V O L U M E 0 3 | I S S U E 10 | O C T O B E R 2 0 1 7 SPECIAL SUPPLEMENT BY If an organization lacks end-to-end visibility, it does not take much time for a security event to become a security incident........ 32 SECURITYSTRATEGICPARTNER PULSETHESYNCHRONIZINGSECURITYHarish Chib, Vice President, MEA, Sophos
THE NEXUS OF GCC COUNTRIES FOR FUTURE ECONOMY Unveiling the investments, roadmap, technolgies and key infrastructure pillars that put GCC on the map of global competitiveness www. gec360.org ORGANISED BY 28TH NOV 2017 FORUM 2017 CRITICALTHE INFRASTRUCTURE BROUGHT BY
THE REGION’S NUMBER ONE PROVIDER OF IT SOLUTIONS www.gbmme.com Are you the NEXT victim? Envision Next Generation SecuritywithArchitectureGBM
04 OCTOBER 2017
Similarly, with Deloitte, the hacker got into the the firm’s global email server through an “administrator’s account” gave privileged access to restricted areas.The account required only a single password and did not have “two-step“ verification, sources said. On one hand we have been emphasizing on sophisticated password management and authentication tools, and on the other hand we see this. What follows is a troll on the social media on what could have been done and how it could have been prevented. Moving on, this doesn’t stop the other strides. The good thing about these hacks is that it does not have a dominos effect. If one side of the globe tends to go weak, the other side picks up. As I write this, Dubai government has taken one step further in the area of cryptocurrency following a partnership between Emcredit, a subsidiary of Dubai’s Department for the Economy (alsoknown as Dubai Economy) and a UK based blockchain start-up called Object Tech Grp.The new “encrypted digital currency,” called emCash uses the blockchain technology through emPay, a wallet launched by Emcredit to support contactless payments. The incredible willingness of the region to bring in new technologies has to match with the levels of security solutions that the vendors are bringing to the market. Do read our exclusive stories on some leading security players and security market. share your feedback! Happy reading.
When we say security is a shared responsibility, it literally means that everybody has a role to play. The increasing frequency and sophistication of the corporate cyber attacks have led the global cost of cybercrime to be estimated to jump three-fold, reaching $2 trillion by 2019. 2 of the recent major breaches that happened, Equifax and Deloitte, have left me wondering about the existing security protocols. In the race to be highly sophisti cated, did we forget the security basics?
Do
ë EDITORIAL TOO SOPHISTICATED OR TOO SIMPLE? PUBLISHED BY ACCENT INFOMEDIA MEA FZ-LLC PO BOX : 500653, DUBAI, UAE 223, BUILDING 9, DUBAI MEDIA CITY, DUBAI, UAE PHONE : +971 (0) 4368 8523 A PUBLICATION LICENSED BY INTERNATIONAL MEDIA PRODUCTION ZONE, DUBAI, @COPYRIGHTUAE 2013 ACCENT INFOMEDIA. ALL RIGHTS RESERVED. WHILE THE PUBLISHERS HAVE MADE EVERY EFFORT TO ENSURE THE ACCURACY OF ALL INFORMATION IN THIS MAGAZINE, THEY WILL NOT BE HELD RESPONSIBLE FOR ANY ERRORS THEREIN. PRINTED BY AL GHURAIR PRINTING & PUBLISHING LLC. MASAFI COMPOUND, SATWA, P.O.BOX: 5613, DUBAI, UAE INFO MEDIA ANUSHREE DIXIT Assistant anushree@gecmediagroup.comEditor EXECUTIVE DIRECTOR: SANJIB MOHAPATRA FOUNDER AND COO: TUSHAR SAHOO GROUP EDITOR: SANJAY sanjay@gecmediagroup.comMOHAPATRA M: +971 555 119 432 ASSISTANT EDITOR: ANUSHREE RONAKSALESINFO@GECMEDIAGROUP.COMSUBSCRIPTIONSDESIGNER:LEADVISUALIZER:REPORTER:anushree@gecmediagroup.comDIXITDIVSHABHATdivsha@gecmediagroup.comMANASRANJANVISUALIZER:DPRCHOUDHARYAJAYARYAANDADVERTISINGSAMANTARAYronak@gecmediagroup.com M: + 971 555 120 490 KHYATIkhyati.mistry@gecmediagroup.comMISTRY M: + 971 556 557 191 SOCIAL MARKETING & DIGITAL RICHAPRODUCTIONYASOBANTCOMMUNICATIONMISHRAyasobant@gecmediagroup.com&CIRCULATIONSAMANTARAY + 971 529 943 982 DESIGNED BY
If we can believe the sources, the Equifax web portal was secured by a childish authentication— the username and the password being ‘admin’ and ‘admin’.
