Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Top IT trends to watch in 2016: cybersecurity

Matt Gyde, Dimension Data’s Group Executive – Security Business Unit | Jan. 12, 2016
The complexity of the new digital environment is informing some radical new approaches when it comes to security in 2016. Matt Gyde of Dimension Data tells us more.

Some of our clients are already talking to us about leveraging a system where devices or endpoints can evaluate and 'rank' local applications according to a perceived level of risk. We're really moving away from a signature-based identity model to a proactive approach - where you can verify the 'intentions' of an application before allowing it to be downloaded.

For security professionals, the caution is: the critical applications and workloads you need to protect may not be on the network anymore. You won't understand the masses of data traversing your environment in the digital era without intelligence.

Trend 4: Intelligence takes on a defensive stance - keep your eye on the target
Intelligence can't be separated from any security initiative as we move into the next 12 months. With better intelligence, you can get smarter about security - taking a proactive rather than a reactive stance.

All too often,businesses fall victim to malicious attacks because those monitoring and control systems in place provide them with too little information, too late. These traditional approaches of gathering intelligence tend to put you on the 'back foot.'  Not only should your security allow you to anticipate attacks, but allow you to take the appropriate action.

We believe organisations should take a 'one-two punch' approach to intelligence. It's important to keep your eye on the target and not on the ground. The first is to engage a managed security services provider - to give you information about possible or real threats to your systems. The second is to augment these insights with deeper threat analysis and reporting. And this is where data will give you a stronger stance.

Most security professionals have masses of unstructured data at hand. The next step is to put this data in a structure that gives you a level of intelligence to make an informed decision on how to adapt your security posture. In this way, you're making better decisions - and taking swifter action - based on the events you're seeing in your environment. 

Trend 5:Hypervirtualised, software-defined security - the appliance is dead, long live the (virtualised) appliance
If anything, 2016 is set to be the year of hypervirtualised security.The firewall was always seen as the first and last line of defence for preventing threats, but this can lead to a false sense of security or, worse, an attitude of complacency. With workloads dispersed over the Internet, security professionals will need to think of new strategies to build - and secure - critical applications and workloads in a variable security environment.  It's about taking the physical hardware of the firewall, which is sold as an appliance, and making it a software-based entity. In this way, you start solving a software problem with software. As with software-defined networking, software-based security will help create an agile and flexible infrastructure,

 

Previous Page  1  2  3  4  Next Page 

Sign up for CIO Asia eNewsletters.