sb-au logo
Story image

What organisations must demand from security technology in 2020

24 Feb 2020

Article by Wavelink (a Fortinet distributor) managing director Ilan Rubin.

Every year, the cybersecurity landscape continues to become more dangerous with attackers finding new and more sophisticated ways to breach even the most up-to-date security systems. The last decade has seen cybersecurity elevated from being the sole responsibility of the IT manager to becoming a key element of risk management for boards. The next decade will continue to see cybersecurity maintain its place as one of the most important business risk considerations for organisations of all sizes.

Innovation is essential for business survival but often brings security challenges with it. However, rather than slow down innovation to avoid security issues, organisations should ensure that security is built in to every aspect of their operations from the ground up, including new applications or business systems. And, as Australia for example, gears up for 5G networks, the same fast connectivity that facilitates business will also provide opportunities for cybercriminals to move faster.

Wavelink has identified five key capabilities organisations should demand from their cybersecurity solutions in 2020:

A broad approach

Gone are the days when organisations needed to choose best-of-breed point solutions to secure each individual aspect of the network. Instead, businesses need to choose a cybersecurity approach that protects the organisation from end to end. This includes cloud deployments, Internet of Things (IoT) networks, and geographically distributed network environments. Gaining full visibility into the entire network, regardless of architecture or location, is crucial to be able to protect it.

Automation

Cybercriminals are harnessing artificial intelligence (AI) and its subset, machine learning, to mount attacks faster and more successfully. Organisations simply can’t rely on manually managed cybersecurity solutions anymore. As attacks blitz organisations, the time it takes to discover and remediate an attack becomes longer, increasing the amount of damage that can be done. It’s therefore essential to use automated solutions that can combat these attacks as quickly as they’re mounted. This will help increase cyber resiliency.

SD-WAN protection

As more organisations adopt software-defined wide area networks (SD-WAN), which routes traffic not through private data centres but over public internet connections, the security implications are significant. SD-WAN networks aren’t inherently secure so it’s essential for organisations to add comprehensive network security when they deploy the SD-WAN.

Segmentation

One of the most common types of cyberattacks occurs when cybercriminals gain access to one part of the network, such as through a compromised email account, and then work their way through to the entire network. This is the equivalent of using one front door key to access an entire apartment building. Network segmentation can help avoid this situation by requiring users to have the right key for each segment of the network. This way, unauthorised access to one part of the network won’t give attackers access to the entire organisation.

Management and analytic tools

Not every organisation can afford the resources required to have maximum coverage. Therefore, it’s important to understand where to deploy finite security resources. Security solutions with management and analytic tools can provide more efficient administration, visibility, intelligence, and real-time insights so the security solution has less chance of being misconfigured or overly complex, while ensuring best use of available security resources.

Most organisations understand by now that it’s not a matter of if they’re attacked but when. Hardening the organisation’s security posture, maximising the use of existing resources, and improving the organisation’s cyber resiliency are crucial to avoid becoming a victim of a successful cyberattack. Organisations should seek help from knowledgeable security partners to determine the right approach for their needs.

Story image
Commvault launches Metallic in A/NZ region for first global expansion
The Australia and New Zealand region continues to be a priority market for Commvault, as cloud adoption across the region leads global averages, the company states.More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More
Link image
Gartner report: Why SD-WAN is becoming the de-facto option
Network service providers are increasingly challenged by established and new competition in the overlay SD-WAN management as well as in the underlay WAN transport, the report says.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More