Frost and Sullivan (UK) - Experts & Thought Leaders
Latest Frost and Sullivan (UK) news & announcements
Absolute Security, a pioneer in enterprise cyber resilience, has launched its Rehydrate technology on general availability. Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents to automate the at-scale restoration of connected devices to a fully operational state, typically in 30 minutes or less—remotely and with a single click. Rapidly recover and maintain operations "Ransomware attacks, security breaches, and software failures are now a routine part of doing business. Resilient organisations are prepared for this new reality and have built-in the ability to rapidly recover and maintain operations without missing a beat when inevitable disruptions occur,” said John Herrema, Chief Product Officer, Absolute Security. “With Rehydrate, we're helping to make this possible by enabling companies to restore compromised endpoints within minutes, stopping downtime and eliminating costs that traditionally follow cyber incidents." Windows PCs through OEM partnerships Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware of more than 600 million Windows PCs through OEM partnerships with more than 28 of the world’s pioneering device manufacturers. This nearly ubiquitous availability makes it easy for customers to quickly deploy the platform across their Windows 10 and Windows 11 device fleets and activate Rehydrate to enable the immediate restoration of compromised devices at scale. Device OS and other security or management tools Absolute Security’s unique position in the firmware allows Rehydrate to restore affected devices even when the device OS and other security or management tools have crashed, been compromised, become corrupted, or made inaccessible due to a ransomware infection. Now generally available in the Absolute Secure Endpoint solution, Rehydrate delivers: Near instant business continuity endpoint restoration through a fully remote, single-click process. When the remote, mobile, and hybrid Windows PCs go down, recovery playbooks ranging from targeted remediations to full OS recovery can be executed across connected devices at enterprise scale. Absolute Resilience platform and Secure Endpoint product lines Seamless delivery, giving stretched IT and security teams a key that heals endpoints remotely Fast return to a secure and compliant state across device fleets. After the organisation has recovered from a disruption to its business, Rehydrate will automate the reinstallation of critical security controls, in minutes, helping to ensure that valuable and sensitive on-premises, cloud, and device data is defended against threats and protected against risk. Seamless delivery, giving stretched IT and security teams a solution that recovers endpoints remotely, rapidly, and at mass-scale to stop downtime. Full integration into the Absolute Resilience platform and Secure Endpoint product lines, including Absolute Secure Endpoint Resilience, Resilience for Automation, and Resilience for Security editions enables fast and easy deployment, direct from the Absolute Security management console. Modern security standards WiFi and Ethernet support abilities, making it easy for remote, hybrid, and mobile employees to connect WiFi and Ethernet support capabilities, making it easy for remote, hybrid, and mobile employees to connect their compromised devices for rapid restoration—eliminating the need to return devices to IT and security locations for repair. Strengthened device authentication, aligned with modern security standards, further secures the recovery process through integrated support for the Trusted Platform Module (TPM). Adopting solutions and strategies “Cybercrime and software failures cause disruptions that cost organisations more than a trillion dollars in losses annually,” said Jarad Carleton, Global Market Research Director for Cybersecurity, Frost & Sullivan. “CISOs are increasingly being called on to help ensure their organisations can achieve the level of resilience needed to quickly restore their operations before downtime creates a financial catastrophe. Forward-thinking pioneers are adopting solutions and strategies that prioritise operational continuity into every layer of their digital infrastructure—from the endpoint to the cloud.”
Sentrycs, a technology major in Protocol Manipulation-based counter-UAS solutions, has been named one of the top global innovators and growth leaders in Frost & Sullivan’s Frost Radar: UAS Communication Disruptors, 2025. This prestigious recognition highlights Sentrycs’ position at the forefront of the counter-drone industry and reflects its rapid growth, continuous innovation, and field-proven capabilities. Frost & Sullivan’s Frost Radar Frost & Sullivan’s Frost Radar identifies the world’s most impactful firms disrupting drone communications Frost & Sullivan’s Frost Radar identifies the world’s most impactful companies disrupting drone communications, benchmarking them based on their innovation strategies, growth performance, and ability to deliver real-world results. Sentrycs stood out in both Innovation and Growth indices for its unique approach to drone threat mitigation, robust global traction, and next-generation technology. Sentrycs’ advanced counter-drone solution According to the report, Sentrycs’ advanced counter-drone solution leverages Protocol Manipulation (often referred to as Cyber over RF) to detect, track, identify, and neutralise unauthorised Group 1 and Group 2 drones, including coordinated swarms and elusive DIY drones that evade traditional detection. Its technology enables authorities to mitigate threats with minimal collateral damage using features such as Smart Disconnect and safe, pre-programmed landings. Sentrycs HORIZON The launch of Sentrycs HORIZON in early 2025 further strengthened the company’s capabilities The launch of Sentrycs HORIZON in early 2025 further strengthened the company’s capabilities, introducing an AI-powered functionality that continuously analyses the radio-frequency environment and adapts to unknown signals in real-time without relying on pre-existing libraries. In addition to technological innovation, the company has demonstrated outstanding business performance, quadrupling its size in 2024 and securing major deals across 6 continents. Its recent deployments include the protection of military bases, national defense projects, and law enforcement operations, with an increasing footprint in over 20 countries worldwide. Smart, non-intrusive counter-drone technology “This recognition by Frost & Sullivan is a powerful validation of our mission to make the world safer through smarter, non-intrusive counter-drone technology,” said Jason Moore, CRO of Sentrycs, adding “As drone threats continue to evolve, we remain committed to delivering solutions that combine cutting-edge innovation with operational simplicity, reliability, and affordability.” “Sentrycs is one of the top companies in the counter-UAS space, firmly establishing itself as one of the pioneers for its cyber-RF capabilities.” noted Tobias Folatelli, Research Analyst at Frost & Sullivan. Sentrycs well-positioned for continued growth Folatelli further emphasised that Sentrycs is well-positioned for continued growth, with further expansion opportunities in emerging markets across Latin America and Asia, as well as in commercial and urban security applications. Its strategic partnerships with major defense contractors and ability to integrate with existing infrastructures further strengthen its position in the evolving counter-UAS ecosystem.
