of sales engineering and had many late-night “sink or swim” moments trying to figure out command line syntax on ScreenOS, JunOS, etc. At the time, we were designing and deploying network infrastructure for many retail brands. Walking through a mall was always a proud moment in that era, as I pointed out to any willing listener all the customers I helped sell, deploy, and support. Over my 7-year stay, we grew from $10M in ARR to $50M in ARR, so it was yet another fantastic opportunity to learn how to scale up an operation to withstand growth. I then joined a startup to build out their sales engineering and SD-WAN strategy. Their approach was really different in that they were truly agnostic on what hardware platform they supported, so it sent me on a mission to learn a lot about a wide variety of platforms. It was a fun ride, and after a brief stint in entrepreneurship (bad timing… 2020), I joined Interface with a focus on building out the sales engineering practice. It has been a fun pivot as it created the opportunity to learn more about video, alarm, and virtual guard technologies. It really resonates with my love of people as we truly have a positive impact on people’s lives. Seeing the current state of AI and video analytics is a really fun time to be in the industry as there is a litany of use cases for the technology both from a life safety and an operational perspective.

Also Read: Unlocking the Business Benefits of AI-Powered Gamification

Managing network infrastructure across multiple locations presents unique challenges. How do Interface Systems address these challenges, particularly in maintaining high uptime and security?

Interface addresses uptime and security through the way we design and implement solutions for our customers. We address this at both an operational and physical layer.

At the physical layer, consistency is key. Whether installing in a greenfield location or taking over the network at an existing location, we install a cabinet and standardize all of the LAN drops to a template configuration on the switch. Standardizing cable placement, device placement, and color coding cables ensures our support team can follow the same steps when troubleshooting a problem at a site because the physical environment is based on a standard specification for the customer. The cabinet is also locked, so only people with access can unplug devices or move cables.

At the logical layer, we configure systems with redundant connections (typically one wireline and one cellular so a downed line or cable cut doesn’t sever connectivity). We also deploy IP power devices so we can automatically and/or remotely power cycle equipment when there is a communication failure. We see a large percentage of issues can be resolved without any contact with on-site personnel, accelerating service restoration and letting store managers focus on running their operations.

Interface is a PCI compliant service provider, and we design all of our customer environments with PCI in mind. It is an extra lift on the front end but building out a zero-trust cardholder data VLAN is worth the extra effort. Our team provides all the resources necessary to coordinate with our customers to ensure we have sources, designations, and protocols allowed on a “need to flow” basis vs. enabling web filtering and assuming all outbound traffic is valid.

Interface Systems leverages AI and cloud-based technologies extensively. How have these technologies transformed the services you provide to your clients, especially in security and business intelligence?

Cloud-based technologies have been transformative, and while AI hasn’t been what I’d call revolutionary yet, it will be. Let me start with cloud-based technologies. Cloud technologies aren’t transformative in their underpinnings, just in the distribution model. Things like VMS have existed for quite some time, but there are drawbacks to the customer / service provider hosted model. There is infrastructure, upkeep, and maintenance of the platform, then there is connectivity to the centralized controller to contend with. In addition, these systems become proprietary in how they’re configured, and companies can find themselves single-threaded in supporting the infrastructure, creating risk in effectively supporting the environment for the long haul. Since video recorders may not exist in the existing VPN zone, getting buy-in from IT to allow the video control plane across the VPN can be challenging. Placing that infrastructure in the cloud on a secure multi-tenant platform eliminates the need to build and maintain the technology and the required overhead. We’ve implemented cloud-managed intrusion, access control, video, networking, and VoIP solutions, and the benefits to our customers include accelerated deployment, improved configuration management, and flexible consumption models.

I would say we’re just scratching the surface on AI in terms of its application in our industry. We’ve recently launched two products that include elements of AI, and there is a lot of buzz around them. The first employs person and vehicle detection cameras that are able to differentiate a human or vehicle from other objects like animals or refuse blowing through the field of view. Not long ago, motion sensing and human video analysis was the only way to validate those things. The use of AI achieves the promised benefits; accelerated decision-making (real-time in this case), reduced human effort (reduced cost of delivery), and refocusing of human efforts to things that can’t (yet) be accomplished by AI. The second is a video analytics platform that incorporates AI into the training and ongoing service. The solution is able to identify and alert when triggers are met (customer wait time exceeded X seconds, for example) and displays the data in dashboard views so customers can understand trends in both employee and customer behavior. As the solutions continue to evolve, we’ll be able to use AI to interact with customers and employees based on conditional triggers. Ultimately, things like deep learning and generative AI will be incorporated into solutions where instead of looking at dashboards and exporting data for analysis in tools like PowerBI, customers will be able to ask systems for outcomes, and AI will curate the dataset based on what information is needed to demonstrate the outcome.

Also Read: AI For One and All

You are passionate about simplifying complex systems for clients. Can you share a specific incident of how your approach has significantly improved a client’s operational efficiency or ROI?

One of the recent success stories was aligning with a growing Car Wash for their technology and security strategy. We built a standard model for network, video, and alarm and became part of their new construction strategy. We’re closely integrated with their construction team and have helped ensure they’re able to open on time. Since this is a turn-key solution, it allows them to focus on their core competency vs. managing multiple vendors integrating different systems. It avoids costly delays in opening new sites.

Your integrated approach uses virtual security guards and interactive security operations centers. How has this model enhanced Interface Systems’ management of security and compliance?

Virtual guard takes video-verified alarms to the next level and allows two-way communication. Alarms are reactive by nature as they’re responding to an exception. Virtual guard allows users at a location to contact our security operations center on demand based on an event occurring and an anticipated event.

Looking ahead, what are the major trends you foresee in the managed services industry?

As with any industry, there is constant cost pressure. We’re close to hitting the floor in some industries as there is a minimum human effort and therefore cost to maintain systems and provide services. Outsourcing offshore has helped continue to push the cost model down, the next level is outsourcing to AI. There are a few areas where I see this coming into focus. It would be great to see a more outcome-driven approach to configuration at some point, it is just a matter of cost/benefit to the hardware and software manufacturers. Right now, there is little incentive for manufacturers to reduce the level of configuration effort until one starts doing it and becomes more highly favored. The dashboards and control planes have become easy to manage, the next logical step is to connect narrative-based needs to functional system configuration(s). Imagine needing to add or remove a user, and instead of logging in to an interface and executing the change, you can tell a digital assistant what you want to do, incorporate some type of biometric authentication (voice, face, etc.), and the change is complete. That is where AI starts to deliver on the promise of removing remedial tasks from our day to day.

On the human interaction side, things get a little more complex. When dealing with operational compliance, I foresee video analytics being combined with AI assistants where operational procedures can be audited and corrective suggestions can be offered in real-time. For example, a user mops the floor and forgets a wet floor sign. A voice message, text alert, Teams alert, or other type of notification reports the exception and reminds the personnel to place the appropriate signage. Life safety is where things get a little more tricky. Judgment calls relative to human safety cannot be entrusted to AI yet. While I’m confident we’ll get there, I wouldn’t want an AI system dealing with a hostage situation.

Also Read: AI in Content Creation: Top 25 AI Tools

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Steve Womer has experience designing and deploying the network, physical security, and business intelligence infrastructure for distributed enterprise clients since 2008 and has served in various engineering, sales engineering, and operational roles for industry-leading managed services providers. Steve is passionate about simplifying the complex and exceeding customer expectations.

Interface Systems is a leading managed service provider of business security, actionable insights, and purpose-built networks for multi-location businesses. We enhance security, streamline connectivity, optimize operations, and reduce IT costs, maximizing ROI for the nation’s top brands.

The post AiThority Interview with Steve Womer, SVP of Engineering at Interface Systems appeared first on AiThority.

]]>
Devo Launches New Security Research Team to Accelerate Innovation and Protection for Organizations https://aithority.com/it-and-devops/cloud/devo-launches-new-security-research-team-to-accelerate-innovation-and-protection-for-organizations/ Fri, 03 Jun 2022 15:53:46 +0000 https://aithority.com/?p=415561 Devo Launches New Security Research Team to Accelerate Innovation and Protection for Organizations

Devo Technology, the cloud-native logging and security analytics company, announced a newly established team of security researchers and data scientists to form Devo SciSec. With Chief Technical Officer Gunter Ollmann at the helm, SciSec will bring together threat research, advanced data science, and machine learning expertise to enable organizations to preemptively detect and mitigate entire […]

The post Devo Launches New Security Research Team to Accelerate Innovation and Protection for Organizations appeared first on AiThority.

]]>
Devo Launches New Security Research Team to Accelerate Innovation and Protection for Organizations

Devo Technology, the cloud-native logging and security analytics company, announced a newly established team of security researchers and data scientists to form Devo SciSec. With Chief Technical Officer Gunter Ollmann at the helm, SciSec will bring together threat research, advanced data science, and machine learning expertise to enable organizations to preemptively detect and mitigate entire classes of threats.

As a result of inadequate repeatable threat management methodologies and the continually changing and expanding threat landscape, security teams struggle to stay ahead of threat actors. Compounding this, security operations centers (SOCs) can’t find and retain the talent they need to effectively adapt their security defenses. The SciSec team is set out to assist Devo customers by revolutionizing threat research and providing them with actionable intelligence and security content. Devo SciSec arms customers with expert-built detections, investigation tactics, and security analytics ​to complement analysts’ skill sets and greatly improve SOC efficacy.

Recommended AI News: Digiphy Announces $1.5 Million in New Funding to Help Brands Go Beyond the Label

“Security has historically been treated as an art and not a science, which has made approaches to threat protection very reactionary and more like firefighting, rather than a proactive activity. This instantly puts organizations at a disadvantage,” said Gunter Ollmann, CTO at Devo. “Devo SciSec hopes to change how we fundamentally approach threat research by providing collective intelligence built by data scientists that forecasts a global view of threats and adversaries, paired with optimal response strategies.”

The addition of SciSec lends itself to the autonomous SOC, a concept introduced by the company last month when announcing the acquisition of AI-powered threat hunting company Kognos. The autonomous SOC establishes complete visibility, automation, analytics, and open access to community expertise and content to enable the SOC to eliminate the repetitive manual tasks that lead to analyst burnout and SOC inefficiency. SciSec plays a key part in arming Devo with the insights that help security teams work smarter.

Recommended AI News: UnifyTwin Launches Intelligent Industrial App Suite Addressing Industry 5.0 Transformation With Proven Business Outcomes

Since its formation, SciSec has used their innovative approaches to deliver several value-adding capabilities for Devo customers.

