Monthly Archives: May 2014

IAM: Providing Access to the Right People


This entry was posted by on .

“Role” can be defined as a technical phrase being used for the collection of individual privileges (access to company assets) which are assigned to an individual to perform his job. AlertEnterprise delivers a unique solution for Role Management across various external systems including physical & logical.

role_management_AlertEnterprise

Eg. When any person joins the organization, apart from creating/managing his digital identity, it is equally important to provide access to the devices (physical/logical) where he is supposed to work. Both of these things are well managed by the Role Module incorporated into the AlertEnterprise application.

read more

PIAM vs. PACS, What Kind of Physical Access Security Software Do You Need?


This entry was posted by on .

So you know you want security software to protect your people and your physical assets, but aren’t sure of what you need?

Trying to decide if you need a Physical Identity & Access Management; (PIAM) and Physical Access Controls Systems (PACS)? How do you decide what kind of Physical Access Security System you need? Or do you need both?

Feel free to use the chart below to help you figure it out.

PACS_vs._PIAM_ALERT_ENTERPRISE

Continue reading

Stop Attacks and Disasters Across IT, OT and Physical Assets with Security Software


This entry was posted by on .

Attacks and Disasters Happen Across all Verticals, and They Often Cross IT, OT, and Physical Infrastructure. So How Does it Make Sense to Have a Security Strategy that Only Protects IT?

Below are a few examples of attacks and disasters that happened across IT, Operational Technology (OT), and Physical Assets across many different verticals. Most of these are recent, but one of them was 30-years ago and most people still remember it.

substation_attack_acrosss_Physical_Assets_AlertEnterprise_security_Software

Electrical Substation

The attack began just before 1 am on April 16 last year, when someone slipped into an underground vault not far from a busy freeway and cut telephone cables not far from San Jose, CA. Within 1/2 hour, snipers opened fire on an outlying electrical substation. Shooting for 19 minutes, they surgically knocked out 17 giant transformers that funnel power to a nearby metropolis. A minute before police arrived, the shooters disappeared into the night. Power disruption was avoided by rerouting power from other stations, but the station remained closed for 27 days for repairs. Other Utilities Substations that have experienced trouble are: Melbourne, Australia, Scarborough, Ontario and Warren, Minnesota to name a few.

read more

Security Software That Stops Threats Across IT, OT and Physical Assets


This entry was posted by on .

“Attacks and disasters don’t happen in technology silos, they happen across IT, OT, and Physical Assets.”
—Jasvir Gill
Founder and CEO, Alert Enterprise!
Former Founder and CEO of Virsa Systems (Acquired by SAP)

security_software_that_stops_physical_threats

 AlertEnterprise is utilized by energy, oil and gas, airports, federal, chemical, enterprise  customers and more. We are recognized by top industry analysts as a technology innovator because our software uniquely detects, mitigates, and in many cases stops threats and disasters across IT, OT, and Physical Assets.

read more

Integrating Physical and Logical Security, Why Is It So Hard?


This entry was posted by on .
Integrating_Physical_and_Logical Security_Across_IT_OT_and SCADA

One of the most common mistakes in the view of integrating physical and IT security is not recognizing how a company’s charter impacts security in the company.

For example, take the charter of a software company.

What is the charter of a Software Development Company?

In a software development company programmers develop software that the company sells. This is the core function of the organization, and aligns with the company charter. The software development group will have a variety of tools used in software development, such as development interfaces, test and development servers, and other tools to help build products for the company.

read more