Security Market Segment LS
Monday, 11 July 2016 14:23

A cyber-chasm prevents better security

By

Australia is one of the faster adopters of virtualised servers, desktops, networks, and applications yet its thinking has not advanced as fast.

The Economist Intelligence Unit (EIU) research, backed by VMware, has found that there is a severe disconnect — a cyber-chasm  between what IT leaders and C-Suite leaders are thinking. And that leaves a big hole that cybercriminals can exploit. The Australian Crime Commission estimates the annual direct cost of cybercrime are as much as $17 billion or 1% of total GDP.

Raymond Maisano, VMWare sales director for software-defined data centre (SDDC), believes that while security breaches are inevitable, data centre damage can be mitigated through new approaches to IT infrastructure and network management, such as micro-segmentation.

“Forward-thinking organisations understand that the reactive security of today is no longer doing its job. They also acknowledge that people and systems can be easily bypassed or blindsided if the business lacks a ubiquitous IT architectural plan that cuts across all levels of compute, network, storage, clouds and devices. By taking a software-defined approach to IT that ensures security is ‘architectured’ into everything, these businesses have gained the flexibility required to succeed as a digital business,” says Maisano.

The EIU research is telling. C-Suite concentrates on strategic advantage — growing the business  and IT concentrates on keeping the lights on. For example, 12% of C-Suite expect a cyber-attack within 90 days, but 30% of IT security expect it. While 25% of C-suite expect an attack in the next three years the figure is 40% for IT security experts.

The only alignment seems to be the cause – cloud, BYOD, and traditional perimeter security methods will not suffice. C-Suite, in the opinion of IT security experts, is not allocating enough budget to protect the company.

VMware believes there must be a layer between physical infrastructure and applications, server virtualisation has been the most common method that covers a variety of bases, including networking, storage, cloud and devices.

"Border-based network security has proven to be somewhat effective, but with more than 70% of successful cyber-attackers gaining insider access through lost, stolen or weak credentials, it’s clearly not enough. Organisations need to look seriously at how to extend security deeper into the data centre, and with VMware’s NSX, we can offer a unique security solution at the hypervisor level," says Maisano.

Maisano spoke about a new term — micro-segmentation  or the ability to segment the network and devices so that only those who need access to a particular part of the system get it.

“It does not make sense to secure the perimeter when anyone can wander around inside. Bring the perimeter to the app,” he said.

“When it comes to the business case, network micro-segmentation is not only operationally feasible using VMware NSX, but cost-effective, enabling the deployment of security controls inside the data centre network for a fraction of the hardware cost.".


Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.

CLICK HERE!

WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.

REGISTER HERE!

BACK TO HOME PAGE
Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments