The Emancipator from Cyber-threats: Gallagher

The Emancipator from Cyber-threats: Gallagher

By Gov CIO Outlook | Wednesday, June 19, 2019

Steve Bell, CTO, Security

With the abundance of data scattered all over the web, it is gradually getting difficult to keep track and safeguard it at the same time. Security Health Check (SHC) tool helps customers to identify aberrations in their security system so that they can revamp safety protocols associated with their data.

FREMONT, CA: A cybersecurity auditing tool that offers free customer access has been introduced by Gallagher. Gallagher’s Security Health Check (SHC) tool has been designed to assist the customers in recognizing and comprehending potential weak-points within their security system.

The customers can deploy the SHC utility tool to run a programmed check through their Gallagher Command Centre system at the time of their choosing, reducing expense and time of performing standard manual audits. SHC recognizes system vulnerabilities, evaluates the sternness of the threat, and supplies specific suggestions to alleviate the risk and ensure accurate system configuration. It also provides a device to compare against previous audit results to enable organizations to track progress over time and better devise system upgrades.

Gallagher dedicates considerable resources to the examination and progress of cyber-secure solutions and has an obligation to aiding customers to get full visibility and a more in-depth perception of how their security system operates.

 “We designed Security Health Check to give sites ownership of the state of their system,” says Steve Bell, Chief Technology Officer (CTO) at Gallagher. “Security risks and system vulnerabilities aren’t static; it’s important for us to promote and support a culture of ongoing improvement within our industry.”

SHC proactively deals with the ever-evolving menace of cyber-attack, while supporting sites to safeguard the data held within their access control system. “Security systems can be vulnerable to cyber-attacks for a variety of reasons, and the consequences can be significant,” says Bell. “A cyber breach via security systems can potentially allow access to personal data, restricted areas, and intellectual property; it could also lead to unauthorized control over HVAC, lighting and building systems to disrupt operations.”

Gallagher considers that in this contemporary world of evolving threats, it is no longer adequate to supply the tools. Gallagher anticipates inspiring the security sector to become more transparent with its clientele and empower them to recognize their weaknesses better.

Weekly Brief

New Editions