Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Hybrid physical-cyber security threats drive supplier integration

“The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the dots across both domains.”

by Tony Morbin
September 8, 2020
in AI and Machine Learning, Featured, Network Security
Hybrid physical-cyber security threats drive supplier integration
Share on FacebookShare on Twitter

As the cyber and physical worlds collide and interact, so the defences in each are now integrating with an example this month being the merger between Jazz Networks, a cybersecurity insider threat detection and response company, and Vaion, an end-to-end video security provider to form Ava Security.

Tormod Ree, CEO of Ava Security commented: “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the dots across both domains.”

Many of the threats faced come from inside an organisation, with both deliberate actions and errors by staff.  A recent Ponemon “Cost of Insider Threats: Global Report” says that the average cost of an insider risk incident is US$307,111, If it involves a negligent employee or contractor. This average cost almost triples to US$871,686  if it involves an imposter or thief who steals/leaks credentials.

Nick Maxwell, Ava GM UK/MEA, notes that, “It doesn’t just stop there, there is a need to be able to mitigate against hybrid attacks. More and more organisations are trying to address this gap within their risk/resilience/CISO/CSO – it’s been acknowledged that there is a gap in the security posture where physical and cyberattacks need to be correlated, with a single unified approach.”

After winning the US Cyber Command Competition in 2019, Ava has grown significantly and plans to foster further research and development. Its integrated cyber and video solution allows for separate analysis of data from all users, cameras, and servers. It combines a human-centric cyber solution (formerly by Jazz Networks)  with an end-to-end video solution (formerly by Vaion).  The cyber aspect employs a combination of policy, education and machine learning sensors to prevent IP theft and sabotage, improve cyber hygiene, and accelerate threat hunting. The proactive video security solution provides insight including integrated video and audio analytics driven by machine learning algorithms, intuitive installation processes, and a range of smart cameras.

Martin Whittle, co-founder of partner company Ethos Technology in the UK describes the Ava Insider threat solution as a “perfect tool to protect your business, from compliance to company policy enforcement,” adding: “This isn’t just an issue for Law firms. As we all concentrate on an external threat breaching our infrastructure, we lose focus on internal threats from error or malicious behaviour that still needs to be detected and protected against.”

As companies move toward a hybrid workforce structure with employees splitting time between working in-office and remote, organisations must reassess processes to keep IT staff from burning out, while at the same time efficiently managing distributed systems and assets. “You can’t build firewalls around remote employees, businesses must empower and educate staff to make the right choices,” said Ree.

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

People who have WOWED us over 25 years: Phil Lieberman

Next Post

Pakistan’s largest private power company targeted by Netwalker ransomware attack

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information