Insights > Blog

Prosegur Integrated Solutions Event Recap

Last week, the Prosegur USA team held the first-ever Prosegur Integrated Solutions event in the USA. Click the image above to watch a video recap.

Customers from all over the world came to connect and learn. The event kicked off with a session on best practices led by top customer like Maersk, Saks Fifth Avenue and Macy’s.

After the presentations, guests entered the experience center. Each guest visited booths for exciting cutting-edge tech. These included drones, advanced video detection, dynamic guarding, risks advisory and cyber security.

Cipher Global Chief Security Officer Scott Croskey presented on cybersecurity threats and solutions. “It seems that nearly every day, you hear about yet another cybersecurity breach. Various Government organizations being hit with ransomware. Even a New Zealand-based airport recently had their security camera’s hacked earlier this year. The unfortunate reality is that there is a 28% chance of your business being hacked in the next 24 months. As a result, businesses of all shapes and sizes have found themselves in a race to protect their brand and ensure consumer confidence.”

Scott went on to talk about how Cipher can help. “CipherBox is Cipher’s Managed Detection and Response solution allowing organizations to quickly add 24/7 all-inclusive SOC-as-a-Service capabilities. CipherBox provides cybersecurity experts, highly certified processes and state-of-the-art technology combined with Artificial Intelligence, Threat Intelligence and Cyber Intelligence to secure your business.”

“We are proud to also highlight the Cipher YellowBox. YellowBox adds an additional layer of protection to your network and compliments CipherBox. YellowBox is specifically designed to protect your network by actively blocking cyber threats. Cipher Labs take this technology one step further and tailor it to protect your IoT and ESS devices,” he continued.

Learn more about CipherBox and secure your operations.

Did you enjoy this blog article? Comment below with your feedback.


Submit a Comment

Your email address will not be published. Required fields are marked *


Information Security Maturity Self-Assessment Survey

Learn More

•  Whitepapers
•  E-books
•  Checklists
•  Self-Assessments
•  Webcasts
•  Infographics