SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Aryaka unveils new Cyber Threat Research Lab

10 Jan 2025

Aryaka unveils new Cyber Threat Research Lab
Contact company
Contact Aryaka Networks
icon Add as a preferred source Download PDF version
Related Links
  • Frank Koelmel appointed CRO at Logpoint, boosting growth
  • Post-quantum cryptography 2025: DigiCert predictions
  • Auguria enhances platform with key security integrations
  • Endpoint security insights from AV-Comparatives' EPR test

Aryaka®, the pioneer in Unified SASE as a Service announced new personnel and programme investments in its commitment to delivering performance, agility, simplicity, and security across customers' global networks. The company has promoted Vidyaranya Maddi to Chief Customer Officer and hired Scott Fanning, formerly of Palo Alto Networks, as VP of Security Product Management.

Aryaka also announced the launch of the Aryaka Cyber Threat Research Lab (CTRL), a proactive research centre committed to the identification, analysis, and mitigation of emergent network security risks and threats. 

Maddi to head customer success teams

A Gartner Peer Insights rating of 4.7 out of 5, exemplifying Aryaka’s reputation as an industry pioneer

Vidyaranya Maddi, a pioneer at Aryaka for over 12 years, has been named Chief Customer Officer. Over the past decade, Maddi has spearheaded Aryaka’s global delivery and support functions, transforming customers’ networks and network security. His efforts have contributed to an average customer tenure of over eight years and a Gartner Peer Insights rating of 4.7 out of 5, exemplifying Aryaka’s reputation as an industry pioneer.

In his expanded role, Maddi will oversee the entire customer success function, team, and experience, ensuring seamless interactions and value delivery across all touchpoints.

Customer Success Management (CSM) function

“Delivering outstanding service to our customers has always been at the heart of Aryaka’s mission,” said Maddi.

“Over the years, I’ve seen our customer-first culture and innovative solution offerings create meaningful impact for our customers. My focus now is to further enhance our Customer Success Management (CSM) function, ensuring we anticipate and meet customer needs throughout their entire secure networking journey.”

Customer-centric culture

"Today marks a significant step forward in Aryaka's journey to deliver secure, dependable, and performant applications,” said Shailesh Shukla, CEO, of  Aryaka.

“Maddi's promotion to Chief Customer Officer underscores Aryaka’s dedication to fostering a customer-centric culture and delivering superior value to our global customers.”

Fanning to drive product advancement

Scott Fanning will join the team to accelerate the advancement of Aryaka’s Unified SASE as a Service

A seasoned cybersecurity pioneer with over 25 years of experience, Scott Fanning will join the team to accelerate the advancement of Aryaka’s Unified SASE as a Service, leveraging Aryaka's OnePass architecture to offer unique and differentiated ways to address ever-expanding threats and new attack surfaces introduced with the AI adoption.

Fanning brings first-hand experience in pioneering innovative approaches to solving new security problems. Fanning joins Aryaka from Palo Alto Networks, where he led the team for Cloud-Delivered Security Services.

Scott's work experience

Before that, he was the first Head of Product for cloud security at CrowdStrike, where he delivered their pioneering Cloud Native Application Protection Platform (CNAPP).

His career also includes managing cybersecurity products and services for Citrix and McAfee, and more than a decade at Cisco in various security engineering and product management roles.

SASE as a Service Platform

“The security landscape is evolving rapidly, with adversaries leveraging AI to exploit gaps in enterprise defences,” said Fanning.

“Aryaka’s Unified SASE as a Service Platform delivers unparalleled observability, consolidating siloed tools to close these gaps and protect customers from advanced threats. I am thrilled to join this talented team to help our customers worldwide stay ahead of adversaries by empowering them with innovative, pioneering-edge security solutions.”

Aryaka CTRL ensures the advancement of Unified SASE

CTRL will ensure Aryaka’s solutions continue to deliver state-of-the-art defences against advanced threats

Under the leadership of Aditya Sood, VP of Security Engineering and AI Strategy and author of the newly released Combating Cyberattacks Targeting the AI Ecosystem, the Aryaka CTRL team will conduct proactive research to analyse data and stay ahead of the latest threats.

By prioritising real-world threat evaluations and collaborating with industry threat research groups, CTRL will ensure Aryaka’s solutions continue to deliver state-of-the-art defences against advanced threats. 

Built-in network layer controls

“The launch of Aryaka CTRL underscores Aryaka’s commitment to providing effective and actionable defences to our customers, already delivered through built-in network layer controls embedded in our OnePASS architecture,” said Renuka Nadkarni, Chief Product Officer, Aryaka.

“Proactive research and threat intelligence by CTRL and adding Scott's deep expertise to the team will continue to fuel Unified SASE as a Service innovation to deliver unparalleled protection against evolving cyberattacks, including ones targeting GenAI implementations.”

Leveraging AI

“This announcement underscores our investment and dedication to ensuring our solutions remain at the forefront of secure networking in the emerging AI era,” Shukla added.

“These strategic moves reinforce Aryaka's position as the pioneer in Unified SASE as a Service and empower us to deliver the most secure, agile, and customer-centric solutions on the market.”

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Security monitoring system
  • Network cameras
  • Integration software
  • Cyber security
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • Related links
  • Control Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Related categories
  • CCTV software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

Aryaka launches Cyber Threat Research Lab to enhance network security and mitigate emerging threats, solidifying its leadership in Unified SASE as a Service. Discover cutting-edge proactive defences for global networks.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec