Former SAP executive readies to roll with Check Point in Africa

Checking out
Africa's security

Former SAP exec to lead Check Point Africa.

Sunday, Aug 25th

Playing security against productivity: the domino effect

Playing security against productivity: the domino effect

To deliver work quickly, employees often look for ways to cut corners. It's not malicious. It's meant in the spirit of gaining faster time-to-market, increasing brand awareness, meeting end-of-quarter goals, and delivering rapidly in a warp-speed world. We've all seen it time and again. What many employees don't realise is that all those little indiscretions ultimately create a huge domino effect.

As IT leaders, we've seen first-hand just how much rounding off corners can seriously impact security. Just between 2017 and 2018 South Africans have been subjected to four massive security breaches:

· Liberty email hack

· ViewFines licence details

· Master Deed's data breach "biggest" digital security threat in SA

· Ster-Kinekor's database compromised

We've discovered and mitigated instances of shadow IT, seen files copied to USB sticks, revealed personal email used when it shouldn't be, and applied fixes to a host of other common behaviours that make us cringe.

Taken collectively, little security workarounds put important things at risk - from confidential information to intellectual property to the health of applications and the sanctity of third-party information. And over time, the damage makes any corporation's security perimeter look like Swiss cheese - full of holes.

Changing the Game

The good news is that these little indiscretions have forced us to get smarter about security. Many organisations now are changing the game by designing security around people. At Citrix we understand that the perimeter must evolve to be people-centric – threat-centric, network-centric, and app-centric designs alone do not suffice.

Given the number of credential-based attacks, we must look past the security provided by a series of gates and locks and look deeper at user behaviour - a series of detectors. What organisations need right now is a security solution that is developed based on user entity behaviour analysis. Such a solution will allow IT to know about threats and anomalies sooner and can respond quicker.

Securing an enterprise is a constant tug of war between user experience and user protection. Lock access down too much and both experience and productivity suffer. Conversely, relaxing protection too much increases the likelihood of breaches. Finding the right balance requires visibility, control, and protection of what we know - the end user - because taking an attack-centric approach to security leaves organisations navigating blindly, in a reactive posture and waiting for the next attack.

With a solid strategy and the right technology partner, organisations can put a human face on security, and if employees are given compelling apps, data, and services, they will be less likely to buy and use short cuts that could potentially sabotage an organisation's business objectives.

By Brendan McAravey, Regional Director, Sub-Saharan Africa at Citrix.

ALSO ON ITWEB AFRICA

AI to change contact centre CX experience Published on 08 August 2019

For companies looking to enhance their contact centre environments, AI can be leveraged to deliver more improved CX at unprecedented levels.

HPE South Africa appoints new MD Published on 30 July 2019

President Ntuli will serve in the position effective 1 August 2019.

Business support systems and 5G Published on 20 August 2019

BSS providers will play a key role in helping drive communication innovations in the future says Hassen Hamza, Pre-Sales & Business Development Director, MEA, at Nexign.