  • MITRE ATT&CK Adviser: this new application developed by SciSec enables customers to operationalize the MITRE ATT&CK matrix to identify detection and data sources coverage gaps.
  • Continuous content delivery: Customers have access to an ever expanding set of hundreds of use-case, technology specific, and emerging threat detections.
  • Adversary Simulation: SciSec created AdSim, an open-source project, which crafts attack scenarios to run simulations and test cybersecurity defenses, AdSim is used to validate and ensure efficacy of new detection content.

The launch of SciSec coincides with Devo’s announcement of $100 million in Series F funding at a valuation of $2 billion, led by Eurazeo.

Recommended AI News: Wovenware Develops Open-Source Plugin to Adyen Payments Gateway; Extends Reach of Kill Bill’s Payments and B****** Platform

[To share your insights with us, please write to sghosh@martechseries.com]

The post Devo Launches New Security Research Team to Accelerate Innovation and Protection for Organizations appeared first on AiThority.

]]>
Arcanna.ai and MNEMO Partner to Drive Security Operations Efficiency for End Users https://aithority.com/security/arcanna-ai-and-mnemo-partner-to-drive-security-operations-efficiency-for-end-users/ Wed, 25 May 2022 16:27:36 +0000 https://aithority.com/?p=413480 Arcanna.ai and MNEMO Partner to Drive Security Operations Efficiency for End Users

Arcanna.ai, an AI-Assisted Cybersecurity solution provider, announced its partnership with MNEMO, an Ibercoamerican managed security service provider (MSSP) with three security operations centers (SOC) serving enterprise customers in over ten countries. Together, Arcanna.ai and MNEMO will help scale SOC teams’ capacity, increasing operational efficiency and driving faster decision-making through the use of decision intelligence. Working […]

The post Arcanna.ai and MNEMO Partner to Drive Security Operations Efficiency for End Users appeared first on AiThority.

]]>
Arcanna.ai and MNEMO Partner to Drive Security Operations Efficiency for End Users

Arcanna.ai, an AI-Assisted Cybersecurity solution provider, announced its partnership with MNEMO, an Ibercoamerican managed security service provider (MSSP) with three security operations centers (SOC) serving enterprise customers in over ten countries. Together, Arcanna.ai and MNEMO will help scale SOC teams’ capacity, increasing operational efficiency and driving faster decision-making through the use of decision intelligence.

Working in tandem with adjacent services such as Google Chronicle, joint customers will benefit from high-value security services that deliver efficient security operations across all teams and products. Context-aware AI models will learn from individual security analysts to ensure each threat is handled accordingly. Through Arcanna.ai’s decision intelligence platform, MNEMO can minimize security risk resulting from analyst fatigue or missed alerts and extend the security offering by enabling rapid and efficient onboarding of new customers.

Recommended AI News: Padini Enters Partnership with XTS and Huawei Malaysia for RM1 Million Investment in Warehouse Automation Solution

Julian Garrido, General Director, CEO, MNEMO Mexico said: “Offering our customers a scalable cybersecurity solution will only be possible leveraging vital partnerships like we have with Arcanna.ai. Adopting a decision intelligence platform like Arcanna.ai helps increase our efficiency and allows us to scale capacity within our SOC teams. We are accomplishing our goal of working with companies whose vision aligns with ours: providing automated and scalable best-in-class cybersecurity platforms.”

Petrica Ruta, CEO, Arcanna.ai, said: “Arcanna.ai helps MSSPs enable their customers to focus on running their business without having to worry about security breaches. Working in conjunction with other cybersecurity platforms, such as Google Chronicle, and solidifying partnerships like the one we have with MNEMO, we’re able to provide security analysts with the tools they need to focus on critical threats, ensuring businesses can run smoothly without any security hiccups.”

John N. Stewart, Arcanna.ai investor, board member, and former Chief Security and Trust Officer at Cisco, said: “Let’s get real – there are too many attacks, too few people, and too much technology adding to the workload versus reducing the workload while increasing productivity of our teams. The time is now, the answer is Arcanna.”

Recommended AI News: Customer ‘retargeting’ on Mobile Driving 100x Increase in Sales

[To share your insights with us, please write to sghosh@martechseries.com]

The post Arcanna.ai and MNEMO Partner to Drive Security Operations Efficiency for End Users appeared first on AiThority.

]]>
LogRhythm Partners With Predictive Threat Leader, SecLytics To Deliver Enhanced And Intuitive Cybersecurity Capabilities In The Middle East https://aithority.com/security/logrhythm-partners-with-predictive-threat-leader-seclytics-to-deliver-enhanced-and-intuitive-cybersecurity-capabilities-in-the-middle-east/ Thu, 20 Jan 2022 08:59:39 +0000 https://aithority.com/?p=373291 LogRhythm Partners With Predictive Threat Leader, SecLytics To Deliver Enhanced And Intuitive Cybersecurity Capabilities In The Middle East

LogRhythm’s NextGen SIEM platform and SecLytics’ Augur pXDR solution provide accelerated threat detection and incident response for organizations across the region LogRhythm, the company powering security operations centers (SOCs) has partnered with SecLytics, a leader in predictive threat intelligence, to transform the security posture and streamline operations for security operations center (SOC) teams in the Middle East. LogRhythm and SecLytics will work hand-in-hand to […]

The post LogRhythm Partners With Predictive Threat Leader, SecLytics To Deliver Enhanced And Intuitive Cybersecurity Capabilities In The Middle East appeared first on AiThority.

