Tag Archives: Jasvir Gill

Security Software That Stops Threats Across IT, OT and Physical Assets


This entry was posted by on .

“Attacks and disasters don’t happen in technology silos, they happen across IT, OT, and Physical Assets.”
—Jasvir Gill
Founder and CEO, Alert Enterprise!
Former Founder and CEO of Virsa Systems (Acquired by SAP)

security_software_that_stops_physical_threats

 AlertEnterprise is utilized by energy, oil and gas, airports, federal, chemical, enterprise  customers and more. We are recognized by top industry analysts as a technology innovator because our software uniquely detects, mitigates, and in many cases stops threats and disasters across IT, OT, and Physical Assets. read more

A New Approach to Substation Security and NERC Compliance


This entry was posted by on .

Join us for our Webinar: Tuesday April 29, 2014
10:00 am – 11:00 am PT | 1:00 pm – 2:00 pm ET 

Lessons you will learn:
• Why integrating physical and cyber security is key
• How to overcome the challenges of extending security across organizational boundaries
• New techniques that cover upfront risk analysis and automated workflow to simplify onboarding offboarding, anomaly detection and threat correlation

REGISTER HERE

High profile intrusions and physical attacks against substations have spurred a lot of discussion about physical security resulting in a FERC directive, for NERC to propose new physical security standards from NERC. A holistic approach to security has been proven to be more effective and addresses compliance requirements In the Utilities Industry at the same time. It is now essential to monitor and report roles-based physical access to various facilities, control rooms, substations and critical assets. Utilities of all size need to know who has access to specific facilities, critical assets and cyber critical assets and how much area access they should have within those facilities.
Additionally Version 5 of the NERC CIP compliance requirements adds more to physical security requirements in addition to complete background check and criminal history record checks for employees and un-escorted contractors. Additionally, highly critical assets must be housed in secured boundaries and any access to that area recorded and tracked.
Join the experts who are leading this session to discuss why this new approach is the only way to detect and identify complex threats that extend across the boundaries of cyber and physical security. read more