COVER STORY CONTENTS Enterprise Security in 2017, as we all know, has been victims to some gory ransomware and cyber attacks. So how did the trojan horse get to the other side of the ‘Wall’. MENDING THE WALL OF HUMAN FIREWALL14 INTERVIEWGOVERN WHAT YOU SHARE 27 INTERVIEWFLAWLESS DIGITAL DELIVERY 38 GUEST TRANSFORMINGARTICLE THE USER EXPERIENCE FOR A CONVENIENT,MORE TRUSTED AND SECURE DIGITAL WORLD 50 INTERVIEWTHECYBERWARRANTY 28 05OCTOBER 2017
“In today’s world, most consumers demand constant connectivity, but there is a deep divide between what people think is safe when it comes to using Wi-Fi hotspots versus the reality,” said Tamim Taufiq, Head of Norton Middle East. “What someone thinks is private on their personal device can easily be accessed by cybercriminals through unsecure or fake Wi-Fi Networks or even apps with privacy vulnerabilities.”
StarLink is now an Autho rized Training Centre (ATC) for Symantec in Europe, Middle East and Africa to support Symantec with its regional enablement initiatives. StarLink will now provide the entire suite, endto-end certification sessions for Symantec products and services through InstructorLed Trainings (ILT) at differ ent locations namely UAE, KSA, Kuwait, Egypt, Turkey and South Africa or through Virtual Classroom Trainings (VCT). These certifications are conducted by instruc tors who are subject-matter experts, trained by the prin cipal vendor and who can mentor on the most complex IT Security landscapes.
“We understand how important it is to be constantly up-to-date with technologies in the IT industry. Aiming towards this objective, our strategy is to provide our custom ers with focused trainings on various products and services that can assist them in effectively managing their IT resources and help them grow within the IT space, gradually.” said Anuj Jain, Director – Customer Success at StarLink.
UAE consumers are unable to resist a strong, free Wi-Fi network and their online actions may be placing their personal information at risk, according to Norton by Symantec’s 2017 Norton Wi-Fi Risk Report.
The Norton Wi-Fi Risk Report surveyed more than 15,000 consumers in 15 countries, including 1,000 consumers in the UAE, to learn about their public Wi-Fi practices and perceptions. Many of the global findings show that people are aware of the risks of connecting to Wi-Fi hotspots outside their home but are not necessarily changing their approach when accessing these networks. In fact, nearly everyone is acting in a way that could put risk their personal and private information at risk.
SYMANTECCENTRETRAININGAUTHORIZEDNOWSTARLINKANFOR
STREETCHANNEL
Sonicwall Exceeds Goals for Agressive Results
UAE CONSUMERS RISKING PERSONAL INFORMA TION FOR CONNECTIVITY
SonicWall has exceeded aggressive financial and operational metrics set across sales, partner engage ment and support for the third consecutive quarter this year. This continued momentum has been complimented by more than 21 key industry awards and recognition that re-establishes SonicWall’s network security leadership.
“We have stood as our own stand-alone company for less than a year, and we’ve already reached record financials that are significantly ahead of plan and accelerating,” said Bill Conner, SonicWall President and CEO. “The entire SonicWall team has worked tirelessly to meet and exceed the lofty goals we outlined on day one, and these results demonstrate the strength of our channel partners, the global SonicWall team, and our world-class portfolio of products and support services.”