]]>
LogRhythm Partners With Predictive Threat Leader, SecLytics To Deliver Enhanced And Intuitive Cybersecurity Capabilities In The Middle East
LogRhythm’s NextGen SIEM platform and SecLytics’ Augur pXDR solution provide accelerated threat detection and incident response for organizations across the region

LogRhythm, the company powering security operations centers (SOCs) has partnered with SecLytics, a leader in predictive threat intelligence, to transform the security posture and streamline operations for security operations center (SOC) teams in the Middle East. LogRhythm and SecLytics will work hand-in-hand to provide enhanced threat intelligence capabilities and high-performance analytics, to mitigate new and evolving risks in the region.

Recommended AI News: Accern Successfully Completes SOC 2 Type 2 Examination

Through the collaboration, LogRhythm and SecLytics will enable organizations in the Middle East to seamlessly deliver digital transformation and protect their end-users with aligned early threat detection and response solutions. SecLytics will deploy its Augur pXDR solution to provide unique, patented predictive threat intelligence, leveraging machine learning. In alignment, LogRhythm will roll out its NextGen SIEM to deliver intuitive, high-performance analytics and a seamless incident response workflow.

“Data breaches in the MENA region are reported to have reached an average cost of around $6.5 million, which is well above the global average incident cost of near $4 million,” said Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA) at LogRhythm. “Cybersecurity risks in the Middle East are becoming increasingly sophisticated and this is causing organizations in the region to suffer notable losses. Overcoming new threats requires cybersecurity organizations to bring together their capabilities to build a protected threat environment for businesses in the region. Our collaboration with SecLytics is building a security-first future in the Middle East”

Recommended AI News: QPharma Introduces Ti CRM 2.0–a Pharma CRM Built for Speed

SecLytics’ Augur pXDR solution detects the build-up of cybercriminal infrastructure online before attack launch. Its behavioral prediction models identify and group threat actors based on patterns of activity up to 50 days out. Integrated with LogRhythm’s SIEM offering, organizations in the Middle East benefit from a core set of cybersecurity capabilities including data collection, real-time visibility and threat automation, and analytical techniques.

“We are working with LogRhythm to transform cyber resiliency in the Middle East and enable organizations to expand their applications and services without risk. This requires cybersecurity providers to deliver a unified experience to ensure that businesses in the region are gaining the best possible security experience and are in a strong position to tackle emerging threats,” said Saeed Abu-Nimeh, Co-Founder, CEO as Seclytics. “Together, we are empowering SOC teams to mitigate threats more efficiently by aligning pXDR and NextGen SIEM to realize enhanced security capabilities. With the right tools in place, security teams can adopt a proactive approach for eliminating targeted attacks.”

LogRhythm has developed a robust ecosystem representing its award-winning NextGen SIEM Platform, with 30 partners across the Middle East. In 2021, it has focused its cybersecurity innovation efforts in the region through strategic partnerships with LogRhythm AlJammaz Technologies and Mideast Communication Systems (MSC). On top of this, it has provided new value to the region with the launch of its automation module to help organizations rapidly comply with Qatar’s National Cybersecurity Framework.

Recommended AI News: Glassbox and Optimizely Partner to Accelerate Digital Transformation for Businesses

[To share your insights with us, please write to sghosh@martechseries.com]

The post LogRhythm Partners With Predictive Threat Leader, SecLytics To Deliver Enhanced And Intuitive Cybersecurity Capabilities In The Middle East appeared first on AiThority.

]]>
IBM Security Arms its Managed Security Services with Advanced OT and Industrial IoT Cybersecurity from Nozomi Networks https://aithority.com/security/ibm-security-arms-its-managed-security-services-with-advanced-ot-and-industrial-iot-cybersecurity-from-nozomi-networks/ Wed, 10 Nov 2021 15:57:31 +0000 https://aithority.com/?p=349896 IBM Security Arms its Managed Security Services with Advanced OT and Industrial IoT Cybersecurity from Nozomi Networks

Among the first global security service providers to achieve Nozomi Networks Certified MSSP Elite Partner status IBM Security and Nozomi Networks announced IBM Security has been certified as a Nozomi Networks MSSP Elite Partner, further strengthening its managed security services offering with Nozomi Networks industry-leading solutions and expertise for OT and industrial IoT cybersecurity. “Managing escalating cyber […]

The post IBM Security Arms its Managed Security Services with Advanced OT and Industrial IoT Cybersecurity from Nozomi Networks appeared first on AiThority.

]]>
IBM Security Arms its Managed Security Services with Advanced OT and Industrial IoT Cybersecurity from Nozomi Networks
Among the first global security service providers to achieve Nozomi Networks Certified MSSP Elite Partner status

IBM Security and Nozomi Networks announced IBM Security has been certified as a Nozomi Networks MSSP Elite Partner, further strengthening its managed security services offering with Nozomi Networks industry-leading solutions and expertise for OT and industrial IoT cybersecurity.

“Managing escalating cyber threats and risks to critical infrastructure and industrial operations is a top priority for a growing number of our security services clients,” said Chris McCurdy, Vice President, GM IBM Worldwide Security. “By teaming with Nozomi Networks, IBM is providing our customers with market-leading OT threat monitoring, detection and response services. We are pleased to be one of the first global OT MSSPs that is certified by Nozomi Networks which gives confidence to our customers that we are aligned and have the skills to maximize the value of Nozomi Networks’ products.”

PREDICTIONS-SERIES-2022Operational asset management is making its way to the Security Operations Center (SOC) and customers are turning to IBM Security for comprehensive IT and OT managed threat detection and response (MTDR) and platform management. Nozomi Networks’ MSSP Elite Program helps IBM Security successfully operationalize, maintain and optimize OT and IoT security services over time. Customers benefit from highly scalable industry-proven solutions.

Recommended AI News: Seoul-based Edtech Startup Mathpresso Secures Strategic Investment from Google

“IBM Security is filling a vital role as CISOs look for cost-effective ways to strengthen their security postures across IT and OT while juggling resource constraints and skills gaps,” said Chet Namboodri, Nozomi Networks Senior Vice President of Business Development and Alliances. “Together we are addressing a rapidly expanding need to include advanced OT and IoT security solutions and maximize value for our mutual customers.”

Going beyond basic OT and IoT security integrations for converged network SOC environments, IBM Security—as a Nozomi Networks certified MSSP Elite Partner—is fully equipped to integrate, sell and support Nozomi Networks’ solutions as part of a comprehensive managed services offering for mutual customers. Advanced training and certification ensure IBM is fully qualified to support customers with deep OT/ICS network visibility, advanced monitoring, and actionable threat intelligence for the best possible incident response. Customers can be confident that IBM is well-equipped to address evolving OT requirements with access to Nozomi Networks expert resources and innovative solutions. That includes Nozomi’s Networks’ full suite of cloud-based and on premises solutions, that IBM is managing on behalf of end user customers.

Recommended AI News: Following the success of HiPhi X, Human Horizons announces the new Digital GT-HiPhi Z

[To share your insights with us, please write to sghosh@martechseries.com]

The post IBM Security Arms its Managed Security Services with Advanced OT and Industrial IoT Cybersecurity from Nozomi Networks appeared first on AiThority.

]]>
LogRhythm and HT Solutions Launch Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus https://aithority.com/security/logrhythm-and-ht-solutions-launch-automated-centralized-and-real-time-cybersecurity-solutions-in-the-caucasus/ Sat, 06 Nov 2021 10:54:23 +0000 https://aithority.com/?p=348427 Cybersecurity Trailblazer Keyavi Data Unveils Major Product Enhancements That Empower Global Enterprises To Share And Manage Their Data With Employees And Third Parties Seamlessly And Securely On Any Device, Anywhere, At Any Time

LogRhythm, the company powering today’s security operations centers (SOCs), has launched a strategic partnership in the Caucasus to provide customers in the region with optimized cybersecurity capabilities. The launch is in partnership with HT (High-Tech) Solutions, a leading Georgian IT consulting company. The partnership enables public and private organizations to deploy LogRhythm’s full portfolio of […]

The post LogRhythm and HT Solutions Launch Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus appeared first on AiThority.

]]>
Cybersecurity Trailblazer Keyavi Data Unveils Major Product Enhancements That Empower Global Enterprises To Share And Manage Their Data With Employees And Third Parties Seamlessly And Securely On Any Device, Anywhere, At Any Time

LogRhythm, the company powering today’s security operations centers (SOCs), has launched a strategic partnership in the Caucasus to provide customers in the region with optimized cybersecurity capabilities. The launch is in partnership with HT (High-Tech) Solutions, a leading Georgian IT consulting company. The partnership enables public and private organizations to deploy LogRhythm’s full portfolio of solutions, including its NextGen Security Information and Event Management (SIEM) platform to detect, investigate, and neutralize threats with real-time visibility.

The strategic launch with HT Solutions will enable organizations in the region to build a solid security foundation to protect themselves from the growing threat landscape. LogRhythm’s comprehensive platform empowers businesses to successfully reduce their cyber risk with user and entity behavior analytics (UEBA), network traffic and behavior analytics (NTBA) and security orchestration, automation, and response (SOAR) in a single end-to-end solution.

Recommended AI News: Yahoo & Merkle Strengthen Identity-Based Targeting, Performance & Measurement for Advertisers

“This year, we have seen an increase in malicious cyberattacks in the Caucasus and across the world. The shift to rapid digital transformation has driven the need for organizations of all sizes to optimize their security posture with threat detection and mitigation capabilities,” said Kev Eley, VP, Sales, UK and Europe at LogRhythm. “We are continuing to expand our growth into new regions to match the speed of technological innovation. Our strategic launch in Georgia will provide the solutions to transform the way that organizations approach cybersecurity threats across the region. We are delivering enhanced cybersecurity tools to combat evolving risks on a local and global scale.”

HT Solutions will roll-out LogRhythm’s SIEM platform to customers in Georgia and the Caucasus. It provides cybersecurity solutions in combination with its IT audit, software licensing, system integration and IT infrastructure offerings. LogRhythm will enable HT Solution’s customers to gain access to an end-to-end collection of aligned security operations capabilities.