Infosecurity Europe, the most influential information security event, running from the 3-5 June 2025 at ExCeL has announced the introduction of new theatres as AI will be a key theme of the event, not only as a threat but also as a powerful catalyst for industry change. As artificial intelligence continues to transform both the attack landscape and internal security strategies, Infosecurity Europe 2025 will respond with a sharp focus on realigning priorities across the cybersecurity community. AI-generated attacks Generative AI has overtaken other concerns to become the top perceived risk among 28% of professionals According to Infosecurity Europe’s 2025 Cybersecurity Trends Report, AI-generated attacks are now the primary driver of cybersecurity investment. Generative AI has overtaken other concerns to become the top perceived risk among 28% of cybersecurity professionals. The impact of AI is far-reaching, with 78% saying it will force a complete overhaul of their security strategy, 71% believe it will increase automation across their organisation, and 80% report that AI is now a regular topic of discussion at board level. Strategies for securing AI and GenAI systems To reflect this growing urgency, Infosecurity Europe 2025 has introduced the new AI and cloud security theatre. This dedicated stage will explore AI-driven threat vectors such as deepfakes, automated phishing and LLM exploitation, alongside practical strategies for securing AI and GenAI systems themselves. It will also tackle persistent challenges in cloud security, from misconfigurations to identity management and API threats, within the context of an evolving AI-powered threat environment. Newly launched spaces The show’s AI coverage expands beyond the theatre into newly launched spaces across the exhibition Brad Maule-ffinch, Event Director at Infosecurity Europe, commented: “AI is fundamentally reshaping how we think about cyber risk, and how we plan for it. What we’re seeing this year is a community eager to move beyond awareness into action, to understand where the real risks are, what the opportunities might be and how to respond strategically.” The show’s AI coverage expands beyond the theatre into newly launched spaces across the exhibition. Among the most anticipated is the Channel Zone, a first-of-its-kind area dedicated to resellers, integrators, MSSPs and other channel players. How early adoption is boosting threat detection The Channel Zone keynote programme and workshops will offer insight into buying trends, AI-driven transformation, and the impact of emerging technologies on the channel ecosystem. It is designed to foster practical business conversations, deepen industry knowledge and equip attendees to better navigate a cloud and AI-dominated market. Don’t miss CISO Ian Thornton-Trump on Tuesday, 3 June at 13:30, to explore how AI is reshaping cybersecurity. Learn how early adoption is boosting threat detection, response times, and operational efficiency. Discover how MSSPs are building AI-driven roadmaps through real-world case studies. Destination for cyber professionals Infosec Hub will offer a destination for cyber experts focused on selecting and implementing solutions Further supporting decision-making on the show floor, the new Infosec Hub will offer a destination for cyber professionals focused on selecting and implementing solutions, with peer discussion groups and analyst drop-in clinics hosted by Forrester and Frost & Sullivan. The Hub is designed to give security pioneers space to evaluate choices with expert guidance. Access is available via upgraded Hub or Leaders’ badges. Key challenges in a vendor-free setting New Infosec Table Talks, a series of curated small-group conversations, will allow professionals to dive into key challenges in a vendor-free setting. Topics include securing the AI, identity management and real-world implementation issues, with every session designed to foster honest, actionable dialogue. Each lasts 30–45 minutes and can be reserved in advance. Strategic insight and guidance The show will feature a full programme of high-level roundtables and workshops, offering strategic insight and guidance for the security pioneers: Forrester roundtable: Paul McKay and Madelein van der Hout will explore the firm’s Top Ten Emerging Technologies for 2025, examining how they will impact cybersecurity strategy and investment. (Tuesday 3 June, 10.30 am) Frost & Sullivan roundtable: This interactive session will focus on empowering people as a first line of defence in a world of AI-generated threats. (Wednesday 4 June, 11.00 am) ECSO and NCSC roundtable: A comparative view of cybersecurity policy in the EU and UK, identifying where harmonisation and collaboration may be possible amid ongoing geopolitical shifts. (Wednesday 4 June, 2.00 pm) DSIT roundtable: A deep dive into how UK policy is driving secure software development, AI risk management, and IoT/OT resilience. This session will explore implementation challenges, compliance expectations, and the balance between innovation and responsibility. (Thursday 5 June, 10.30 am) Future outlook across security domains In addition, drop-in clinics throughout the week will give attendees the chance to speak directly with analysts about GRC challenges, human risk management and professional registration, while dedicated workshops from both Forrester and Frost & Sullivan will provide practical guidance on navigating spending priorities and understanding the future outlook across security domains. With over 300 exhibitors, a packed conference agenda and speakers from across government, industry and academia, Infosecurity Europe 2025 will offer critical insight, practical tools and a dynamic environment for the cybersecurity community to learn and grow together.
