Category Archives: Homeland Security

AlertEnterprise Salutes National Cybersecurity Awareness Month


This entry was posted by on .

Nactional_Cyber_Month

October is coming to an end. It is also National Cybersecurity Awareness Month. Thankfully no major breaches have been announced this month. Please join us in supporting the mission of the Department of Homeland Security by promoting Cybersecurity Awareness all year round.

Department of Homeland Security has designated October as National Cybersecurity Month. Each week in October is meant to highlight certain areas of security. Here are some are some of them. Remember these can be done year-round, not only in October.

read more

Stop Attacks and Disasters Across IT, OT and Physical Assets with Security Software


This entry was posted by on .

Attacks and Disasters Happen Across all Verticals, and They Often Cross IT, OT, and Physical Infrastructure. So How Does it Make Sense to Have a Security Strategy that Only Protects IT?

Below are a few examples of attacks and disasters that happened across IT, Operational Technology (OT), and Physical Assets across many different verticals. Most of these are recent, but one of them was 30-years ago and most people still remember it.

substation_attack_acrosss_Physical_Assets_AlertEnterprise_security_Software

Electrical Substation

The attack began just before 1 am on April 16 last year, when someone slipped into an underground vault not far from a busy freeway and cut telephone cables not far from San Jose, CA. Within 1/2 hour, snipers opened fire on an outlying electrical substation. Shooting for 19 minutes, they surgically knocked out 17 giant transformers that funnel power to a nearby metropolis. A minute before police arrived, the shooters disappeared into the night. Power disruption was avoided by rerouting power from other stations, but the station remained closed for 27 days for repairs. Other Utilities Substations that have experienced trouble are: Melbourne, Australia, Scarborough, Ontario and Warren, Minnesota to name a few.

read more

Security Software That Stops Threats Across IT, OT and Physical Assets


This entry was posted by on .

“Attacks and disasters don’t happen in technology silos, they happen across IT, OT, and Physical Assets.”
—Jasvir Gill
Founder and CEO, Alert Enterprise!
Former Founder and CEO of Virsa Systems (Acquired by SAP)

security_software_that_stops_physical_threats

 AlertEnterprise is utilized by energy, oil and gas, airports, federal, chemical, enterprise  customers and more. We are recognized by top industry analysts as a technology innovator because our software uniquely detects, mitigates, and in many cases stops threats and disasters across IT, OT, and Physical Assets.

read more

ICS Security Convergence: Don’t Miss the Big Picture, Onsite Conference


This entry was posted by on .

Reality…our critical infrastructure environments are becoming more interconnected while our security efforts continue to be disconnected and function within organizational / technology silos. Truth is that current and emerging threat actors don’t attack in silos. In this sharing and discussion session, we’ll talk about how the convergence of physical security, enterprise IT and SCADA event data can help your organization do more with less.

ICS_Joint_working_group_Don't_miss_the_big_picture

Main topics include:
 Example scenarios that outline how threat actors attack all three silos and where individual events may be authentic, but when correlated, are not reflective of authorized activity.
 How technology can be leveraged to actively enforce policies instead of just monitoring then reporting on violations
 Getting away from the 3 ring binder approach to incident management and how having automated and manual response mechanisms allow organizations to effectively respond and remediate.
 Discuss and give example of actionable and focused threat intelligence using existing data feeds and OSINT
 Show how a security foundation that includes physical, IT and SCADA allows for efficient compliance and enables real security
 Know who is accessing your critical devices: Contextual data around the behaviors, incidents and overall access footprint of your privileged users
Real world examples, stories and techniques demonstrated during the session make this presentation standout. Presenter’s experience from all sides of security in ICS (attacker, defender, policy maker, auditor) provides a unique point of view on implementing effective security while not impacting operations.

read more

How IT-OT Convergence Enhances Corporate and Critical Infrasturcture Protection


This entry was posted by on .
PSIM_Video_Analytics_and_VMS_tied_into_AlertEnterprise_Software

PSIM Video Analytics and VMS tied into AlertEnterprise Software

Industries such as oil and gas, chemicals, transportation, utilities and even federal facilities are battling to address complex threats against critical infrastructures, which have grown significantly in the past few years. Addressing security in silos of IT and OT has become their prime focus. AlertEnterprise security software addresses complex threats that cross the security silos such as IT, OT, and SCADA/ICS. By doing so, the software delivers improved operational reliability, protecting operating assets and responding more quickly to a range of vulnerabilities and persistent threats by enabling enterprises to analyze and track security events in a broader business context,  whether from cyber, physical or insider sources.

read more