Click here to close now.




















Welcome!

Related Topics: SYS-CON MEDIA, Cloud Security

SYS-CON MEDIA: Blog Post

Agiliance Offers Context-Aware, Scalable Risk Management Infrastructure

Interview with Torsten George, Vice President Worldwide Marketing and Products, Agiliance Inc.

Thanks for taking the time to answer my questions. Please tell us, what is Agiliance all about and what do you do?

Torsten George: Cyber-attacks, insider threats, monetary fraud, and data breaches - affecting some of the world's most renowned organizations - make headlines every day. At the same time, the worst economic downturn since the 1930s has focused intense attention on inadequate risk management and the effectiveness of governance practices. The key to addressing these complex, interlocking problems is implementing a context-aware, scalable risk management infrastructure that makes risk visible, measurable, and actionable across financial, operational, and security domains.

That's where Agiliance® comes into play. We're known as the Big Data Risk CompanyTM and leading independent provider of integrated solutions for operational and security risk programs. Our mission is to help organizations to unlock and use their knowledge of risk to optimize business investments and performance.

As the pioneer of the Big Data Risk Management category, we're disrupting the established practice of performing risk management as continuous consulting, replacing it with continuous, automated software-based monitoring.

What are you launching at RSA?

George: Agiliance is launching RiskVisionTM 7, which redefines the management of enterprise and supplier risk, regulatory compliance, security, and incidents using a big data-driven model. RiskVision 7 performs near real time analysis of petabytes of governance and security risk data to accelerate incident response actions, identify cross-domain threats, automate process change, speed user productivity, scale operational efficiency, and ultimately assess risk based on business impact.

Organizations are operating in a dynamically changing risk ecosystem, which is characterized by mushrooming government regulations (e.g., UK FSA, Singapore MAS) that scrutinize inadequate, assessment-based risk management and governance practices, as well as new cyber-attack vectors such as bring-your-own-devices (BYOD) and an organization's supply chain. As a result, it has become imperative to strategically align datacenter operations, cloud operations, and supplier services with accurate risk prioritization, remediation, and audit reporting.

RiskVision 7 addresses these market requirements by enabling continuous diagnostics and remediation on more than one million assets and correlating threats, vulnerabilities, controls testing, and policies for near real-time risk management. It is also the only commercial integrated risk management system in production for enterprise and supplier incident response with a ten-thousand practitioner deployment.

Who is your target audience and how do you intend to reach them?

George: Agiliance's priority target segments are Global 2,000 companies and government agencies in North America, Europe, Singapore, and Australia. These organizations face complex threats and compliance requirements, have mature security defenses, and typically have implemented failed silo-based departmental approaches to risk management. Target buyers for Agiliance solutions are the Chief Information Security Officer, or their superior, normally the Chief Information Officer or Chief Risk Officer.

I'd be curious to hear any general thoughts you have on market trends...

George: For 2014 we predict five major trends: #1 Organizations will finally transition away from a compliance, check-box mentality and adapt a risk-based, pro-active approach. This trend is primarily driven by the realization that you can schedule an audit, but you cannot schedule a cyber security attack. Furthermore, we are foreseeing as the #2 trend that legislation and industry standards will shift their focus from providing mandates for preventive measures to risk awareness and remediation response. Early examples in this context are MAS, OCC Guidance, and PCI DSS 3.0. For instance, introducing set response times in Singapore MAS is challenging  organizations to change their culture. #3 We foresee that threats will finally be recognized as one of the main factors that determine risk. In support of the adoption of threat modeling and intelligence feeds, standards such as VERIS and STIX will emerge. Confirmation for this trend can be seen by the growing number of threat intelligence feed vendors; notably four out of the ten RSA Sandbox Innovation Awards finalists are tied to threat intelligence. #4 Based on the uptick in cyber-attacks targeting the supply chain, we predict that vendor risk management will completely change. The days where end user organizations relied on vendor risk assessments via questionnaires are coming to an end. Instead end user organizations will turn the table on their suppliers and in case of software vendors require an independent accreditation certification before allowing the technology to be deployed in the enterprise. And last, but not least we anticipate 2014 to be the break-through year for Managed Security Services. This is simply based on the fact that the data volume, velocity, variety, and complexity is overwhelming many organizations. Thus, outsourcing of threat diagnostics and remediation responses will be highly accepted service.

What is the viral aspect of your product?

George: It's only February and we've already experienced several massive data breaches at Target and Neiman Marcus. Any time that there is a data breach intense attention is being put on inadequate risk management and the effectiveness of governance practices, offering Agiliance ways to provide public commentary and then take these media clips viral.

What's the business model? How will you make money?

George: Agiliance's business model is best described as Managing Risk-as-a-ServiceTM (M-RaaS). The RiskVision solution is delivered by a broad range of organizations, both on-demand and on-premise, across a mix of physical and virtual environments. This flexibility allows customers to purchase according to their organizational maturity and scale; allowing them to extend usage as their maturity increases.

RiskVision pricing is based on number of applications, connectors, and managed assets. The platform and the majority of content are covered by annual subscriptions. Pricing starts at $25,000 per application per year with cumulative volume discounts for all applications, connectors, and managed assets purchased.

More Stories By Xenia von Wedel

Xenia von Wedel, Tech blogger and PR Consultant in Mountain View. She mainly writes about B2B solutions, social media and open source software. She is an SVP with a full-service PR agency, serving clients in a variety of industries worldwide. The agency is focused on thought leadership content creation and syndication, media outreach and strategy. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
Palerra, the cloud security automation company, announced enhanced support for Amazon AWS, allowing IT security and DevOps teams to automate activity and configuration monitoring, anomaly detection, and orchestrated remediation, thereby meeting compliance mandates within complex infrastructure deployments. "Monitoring and threat detection for AWS is a non-trivial task. While Amazon's flexible environment facilitates successful DevOps implementations, it adds another layer, which can become a ...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducte...