31 . Mai 2017
Posts nach Autoren: Ivelina Koleva, Cyber security portfolio strategy lead at BT
Digital development brings about great opportunities — but it also ushers in an equal amount of risk. So here’s a look at the tools you’ll need to stay secure.
A risky future.
The cyber landscape becomes more perilous by the day. Nearly 12 million new malware variants are discovered each month — more than most current commodity security tools can cope with.
Meanwhile, the UK Government’s Cyber Security Breaches Survey 2017 found that almost seven in ten large businesses identified a breach or attack last year. What’s more, businesses holding electronic data about their customers were far more likely to be compromised than those that didn’t. Fifty-one percent of the former suffered a breach, compared to thirty-seven percent of the latter.
Yet, despite this risk, you want your organisation to make the most of what digital tools have to offer. You want your people to be able to work flexibly and efficiently using devices and the cloud. And you want your network infrastructure to benefit from the power and agility that digital innovation brings.
Our research with Ovum.
How do we know these things? Because we asked. Our latest research, performed in partnership with Ovum, gathered the thoughts and opinions of 270 decision makers in the financial, manufacturing and technology sectors. We asked them what concerns they had regarding security, and what steps they were taking to meet that challenge. Their answers were enlightening.
Sixty per cent of respondents said that their IT spend on security was set to increase. Meanwhile, two-thirds said they wanted their security to become more flexible and customised to fit the specific needs of their organisation.
The question then is, which security solutions offer answers to these problems?
Digital solutions to cyber problems.
Basic cyber security still focuses on the perimeter — watching who tries to gain entry to the network and blocking unauthorised parties. But this approach just won’t cut it in a modern threat environment, where the boundaries of enterprise networks are blurred by things like mobile/flexible working.
Forward-looking companies are thinking not only about how criminals can gain access to networks, but also what they do when they’re inside.
This approach is a step in the right direction, but to be truly secure against modern, innovative and often professional threat actors, you need to go a whole lot further.
Thankfully, there are actually a selection of options available to help you do this, so let’s take a look at a few that we think will have the most impact:
Security Information and Event Management as-a-Service (SIEMaaS).
Alone, security information and event management is a powerful tool for keeping an organisation secure. It’s a solution which creates a serious amount of actionable security data, but it’s a big investment in software and network infrastructure. SIEMaaS is a solution that allows you to make the most of SIEM, without the upfront outlay. Delivered from the cloud, it’s flexible, customisable and an easier investment — and it delivers the same results as SIEM.
With managed SIEM or SIEMaaS, you get all the benefits of the technology, while delegating the responsibility of management to an expert provider. This is advantageous to organisations that don’t have the resources, or time, to manage their security fully — but need to make sure they stay secure.
Advanced Security Analytics Services (ASAS).
Advanced Security Analytics Services involve the application of Big Data analytics skills and expertise to IT security monitoring and data sets. This includes services such as user/entity behaviour analysis, network-traffic analysis, predictive analytics, cognitive analytics, and anomaly detection in large data sets. This is exactly what you need when trying to deal with the huge (and growing) number of threats.
Integrated Threat Management Platforms.
Platforms that integrate two or more of the above capabilities — delivered either as a managed service or via design, build and transfer.
Create a security infrastructure that meets your needs.
No two companies are the same, but any organisation could benefit from the right mix of the above tools. In fact, according to our research, bundles of these services (in Integrated Threat Management Platforms) are set to account for nearly a third of the security market’s revenue by 2020.
These flexible, yet powerful solutions are key to meeting the challenge of a growing threat landscape. To find out how we can help you get on board, take a look at our Security Threat Monitoring page.