MenuMENU
SearchSEARCH

Reynolds Brings Security Operations Center Online

Says the new facility will boost Proton Dealership IT’s cyber-threat monitoring and response services.

October 30, 2023
Reynolds Brings Security Operations Center Online

'There is a big difference between what it means to be compliant with the rule and being secure,' says Reynolds Chief Information Security Officer of the FTC Safeguards Rule.

Credit:

IMAGE: Reynolds and Reynolds

2 min to read


The Reynolds and Reynolds Co. and Proton Dealership IT announced completion of a new security operations center at Reynolds’ headquarters in Dayton, Ohio. The center is operational and a substantial upgrade for constant monitoring of suspicious and malicious activity.

It's a component of Proton’s ongoing security monitoring and response activities for cyber-threats against dealerships across North America. The security hub combines the strength of both Reynolds and Proton to allow for higher-scale delivery of service expertise.

“This new operations center further demonstrates our commitment to being the best choice for automotive dealership cybersecurity,” said Reynolds and Reynolds President Chris Walsh.

On-site cybersecurity professionals analyze the cyber-space landscape, the tools and techniques criminals use, and the signals received by Proton’s tools. “This team will continuously monitor the security of Proton’s clients, defend them against security breaches, and actively isolate and mitigate security risks,” said Reynolds Chief Iinformation Security Officer Nikhil Kalani.

Dealerships can be lucrative targets for criminals, and cyberattacks continue to be a problem for them, despite updates to the Federal Trade Commission’s Safeguards Rule this year.

“There is a big difference between what it means to be compliant with the rule and being secure,” Kalani said. “The cybersecurity professionals in our new [center], and the tools they will have at their disposal, are dealers’ first line of defense.”

More information about how dealerships can protect themselves from cyber-threats, meet compliance requirements, and satisfy their IT needs can be found here.

More Digital

DigitalDecember 16, 2025

What to Do When Your Vendor Is Hacked

The quickest way to turn a breach into a crisis is to wing it. Follow this seven-step playbook to ensure you meet your obligations.

Read More →
Product & Technologyby Hannah MitchellNovember 25, 2025

AI-Guided Car-Shopping Insight

Consumers say they’re using the tech, but many still end up at dealerships to seal the deal.

Read More →
Digitalby Hannah MitchellOctober 29, 2025

Auto Dealers’ Take on AI

Study finds recognition of its usefulness, but franchisers are treading sometimes confusing waters carefully

Read More →
Ad Loading...
Digitalby Hannah MitchellSeptember 5, 2025

Cyber Threats Continue Apace

Hackers, seeing auto retail vulnerabilities in 2024 CDK incident, are taking advantage, data show.

Read More →

More Auto Retailers Would Benefit From Additional Cyber Defense

Despite a major 2024 cyberattack in the industry, many are still vulnerable.

Read More →
Digitalby Hannah MitchellJuly 17, 2025

OEM Sites Get Mixed Marks

Survey shows many don’t pass muster with efficiency-minded shoppers.

Read More →
Ad Loading...
Close-up of a person using a smartphone, holding it with one hand and tapping the screen with the other, wearing a white shirt with blurred outdoor background.
Industryby StaffJuly 17, 2025

Most Vehicle Sales Are Untraceable

Autotrader finds dealers miss key sales, waste ad budgets.

Read More →
Product & Technologyby StaffJune 25, 2025

More Dealers Offer Online Auto Buys

Cox study shows significant shift in post-pandemic years but still says there’s no one right way.

Read More →
Product & TechnologyJune 20, 2025

The Missing Ingredient With Today’s Digital Deal Jackets

Steps that many auto dealers haven’t yet taken boost data security and compliance while building consumer trust.

Read More →
Ad Loading...
DigitalJune 9, 2025

The Real ID Deadline

Challenges auto dealers may still face verifying identities

Read More →