Download PDF version Contact company

Ava Group a provider of risk management services and technologies, announces that an Ava Group Company solution has been selected to protect a major military closed data network from the threat of tampering and tapping. The project to deploy its fiber optic intrusion detection and location solution is valued at around US $11M and asserts Ava Group’s status as a pioneer in data network protection.

Ava Group Chief Executive Officer, Chris Fergus states: “We are proud that the Future Fiber Technologies (FFT) solution has been selected through a rigorous competitive tender, to deliver the very highest levels of protection to a closed data fiber optic network.”

Asset owners can be potentially exposed to the threat of state-on-state action, terrorism and industrial espionage, as well as incident without motive

Closed Fiber Network

The principal task of this project supports The Ministry of Defense in India, who has the responsibility to protect its closed user group data network which is one of the largest in the world and used by more than one million military personnel.

Any data network is as strong as its weakest link. Government departments, intelligence services, military organizations, financial organizations, nuclear facilities and commercial businesses with valuable intellectual property will have stringent measures in place to mitigate physical and cybersecurity threats yet are often oblivious to the danger of leaving even a closed fiber network unprotected. As such, the asset owners can be potentially exposed to the threat of state-on-state action, terrorism and industrial espionage, as well as incident without motive.

Introducing Additional Vulnerabilities

With low-cost readily available technology that requires little expertise, it is possible for an agenda-driven individual, or state-sponsored actor to tap and infiltrate a network at the fiber optic level and harvest data, without raising the alarm, or leaving an evidence trail. Chris Fergus, Ava Group CEO comments: “Any data breach is of grave concern, but those that pass undetected raise the stakes significantly. What’s more, in some instances fiber networks run across vast distances, meaning there could be tens of thousands of potential entry points for attack.”

Unlike the widely used data encryption and protection schemes used to protect data in transit, Ava Group’s solution does not involve manipulation or processing of the data streams, thus avoiding third-party access to the data and therefore introducing additional vulnerabilities. Furthermore, processing or encryption of the data has a significant detrimental impact on bandwidth and latency, thus negating a major benefit of using fiber networks.

Ava Group expects additional revenue from spares and support for seven years after the initial three-year warranty period

Globally-Recognized Cybersecurity Standards

Kevin Berry, Ava Group’s Head of Information Security explains: “The FFT solution does not see or process the data, cannot access it and there is no requirement for encryption. Consequently, the network infrastructure is fully protected at every point and crucially performance is unaffected. Another major benefit of the FFT solution is that deployment is completed with zero network downtime and can be rolled out across live infrastructure utilising dark fibres.”

A further reason for organizations to choose Ava Group company solutions is the recent launch of its Global Cybersecurity Centre of Excellence (CCoE). The initiative provides all customers with expert guidance and assurance that the products deployed on their data networks meet globally-recognized cybersecurity standards. The project is expected to be delivered in phases over a 15-month period, with the FFT solution beginning to strengthen the network from day-one of the installation. Ava Group expects additional revenue from spares and support for seven years after the initial three-year warranty period.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...