Category Archives: Physical Security

AlertEnterprise to Present and Showcase Physical and Cybersecurity Solutions at ASIS 2017


This entry was posted by on .

AlertEnterprise, the Silicon Valley-based leader in advanced critical infrastructure protection solutions, will attend the upcoming ASIS 2017 Annual Conference at the Kay Bailey Hutchison Convention Center in Dallas, TX, on September 25-28, 2017.
AlertEnterprise, the Silicon Valley-based leader in advanced critical infrastructure protection solutions, will attend the upcoming ASIS 2017 Annual Conferenceat the Kay Bailey Hutchison Convention Center in Dallas, TX, on September 25-28, 2017.

Jasvir Gill, Founder and CEO of AlertEnterprise states that, “Recent high-profile attacks have proven that adversaries are becoming more bold and deliberately targeting critical infrastructure.” He adds that, “our solutions can aid security departments in identifying physical and cybersecurity breaches and help combat insider threats.” read more

Unlock All or Lock All User Accounts in IDM


This entry was posted by on .

How to Enable and Disable User Accounts for Duration to Achieve Better Security

Let us assume there is an employee who has access to critical systems and applications,  but now he is going on leave for 10 days.

lock_unlock_user_accounts_for duration

For all ten days all the user accounts and access levels are enabled for this employee, so there is a chance of risk of unathorized access. Anyone can misuse these access rights / levels as the employee is on leave.

The IDM provides a solution which will automatically disables / locks / scrambles the password for these ten days and the application will automatically Enable / Unlock all the accounts once employee returns from Leave. read more

PIAM vs. PACS, What Kind of Physical Access Security Software Do You Need?


This entry was posted by on .

So you know you want security software to protect your people and your physical assets, but aren’t sure of what you need?

Trying to decide if you need a Physical Identity & Access Management; (PIAM) and Physical Access Controls Systems (PACS)? How do you decide what kind of Physical Access Security System you need? Or do you need both?

Feel free to use the chart below to help you figure it out.

PACS_vs._PIAM_ALERT_ENTERPRISE

Stop Attacks and Disasters Across IT, OT and Physical Assets with Security Software


This entry was posted by on .

Attacks and Disasters Happen Across all Verticals, and They Often Cross IT, OT, and Physical Infrastructure. So How Does it Make Sense to Have a Security Strategy that Only Protects IT?

Below are a few examples of attacks and disasters that happened across IT, Operational Technology (OT), and Physical Assets across many different verticals. Most of these are recent, but one of them was 30-years ago and most people still remember it.

substation_attack_acrosss_Physical_Assets_AlertEnterprise_security_Software

Electrical Substation

The attack began just before 1 am on April 16 last year, when someone slipped into an underground vault not far from a busy freeway and cut telephone cables not far from San Jose, CA. Within 1/2 hour, snipers opened fire on an outlying electrical substation. Shooting for 19 minutes, they surgically knocked out 17 giant transformers that funnel power to a nearby metropolis. A minute before police arrived, the shooters disappeared into the night. Power disruption was avoided by rerouting power from other stations, but the station remained closed for 27 days for repairs. Other Utilities Substations that have experienced trouble are: Melbourne, Australia, Scarborough, Ontario and Warren, Minnesota to name a few. read more

Security Software That Stops Threats Across IT, OT and Physical Assets


This entry was posted by on .

“Attacks and disasters don’t happen in technology silos, they happen across IT, OT, and Physical Assets.”
—Jasvir Gill
Founder and CEO, Alert Enterprise!
Former Founder and CEO of Virsa Systems (Acquired by SAP)

security_software_that_stops_physical_threats

 AlertEnterprise is utilized by energy, oil and gas, airports, federal, chemical, enterprise  customers and more. We are recognized by top industry analysts as a technology innovator because our software uniquely detects, mitigates, and in many cases stops threats and disasters across IT, OT, and Physical Assets. read more