Making Better Informed Management Decisions

Ravishankar N, CTO, Spectranet | Thursday, 19 October 2017, 06:29 IST

  •  No Image

With the exponential increase in the devices as well as applications, the threat surface area for an organization has expanded beyond traditional means. Being protected with the UTM (Unified Threat Management), helps handle large volumes in terms of infrastructure; whether it is the hardware or software compute. Most importantly, it identifies the rogue users. Normally, businesses deploy SIEM, an approach to the security management that aims to facilitate a complete integrated view of an organization's IT security. But, all this depends on how much an organization is willing to invest its resources in IT security as per the company’s requirement. The SME’s would have a different requirement and budget as compared to how much large enterprises are willing to invest.

Security in the Cloud Era

Obviously, the term cloud is a broad segment, unless specified as private, it will automatically be assumed as a public network. The concept of sharing is very rare. Once the concept of sharing is accepted, then the concept of virtualization comes in. The next step is to identify your border between an X and Y organization on the same compute. Every OEM is facing this hurdle where their adversaries might be sharing the same space in the cloud. If one closely studies the agreements furnished by cloud providers, it clearly states that they will not be held liable for any information that is compromised. The Cloud providers will address your queries to some extent, beyond which is a grey area.

Leveraging Correlation Engine's Potential for Ensuring Security

At present, the organizations are using data analytics more across the board as a part of their security strategy. There is something called the correlation engine which is extensively used along with analytics. This correlation engine can be utilized to identify the hackers who are trying to attack enterprise networks and acquire sensitive data. This is achieved via system management tools to aggregate and analyze log data using predictive analytics. Shielding data network from the attackers, involves nipping the threat in the bud. This engine assists in identifying the exact location from where the threat is emanating from. So in principle, it basically connects every event and log, and detects the possibility of potential threats at its early stage. The Analytics is possible if one has a lot of data into a network.

Staying Abreast of Advanced Security Measures

It is an undeniable fact that certain things have become a necessity. In my previous organization, I was instrumental in setting up an entire security operations center. As we become bigger, we need to become more cognizant of these things. Yet, if one still chooses to ignore and remain oblivious to the digital transformation, you will be doing it at your own peril. When it comes to the trends, I agree that most organizations are cognizant of the fact that data is one thing which a natural resource that can assist in competing against rivals in the market and should ensure it does not end up in the wrong hands. The organizations have begun assuring things are in place like EDR (Endpoint Detection & Response) and are even trying to put up a security operations center. If the company budget permits, one can put in a correlation engine and so on.

The two reasons why organizations are most likely not to adopt these technologies is due to affordability and the lack of awareness. Once the CIO or CTO is fully aware, it is his primary job to plug all these known issues. Gradually, companies have begun investing in the security, which used to get allotted a minuscule amount during the former years. Today, at least five to seven percent of the spending budget, is going for either deploying your endpoint system, putting up a firewall, doing an intrusion detection system or a prevention system.

With electronic devices becoming ubiquitous, everyone has a handheld gadget along with confidential information that they cannot afford to land in the wrong hands. Thus, businesses allocating funds to protect their assets is trending and on the rise.

CIO Viewpoint

The Transition To Cloud Technology

By T.G. Dhandapani, Ex-CIO, TVS Motor

Making Better Informed Management Decisions

By Ravishankar N, CTO, Spectranet

CXO Insights

Tech Landscape of In-Cabin Experiences and...

By Sanjay Saha, India Country Manager, Synaptics

3 Focus Areas For An Autonomous Driving Revolution

By Varun Chhabra, Vice President, Product Marketing Cloud, Dell Technologies

The Electrified Car Industry Must Reimagine its...

By Tom Leeson, Senior Industry Strategist, Manufacturing & Supply Chain, OpenText