Insights & Opinions from thought leaders at Frost and Sullivan (UK)
Technology continues to transform the physical security industry, helping companies become more aware of the full spectrum of risks their organisation faces. Our new survey provides strong evidence that the use of these tools is solving some problems, but their implementation may create new challenges. In our 2022 State of Protective Intelligence Report, 93% of respondents said their company was actively adopting new threat intelligence, monitoring and alerting solutions for physical security, cybersecurity, human resources, legal and compliance, but they don’t have a comprehensive strategy for holistic data analysis and reporting. Companies are now receiving multiple streams of new intelligence and information without a way to make the information quickly actionable. Several negative impacts In short, teams responsible for physical security are nearing information overload. That finding was reinforced by another survey response. When we asked security, legal, and compliance professionals what they saw as their biggest challenges in 2022, 40% of respondents said their top concern is the problem of how to manage threat data, up from 32% in 2021. 40% of respondents said their top concern is the problem of how to manage threat data, up from 32% in 2021 The irony of this situation is that many of these tools replaced labour-intensive work (like physically going to the courthouse to pull files), making it possible for security professionals to get a better handle on the larger problems they face. Security teams that once suffered from a lack of information –– or time to get it –– now they are confronted by the opposite problem. This problem of information overload can cause several negative impacts. Physical threat volume First, there’s the potential for missed threats, even though the threat information is in your possession. If the information isn’t actionable, the security team can miss the proverbial needle in the haystack. In the survey, nearly three-quarters of respondents expect physical threat volume to increase in 2022, and 41% anticipate they will miss 51-100% of threats against their company or its employees. Real-time threats are going unnoticed in a stream of information that flows so quickly, analysts have little opportunity to connect the dots and make sense of it all. The second major impact of information overload is the roadblocks it creates, preventing the security team from working most effectively with other business units. The emerging class of technology tools collects threat information that can identify threats far beyond the security team, but the information collected is only useful if it can clearly articulate the scope and scale of the identified threats. Tracking threat information All systems are gathering information to understand what is or isn’t a threat" While the physical security team is usually tracking threat information most closely, other teams in the organisation also depend on receiving the same timely and accurate information to accomplish business-critical objectives. Without tools that can process and analyse data from all units holistically, information is likely to remain siloed within various business divisions, even though the HR, legal, compliance or cybersecurity teams may have just as much need to understand the threats as the unit that collected the data. “All systems are gathering information to understand what is or isn’t a threat,” said Danielle VanZandt, Security Industry Analyst at Frost & Sullivan. But, as she pointed out at the recently held Ontic Summit, this can be an issue if different areas of an organisation don’t share a common understanding about the threats they have individually identified. ‘It’s like when everyone touches parts of an elephant and is then asked ‘what does the elephant feel like?’ Threat data management Without a common understanding of the threat picture, each team may have very different answers, but VanZandt says using technology to promote information sharing and threat data management can help bridge this gap. Here’s an example: An overwhelming majority of organisations report that they have policies in place to notify security, human resources, and the legal department when an employee is terminated. 86% of respondents said violence or harm has occurred in the past year when an employee was furloughed However, those policies aren’t consistently applied, making it more likely that a potential threat actor could cause actual damages. According to our survey, 86% of respondents said violence or harm has occurred in the past year when an employee was furloughed or fired because their organisation does not consistently notify physical security, legal, or human resources, nor are they present when the dismissal takes place. Mitigating potential threats When all company units who are attempting to prevent problems can share a common understanding of potential threats, many of the most common problems can be addressed and mitigated before they occur. Improved coordination and information sharing also ensures all appropriate information can be used in decision making. In the case of an employee termination, most decisions are weeks or months in the making. Ensuring that security, legal, and human resources are sharing appropriate information as quickly as possible can help to create an effective plan to monitor the progress of an employee who is struggling, or prevent damage at the time of termination. While technology cannot solve all of these problems, technology tools can provide a confidential means to share appropriate information with the individuals or business units who need to know, ensuring everyone involved has access to the most updated and relevant details to understand and mitigate potential threats. Effective management of threat data, whatever the source, requires appropriate tools to foster effective analysis. Promoting holistic data management practices throughout the organisation will ensure these tools are used most effectively without causing further information overload.
Artificial Intelligence in Security
DownloadElevating security through multi-sensing solutions and large-scale AI
DownloadOpen credential standards and the impact on physical access control
DownloadCombining security and networking technologies for a unified solution
DownloadWhat is a universal RFID reader?
Download