Welcome!

Related Topics: SYS-CON MEDIA, Cloud Security

SYS-CON MEDIA: Blog Post

Agiliance Offers Context-Aware, Scalable Risk Management Infrastructure

Interview with Torsten George, Vice President Worldwide Marketing and Products, Agiliance Inc.

Thanks for taking the time to answer my questions. Please tell us, what is Agiliance all about and what do you do?

Torsten George: Cyber-attacks, insider threats, monetary fraud, and data breaches - affecting some of the world's most renowned organizations - make headlines every day. At the same time, the worst economic downturn since the 1930s has focused intense attention on inadequate risk management and the effectiveness of governance practices. The key to addressing these complex, interlocking problems is implementing a context-aware, scalable risk management infrastructure that makes risk visible, measurable, and actionable across financial, operational, and security domains.

That's where Agiliance® comes into play. We're known as the Big Data Risk CompanyTM and leading independent provider of integrated solutions for operational and security risk programs. Our mission is to help organizations to unlock and use their knowledge of risk to optimize business investments and performance.

As the pioneer of the Big Data Risk Management category, we're disrupting the established practice of performing risk management as continuous consulting, replacing it with continuous, automated software-based monitoring.

What are you launching at RSA?

George: Agiliance is launching RiskVisionTM 7, which redefines the management of enterprise and supplier risk, regulatory compliance, security, and incidents using a big data-driven model. RiskVision 7 performs near real time analysis of petabytes of governance and security risk data to accelerate incident response actions, identify cross-domain threats, automate process change, speed user productivity, scale operational efficiency, and ultimately assess risk based on business impact.

Organizations are operating in a dynamically changing risk ecosystem, which is characterized by mushrooming government regulations (e.g., UK FSA, Singapore MAS) that scrutinize inadequate, assessment-based risk management and governance practices, as well as new cyber-attack vectors such as bring-your-own-devices (BYOD) and an organization's supply chain. As a result, it has become imperative to strategically align datacenter operations, cloud operations, and supplier services with accurate risk prioritization, remediation, and audit reporting.

RiskVision 7 addresses these market requirements by enabling continuous diagnostics and remediation on more than one million assets and correlating threats, vulnerabilities, controls testing, and policies for near real-time risk management. It is also the only commercial integrated risk management system in production for enterprise and supplier incident response with a ten-thousand practitioner deployment.

Who is your target audience and how do you intend to reach them?

George: Agiliance's priority target segments are Global 2,000 companies and government agencies in North America, Europe, Singapore, and Australia. These organizations face complex threats and compliance requirements, have mature security defenses, and typically have implemented failed silo-based departmental approaches to risk management. Target buyers for Agiliance solutions are the Chief Information Security Officer, or their superior, normally the Chief Information Officer or Chief Risk Officer.

I'd be curious to hear any general thoughts you have on market trends...

George: For 2014 we predict five major trends: #1 Organizations will finally transition away from a compliance, check-box mentality and adapt a risk-based, pro-active approach. This trend is primarily driven by the realization that you can schedule an audit, but you cannot schedule a cyber security attack. Furthermore, we are foreseeing as the #2 trend that legislation and industry standards will shift their focus from providing mandates for preventive measures to risk awareness and remediation response. Early examples in this context are MAS, OCC Guidance, and PCI DSS 3.0. For instance, introducing set response times in Singapore MAS is challenging  organizations to change their culture. #3 We foresee that threats will finally be recognized as one of the main factors that determine risk. In support of the adoption of threat modeling and intelligence feeds, standards such as VERIS and STIX will emerge. Confirmation for this trend can be seen by the growing number of threat intelligence feed vendors; notably four out of the ten RSA Sandbox Innovation Awards finalists are tied to threat intelligence. #4 Based on the uptick in cyber-attacks targeting the supply chain, we predict that vendor risk management will completely change. The days where end user organizations relied on vendor risk assessments via questionnaires are coming to an end. Instead end user organizations will turn the table on their suppliers and in case of software vendors require an independent accreditation certification before allowing the technology to be deployed in the enterprise. And last, but not least we anticipate 2014 to be the break-through year for Managed Security Services. This is simply based on the fact that the data volume, velocity, variety, and complexity is overwhelming many organizations. Thus, outsourcing of threat diagnostics and remediation responses will be highly accepted service.

What is the viral aspect of your product?

George: It's only February and we've already experienced several massive data breaches at Target and Neiman Marcus. Any time that there is a data breach intense attention is being put on inadequate risk management and the effectiveness of governance practices, offering Agiliance ways to provide public commentary and then take these media clips viral.

What's the business model? How will you make money?

George: Agiliance's business model is best described as Managing Risk-as-a-ServiceTM (M-RaaS). The RiskVision solution is delivered by a broad range of organizations, both on-demand and on-premise, across a mix of physical and virtual environments. This flexibility allows customers to purchase according to their organizational maturity and scale; allowing them to extend usage as their maturity increases.

RiskVision pricing is based on number of applications, connectors, and managed assets. The platform and the majority of content are covered by annual subscriptions. Pricing starts at $25,000 per application per year with cumulative volume discounts for all applications, connectors, and managed assets purchased.

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...