Recommended AI News: EverGrow Coin Set To Become The Next Shiba Inu, Passes $1.5 Billion Marketcap Gaining 28,000% In Just 1 Month

“The Georgian IT market is geared towards accelerated digitalization in line with AI, IoT and cloud adoption trends witnessed across wider Europe. The region is experiencing substantial growth in its technology offerings and we are committed to enabling security transformation during this time of development,” said Nino Niauri, cyber security solutions advisor at HT Solutions. “Our partnership with LogRhythm is supporting organizations with greater visibility across their security environments to quickly identify and prioritize potential issues. Together, we are delivering new value to our customers in a growing number of markets.”

LogRhythm allows continuous monitoring and incident response, and adherence to regulatory requirements for organizations across six continents of the world through its award-winning SIEM platform. This year it has expanded the reach of its security offerings to allow businesses to combat rising threat risks, no matter where they’re located in the world.

Recommended AI News: LTI wird Microsoft Azure Expert Managed Services Provider

[To share your insights with us, please write to sghosh@martechseries.com]

The post LogRhythm and HT Solutions Launch Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus appeared first on AiThority.

]]>
LogRhythm Launches Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus in Partnership with HT Solutions https://aithority.com/security/logrhythm-launches-automated-centralized-and-real-time-cybersecurity-solutions-in-the-caucasus-in-partnership-with-ht-solutions/ Fri, 05 Nov 2021 14:38:44 +0000 https://aithority.com/?p=348383 LogRhythm Launches Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus in Partnership with HT Solutions

LogRhythm, the company powering today’s security operations centers (SOCs), has launched a strategic partnership in the Caucasus to provide customers in the region with optimized cybersecurity capabilities. The launch is in partnership with HT (High-Tech) Solutions, a leading Georgian IT consulting company. The partnership enables public and private organizations to deploy LogRhythm’s full portfolio of solutions, […]

The post LogRhythm Launches Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus in Partnership with HT Solutions appeared first on AiThority.

]]>
LogRhythm Launches Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus in Partnership with HT Solutions

LogRhythm, the company powering today’s security operations centers (SOCs), has launched a strategic partnership in the Caucasus to provide customers in the region with optimized cybersecurity capabilities. The launch is in partnership with HT (High-Tech) Solutions, a leading Georgian IT consulting company. The partnership enables public and private organizations to deploy LogRhythm’s full portfolio of solutions, including its NextGen Security Information and Event Management (SIEM) platform to detect, investigate, and neutralize threats with real-time visibility.

The strategic launch with HT Solutions will enable organizations in the region to build a solid security foundation to protect themselves from the growing threat landscape. LogRhythm’s comprehensive platform empowers businesses to successfully reduce their cyber risk with user and entity behavior analytics (UEBA), network traffic and behavior analytics (NTBA) and security orchestration, automation, and response (SOAR) in a single end-to-end solution.

Recommended AI News: Wipro and Oracle Launch Tollway Transportation and B****** Solution

“This year, we have seen an increase in malicious cyberattacks in the Caucasus and across the world. The shift to rapid digital transformation has driven the need for organizations of all sizes to optimize their security posture with threat detection and mitigation capabilities,” said Kev Eley, VP, Sales, UK and Europe at LogRhythm. “We are continuing to expand our growth into new regions to match the speed of technological innovation. Our strategic launch in Georgia will provide the solutions to transform the way that organizations approach cybersecurity threats across the region. We are delivering enhanced cybersecurity tools to combat evolving risks on a local and global scale.”

HT Solutions will roll-out LogRhythm’s SIEM platform to customers in Georgia and the Caucasus. It provides cybersecurity solutions in combination with its IT audit, software licensing, system integration and IT infrastructure offerings. LogRhythm will enable HT Solution’s customers to gain access to an end-to-end collection of aligned security operations capabilities.

Recommended AI News: Yahoo & Merkle Strengthen Identity-Based Targeting, Performance & Measurement for Advertisers

“The Georgian IT market is geared towards accelerated digitalization in line with AI, IoT and cloud adoption trends witnessed across wider Europe. The region is experiencing substantial growth in its technology offerings and we are committed to enabling security transformation during this time of development,” said Nino Niauri, Cyber Security Solutions Advisor at HT Solutions. “Our partnership with LogRhythm is supporting organizations with greater visibility across their security environments to quickly identify and prioritize potential issues. Together, we are delivering new value to our customers in a growing number of markets.”

LogRhythm allows continuous monitoring and incident response, and adherence to regulatory requirements for organizations across six continents of the world through its award-winning SIEM platform. This year it has expanded the reach of its security offerings to allow businesses to combat rising threat risks, no matter where they’re located in the world.

Recommended AI News: EverGrow Coin Set To Become The Next Shiba Inu, Passes $1.5 Billion Marketcap Gaining 28,000% In Just 1 Month

[To share your insights with us, please write to sghosh@martechseries.com]

The post LogRhythm Launches Automated, Centralized and Real-Time Cybersecurity Solutions in the Caucasus in Partnership with HT Solutions appeared first on AiThority.

]]>
LogRhythm Wins Cyber Security Solution of the Year at National Technology Awards https://aithority.com/security/logrhythm-wins-cyber-security-solution-of-the-year-at-national-technology-awards/ Mon, 04 Oct 2021 15:42:29 +0000 https://aithority.com/?p=337805 LogRhythm Wins Cyber Security Solution of the Year at National Technology Awards

LogRhythm, the company powering today’s security operations centers (SOCs), has won the award for Cyber Security Solution of the Year at the 5th annual National Technology Awards. LogRhythm has been recognised for its NextGen SIEM Platform and its ability to centrally collect data across its entire network environment to gain real-time visibility into threats. With […]

The post LogRhythm Wins Cyber Security Solution of the Year at National Technology Awards appeared first on AiThority.