BILL PRESIDENTSONICWALLCONNER,AND CEO
06 OCTOBER 2017
GOVERNANCE OVER EXTERNAL FILE SHARING Extending Your Enterprise Content Securely Visit Us at GITEX 08-12 OCT 2017 | DUBAI WORLD TRADE CENTRE CLD-13, Hall SecurityGovernanceUsabilityIntegration#6
Kaspersky Lab’s “Trail gets Quadrant Status
Blazer”
Dimension Data & Cisco Join to Counter Ransomware MECHELLE BUYS DU PLESSIS, MD, DIMENSION DATA MIDDLE EAST MATTHEW GYDE, DIMENSION DATA’S GROUP EXECUTIVE – SECURITY
Dimension Data and Cisco have joined forces and published a white paper to help organiza tions stay ahead of ransomware threats. Called Ransomware: The Pervasive Business Disruptor the paper looks at ransomware trends and impacts, and how to respond before a threat becomes a business disruptor. “The escalation in ransomware attacks in the digital economy makes every organization a target,” says Matthew Gyde, Group Executive – Security, Dimension Data. “This risk escalated when cryptocurrency and bitcoin became a common avenue for ransom payment. That’s because cybercriminals cannot be traced. And as more employees work remotely on personal devices, the risk is further compounded.”
SecureWorks is developing a new man aged solution that leverages VMware AppDefense technology to protect applications running on VMware vSphere-based virtualized and cloud Theenvironments.newservice will be part of the SecureWorks Cloud Guardian portfolio and will deliver security detection, validation and response capabilities across a client’s virtual environment. This solution will leverage SecureWorks’ global Threat Intelligence, and will enable organizations to hand off the challenge of developing, tuning and enforcing the security policies that protect their virtual environments to a team of experts with nearly two decades of experience in cyber security.
“The growth of digitally connected global enterprises means that no single country can remain isolated. It also means that enterprises in the Middle East can expect more sophisticated attacks, more frequently, and with more unpre dictability going forward. The only protection for them is to follow more rigorous security protection measures,” adds Mechelle Buys Du Plessis, Managing Director, Dimension Data Middle East.
A competitive analysis of the market for Advanced Persistent Threats (APT) by The Radicati Group has awarded Kaspersky Lab’s Anti Targeted Attack platform “Trail Blazer” quadrant status. The result means that the product has been recognized for its advanced, best of breed tech nology with potential for disrupting the market, improving its position from Specialist. Targeted attacks such as APTs are some of the most dangerous risks for enterprises and the threats that cybercriminals use are constantly evolving.
The market position awarded by Radicati Group validates Kaspersky Lab’s multi-layered approach which helps businesses to implement an adaptive security strategy in countering targeted attacks and advanced threats.Oleg Glebov, Anti Targeted Attacks Solution Business Lead at Kaspersky Lab, commented “Kaspersky Lab has always been a pioneer in helping businesses to adapt their security strategies to defend against advanced threats and targeted attacks, and the move from “Specialist” to “Trail Blazer” shows that our strategy for disrupting the market is working.”
WITHCATIONAMPLIFIESSECUREWORKSAPPLISECURITYAPPDEFENSE
08 OCTOBER 2017
“SecureWorks’ new solution leveraging AppDefense will bring the power of our CTP to clients to enable faster detection and response to security events across virtualized environments,” said Matt Eberhart, vice president of global product management at SecureWorks. “AppDefense will enable SecureWorks to orchestrate security policy, detection, and response quickly to stay ahead of threat actors and will empower IT and business teams to meet their goals while feeling confident in their security “Wedefenses.”areexcited to be working with SecureWorks, such an experienced security provider with extensive knowl edge of the threat landscape,” said Tom Corn, senior vice president, Security Products, VMware. “Bringing together SecureWorks’ solution and VMware AppDefense will deliver a new level of protection for critical applications.
Trend Micro Incorporated will be showcasing its machine learning XGenTM endpoint secu rity, this GITEX. XGen is powered by a blend of cross-generational threat defense techniques that intelligently applies the right technology at the right time, resulting in more effective and efficient protection against a full range of threats. Trend Micro’s unique approach uses proven methods to quickly identify benign data and known threats, freeing its advanced techniques, such as application control, exploit prevention, behavioral analysis and machine learning, to more quickly and accurately identify unknown threats. Trend Micro is the first to infuse ‘highfidelity’ machine learning into its approach – uniquely analyzing files both before execution and at runtime, using ‘noise cancellation’ features like census checking and whitelisting to reduce false positives.
“By uniting best of breed capabilities in a single pane of glass that many alternative providers offer as disjointed tools they charge separately for, the PowerBroker platform simplifies deployments, reduces costs, improves system security and closes gaps to reduce privileged risks.”
Contrail Security combined with the automated threat detection and enforcement of Juniper’s Software Defined Secure Networks platform will further fuel the expansion of a truly unified cybersecurity platform, able to adaptively respond to any threat.
BeyondTrust, has been listed by Gartner for the fourth straight year as a Repre sentative Vendor in Gartner’s August 2017 Market Guide for Privileged Access Management (PAM). “Managing adminis trative rights and removing privileges is the only reliable way to stop insider privilege abuse and misuse, and modern threats such as ransomware”, said Kevin Hickey, President and CEO at BeyondTrust. “With BeyondTrust, our single, modular platform provides a complete Privilege, Password and Vulnerability Management solution to address insider abuse and misuse that avoids the expense and hassle of cobbling together point solutions.”
In the guide, Gartner divides the PAM market into two primary solution groups: Privileged Account and Session Management (PASM) Privilege Elevation and Delegation ManagementBeyondTrust(PEDM)isrepresented across both solution groups with a large market share.
Juniper Networks introduced Juniper Contrail Security, a new security and microsegmentation solution specifically designed to allow enterprises and Software-asa-Service cloud providers to protect applications running in multiple cloud environments.
“We feel BeyondTrust delivers the most complete and integrated privileged access management platform on the market,” said Brad Hibbert, CTO at BeyondTrust.
EMEA, INFOBLOX TREND MICRO TO RAISE BAR WITH XGEN END POINT JUNIPERSECURITYNETWORKS INTRODUCES CONTRAIL SECURITY
SURVEY FINDS INSIDER THREATS AND RANSOM WARE ARE MOST FEARED
CHERIF SLEIMAN, VICE PRESIDENT, in the Middle East to take immediate action to protect against cyber threats and breaches. One of the takeaways from the report is for compa nies to consider insider threat and user access compromise as two sides of the same risk coin.”
Cherif Sleiman, VP, EMEA at Infoblox says, “The study provides intelligence for enterprises
Infoblox released results of a new study that identifies the top threats, risks and fears related to securing data assets and keeping networks secure. The survey, conducted by SANS and co-sponsored by Infoblox, found that ransom ware, insider threats and denial of service are considered the top three threats organizations face when it comes to securing sensitive data. According to the study, 78% of respondents’ report encountering two or more threats to their data in the past 12 months, while 12% actually encountered a breach, with 43% of those encountering exfiltration of sensitive data through encrypted channels. User credentials and privileged account information, known as access data, represented the most common data types involved in these breaches, spotlighting the fact that privileged data is prized by attackers — prov ing more desirable to them than sensitive data being targeted for financial gain or destruction.
Contrail Security enables an innovative response to the heightened risk brought about by today’s cloud workloads and applications.
PAMTIVEASLISTEDBEYONDTRUSTBYGARTNERAREPRESENTAVENDORFOR
Practitioners will have visibility and control with simplified operations driven by consistent, intent-driven security policies that seamlessly interoperate with existing security controls and virtual environments. With Contrail Security, Juniper Networks is transforming the way enterprises and SaaS cloud provid ers protect, manage and monitor their cloud-native applications in heterogeneous environments.
10 OCTOBER 2017
YOUR VALUE-ADDED IT DISTRIBUTOR info@starlinkme.net www.starlinkme.net Stand D1 -1, Hall 1 Entrance DUBAI WORLD TRADE CENTRE I 08 - 12 OCTOBER 2017 DATACENTERCONTROLACCESS&CLOUDRISKMITIGATIONPROTECTIONTHREATSECUREMOBILITYINCIDENTRESPONSE
The photo sharing social media, Instagram, was hit by a malicious bug which is responsible for accessing millions of user accounts. The company first said that the hack was limited to only the verified accounts but later confirmed that non-verified accounts had also been affected.
12 OCTOBER 2017
McAfee released its McAfee Labs Threats Report: September 2017, which examines the rise of script-based malware, suggests five proven threat hunting best practices, provides an analysis of the recent WannaCry and NotPetya ransom ware attacks, assesses reported attacks across industries, and reveals growth trends in malware, ransomware, mobile malware, and other threats in Q2 2017. McAfee Labs saw healthcare surpass public sector to report the greatest number of security incidents in Q2, while the Faceliker Trojan helped drive quarter’s 67% increase in new malware samples from the social media land scape. The second quarter of 2017 saw Facebook emerge as a notable attack vector, with Faceliker accounting for as much as 8.9% of the quarter’s 52 million newly detected malware samples.
