Userful enhances cyber security operations centres using software approach

Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security.

The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office.

Real-time visibility

It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.

A typical cyber security operations centre resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident.

Userful’s software helps in managing operations centres

Userful’s software manages how data is presented in an operations centre environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure.

Managing operations centres is a core offering for Userful Corporation, including command centres of all types, from traditional network operation centres to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems.

Solutions that are easy to deploy, manage and scale

Cyber security professionals need solutions that are easy to deploy, manage and scale”

We are a platform that can be utilised across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.

Compiling and displaying information to an operations centre has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks.

The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems.

Security Orchestration, Automation and Response (SOAR)

Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure.

SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses.

Cyber security threats

Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualised. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently.

The software-as-a-service system ensures that all software is updated and can operate on the latest hardware

In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity.

Single platform/solution

The single platform/solution also extends beyond operations centres to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth.

In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software.

The software-as-a-service system ensures that all software is updated and can operate on the latest hardware.
Companies always have an ecosystem of interconnectivity

Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organisation.

Dangers of random hardware on a network

Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats.

Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centres that involve three or four manufacturers, all siloed.

Software versus hardware

Our biggest challenge is to get people to understand what is possible with software versus hardware”

Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.

Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input.

Corporate policy specifies security at every level

Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards.

To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).

Leave a Reply

Your email address will not be published.