]]>
LogRhythm Wins Cyber Security Solution of the Year at National Technology Awards

LogRhythm, the company powering today’s security operations centers (SOCs), has won the award for Cyber Security Solution of the Year at the 5th annual National Technology Awards. LogRhythm has been recognised for its NextGen SIEM Platform and its ability to centrally collect data across its entire network environment to gain real-time visibility into threats.

With LogRhythm’s award-winning NextGen SIEM Platform, customers are empowered to mature their security operations programme and protect their critical assets and employees. It delivers comprehensive security analytics to uncover threats faster, mitigate risks more efficiently, and produce measurable results.

Recommended AI News: AnyClip Expands Offering With ‘Intelligence Lockbox’ – Bringing AI-powered Internal Communications To The New, Video-dominated Workplace

“LogRhythm is honoured to be recognised as an industry leader for its SIEM cybersecurity solution. It is great to see our platform being chosen up against powerful solutions from across the cybersecurity landscape,” said Kev Eley, UK and Europe Vice President of Sales at LogRhythm. “The next step on our journey is to continue to provide innovative technologies that allow our customers to take control of their cybersecurity outcomes. Our focus is on enabling organisations to be security first.”

The National Technology Awards are the most comprehensive celebration of technology in the year, organised by National Technology News. The awards celebrate innovation, vision, and excellence across the technology market.

Recommended AI News: Rev.com Joins New Brightcove Marketplace

“The last year has proven that the need for comprehensive cybersecurity is more pressing than ever. The growth of the attack surface for threat actors has been expanded by the effects of COVID-19 and organisations need a solution that allows them the respond to this,” said Eley. “We are proud to be supporting our customers throughout this critical time for cybersecurity with a platform that meets their changing needs.”

The win follows a year of development and achievement for the company. Earlier this year, LogRhythm was named as a Leader by Gartner, Inc. in the 2021 “Magic Quadrant for Security Information and Event Management” research report for the ninth consecutive year. It has also been recently selected by C&P Capeletti & Perl, a leading IT service provider in Germany, to deploy its SIEM Platform.

Recommended AI News: MyCase Announces New Integration With Smith.ai

[To share your insights with us, please write to sghosh@martechseries.com]

The post LogRhythm Wins Cyber Security Solution of the Year at National Technology Awards appeared first on AiThority.

]]>
LogRhythm Launches Automation Tools for Rapidly Complying with Qatar Cybersecurity Framework https://aithority.com/security/logrhythm-launches-automation-tools-for-rapidly-complying-with-qatar-cybersecurity-framework/ Tue, 13 Jul 2021 16:09:01 +0000 https://aithority.com/?p=305800 LogRhythm Launches Automation Tools for Rapidly Complying with Qatar Cybersecurity Framework

Organizations can deploy LogRhythm’s tools and immediately meet the regulatory requirements of Qatar’s National Cyber Security Strategy LogRhythm, the company powering today’s security operations centers (SOCs), has released a new set of automation tools to allow organizations to rapidly comply with Qatar’s National Cybersecurity Framework. It provides insights into AI engine rules, investigations, reports and […]

The post LogRhythm Launches Automation Tools for Rapidly Complying with Qatar Cybersecurity Framework appeared first on AiThority.

]]>
LogRhythm Launches Automation Tools for Rapidly Complying with Qatar Cybersecurity Framework
  • Organizations can deploy LogRhythm’s tools and immediately meet the regulatory requirements of Qatar’s National Cyber Security Strategy

LogRhythm, the company powering today’s security operations centers (SOCs), has released a new set of automation tools to allow organizations to rapidly comply with Qatar’s National Cybersecurity Framework. It provides insights into AI engine rules, investigations, reports and reporting packages, LogRhythm’s GeoIP functionality and the compliance maturity model.

LogRhythm customers can deploy the tools in its NextGen Security Information and Event Management (SIEM) platform to rapidly achieve regulatory compliance. It enables organizations to use one-click, out-of-the box automation to meet the minimum cybersecurity requirements for information and technology assets operating within Qatar. The platform combines user and entity behavior analytics (UEBA), network traffic and behavior analytics (NTBA) and security automation and orchestration (SAO) in a single end-to-end solution.

Recommended AI News: Parks Associates: 40% of MDU Renters are Interested in Bulk Broadband Internet Bundled with Their Rent

“We are honoured to support organizations operating in Qatar and enable them to rapidly comply with its cybersecurity framework. As the nation prepares for one of the most watched sporting events in the world, it is critical that cybersecurity capabilities are enhanced and optimized to serve a changing digital environment. Automation and use cases will help organizations to scale efficiently to stop new and growing threats,” said Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA) at LogRhythm. “Our aim is to support the Qatar National Vision 2030 and provide a secure foundation for the future of ICT in Qatar.”

The National Cyber Security Strategy was launched in 2014 as part of the Qatar National Vision 2030. It is in place to establish and maintain a secure cyberspace to safeguard national interests and preserve the fundamental rights and values of Qatar’s society. Collectively, it aims to provide the foundation for protecting against and preparing for cyber threats as well as detecting, responding to, and recovering from threats and challenges.

Recommended AI News: Voyager Digital to Lead Cryptocurrency Education for Pro Football Players

“LogRhythm is supporting organizations across the Middle East with new levels of automation and visibility across their cybersecurity operations. We are making it simple to comply with local regulations while benefiting from a world-class SIEM platform. Our team understands unique local needs and ensures that our users are ready to proactively stop global cyberthreats,” said Dohaji. “We will continue to roll out new tools in local markets across the Middle East and around the world.”

LogRhythm gives organizations full visibility of their environment in a single pane of glass so SOC can efficiently identify potential threats and minimize risk. It has recently expanded its teams across Egypt, Jordan, the Kingdom of Saudi Arabia, Lebanon and the UAE with a key focus on the public sector.

Recommended AI News: Zeta Surgical Enters into Exclusive License Agreement with Leading Boston-based Hospital, Partners with Singapore’s National Neuroscience Institute

The post LogRhythm Launches Automation Tools for Rapidly Complying with Qatar Cybersecurity Framework appeared first on AiThority.

]]>
More Than a Third of Organizations Hold No One Accountable For Cyberattacks, According to Research From LogRhythm https://aithority.com/security/more-than-a-third-of-organizations-hold-no-one-accountable-for-cyberattacks-according-to-research-from-logrhythm/ Tue, 22 Jun 2021 13:55:11 +0000 https://aithority.com/?p=297542 More Than a Third of Organizations Hold No One Accountable For Cyberattacks, According to Research From LogRhythm

The global research reveals the disconnect between business decision makers and security teams, even as new risks from remote working and ransomware grow.  LogRhythm, the company powering today’s security operations centers (SOCs), has launched a report that reveals that 60% of organizations were victims of a cyberattack in the past two years with 35% saying no one was held accountable when these attacks occurred. The report, “Security and the […]

The post More Than a Third of Organizations Hold No One Accountable For Cyberattacks, According to Research From LogRhythm appeared first on AiThority.

]]>
More Than a Third of Organizations Hold No One Accountable For Cyberattacks, According to Research From LogRhythm
  • The global research reveals the disconnect between business decision makers and security teams, even as new risks from remote working and ransomware grow. 

LogRhythm, the company powering today’s security operations centers (SOCs), has launched a report that reveals that 60% of organizations were victims of a cyberattack in the past two years with 35% saying no one was held accountable when these attacks occurred. The report, “Security and the C-Suite: Making Security Priorities Business Priorities”, shows the disconnect between business decision makers and IT security teams and its impact on budgets, strategy and business outcomes.

Recommended AI News: Accenture Positioned as a Leader in Digital Strategy Consulting Services by the IDC MarketScape

According to the research, 93% of IT security leaders do not report directly to the CEO. On average respondents are three levels away from the CEO, which makes it very difficult to ensure that leadership has an accurate and complete understanding of security risks. 60% of respondents said IT security leaders should report directly to the CEO because it would create greater awareness of security issues throughout the organization.

“It is critical that IT security leaders have influence on resources, budgets and strategic priorities. We’ve seen the threat landscape evolve rapidly over the last 12-18 months and that means the C-Suite must understand and recognize changing risk profiles and empower IT security leaders to react. The impact of lockdowns and quarantines on cybersecurity should be a wake-up call that ensures there is accountability for cyberattacks from security teams through to the CEO,” said Andrew Hollister, Deputy CSO and VP Labs at LogRhythm. “If there are security risks that are not being addressed, IT security leaders should be able to provide recommendations and concrete actions that the CEO and board can approve or reject.”

Less than half of respondents (46%) say senior leadership has confidence that the IT security leaders understand the business goals. Only 43% of respondents say their organization values and effectively leverages the expertise of IT security leaders.

“The rapid move to remote working has created a whole range of risks for IT security teams. The research shows that this is now the biggest cybersecurity challenge facing organizations. ‘Work from anywhere’ scenarios have to shape security strategies and will require new budget and resource to manage. Any major shift in user behavior requires security teams and organizations as a whole to review, revamp and strengthen their security posture. This makes collaboration and communication between the C-Suite and IT security teams essential,” said Kev Eley, VP Sales Europe at LogRhythm.

Recommended AI News: Blockchain Coinvestors Announces New Advisory Board Members

63% of respondents say their top risk is phishing/social engineering attacks, and 60% of respondents say it is the remote worker endpoint security and ransomware. Remote working is creating new security challenges as the attack surface is increased  and employees may be more likely to engage in risky user behaviors outside of the familiar corporate environment:

  • 73% of respondents say less secure home networks are used by employees in their organization.
  • 68% of respondents say employees and contractors believe the organization is not monitoring their activities.
  • 67% say a family member uses a work device.

Amid these challenges, 54% of respondents are worried about their job security, with 63% citing insufficient budget to invest in the right technologies as a main culprit. Further, more than half (53%) of respondents claim senior leadership does not understand their role, and another 51% of respondents believe that they lack executive support.

Recommended AI News: Brightcove And ByteArk Bring Superior New Media And OTT Technologies To Customers In Thailand

The post More Than a Third of Organizations Hold No One Accountable For Cyberattacks, According to Research From LogRhythm appeared first on AiThority.

]]>