Cyberattacks Target Healthcare
While Instagram did not confirm the number of accounts hacked, it said that a “low percentage of Instagram accounts” had been affected. However, the hackers said that they have data for 6 million users.Mike Krieger, Co-Founder & CTO, Instagram clarified via a blog that the hackers had not accessed the passwords for any of the affected accounts. “We care deeply about the safety and security of the Instagram community, so we want to let you know that we recently discovered a bug on Instagram that could be used to access some people’s email address and phone number even if they were not public. No passwords or other Instagram activity was revealed. We quickly fixed the bug, and have been working with law enforcement on the matter. Although we cannot determine which specific accounts may have been impacted, we believe it was a low percentage of Instagram accounts” added Mike.
“By making apps or news articles appear more popular, accepted and legitimate among friends, unknown actors can covertly influence the way we perceive value and even truth. As long as there is profit in such efforts, we should expect to see more such schemes in the future” said Vincent Weafer, Vice President for McAfee Labs. Paladion showvased its comprehensive cyber security solution that enables an enterprise to detect the cyber threats faster and act with enhanced response capabilities to counter any cyber-attack at the 10th Annual Cyber Defence Summit organized by Naseba in Dubai. The event brought together experts in security technology, threat intelligence and incident response to address the challenges faced by the businesses and government in Middle East. The 10th edition of the Summit took place on 20th September 2017 at the Jumeirah Emirates Towers Hotel, in Dubai, CommentingUAE about their par ticipation at the Summit, Amit Roy, Executive Vice President and Regional Head for EMEA at Paladion, said, “The event gathered senior decisionmakers from leading key players in the regional Industry. The event served as an excellent platform for direct networking with CIOs, CISOs and IT head from various organizations in the Middle East that attended the event to discuss how to tackle the sophisticated security threats of today.”
and Social Media Users INSTAGRAM HACK HIT MILLIONS OF ACCOUNTS MIKE CO-FOUNDERKRIEGER,& CTO, INSTAGRAM
Roy further went on to say that Paladion used the event to focus on qualitative knowledge-sharing, practi cal sessions and brainstorming of main crucial issues in the Cyber Security area. “The event offered sessions focused on current cyber countermeasures and strategies. During the Summit, we touched base with latest happenings in the security world and share our best practices with savvy security leaders,” added Roy.
PALADION PARTICI PATED AT THE 10TH ANNUAL DEFENCECYBERSUMMIT
14 OCTOBER 2017
FROM ‘MENDING WALLS’ BY ROBERT FROST create a human firewall that is threat-aware?
Something there is that doesn’t love a wall, That sends the frozen-ground-swell under it, And spills the upper boulders in the sun; And makes gaps even two can pass abreast.
RISING ABOVE THE NORMS AND MANDATES
HUMAN MENDINGTHEWALLOF FIREWALL
Enterprise Security in 2017, as we all know, has been victims to some gory ransomware and cyber attacks. So how did the trojan horse get to the other side of the Robert Frost’s poems can be read in various forms. I was quite surprised to see how this poem on civility and neighborliness could be read otherwise so well, giving it a new dimension altogether. In 2017, we have seen the strongest of firewalls failing and trojans making their way through the cracks. Be it the Petya, WannaCry, shadow brokers, or cloudbleed to name a few global attacks, the havoc that each of them created was massive in the short duration that they thrived in the cyberspace. The ‘Human Firewall’ has been collapsing and humans are still considered the weakestShouldlink.we spend time in mending walls? Or
“Every organization with digital presence today needs to have a simple, easy to use security program, that is part of onboarding process, and that gets reviewed on a yearly basis at least. Education and cyber awareness rank first, then comes technology investments in cybersecurity,” says Roland Daccache, Senior Regional Sales Engineer, MENA, Fidelis
Today, every organization needs to understand that there is a great difference in being a ‘digital’ organization and being a ‘smart’ organization. In the race to being a digital organization, people are forgetting that the base of a ‘smart’ organizations are the employees who are not vulnerable. We are well above the Dos and Don’ts now. The rules of security have been revisited and revised thoroughly and .Enterprise security today is a corporate culture, rather than norms and mandates. What would be the golden rule for any modern organization to initiate this culture?
n BY: ANUSHREE DIXIT <ANUSHREE@GECMEDIAGROUP.COM> n PHOTO: SHUTTERSTOCK COVERSTORY
15OCTOBER 2017
SCOTT MANSON, CYBERSECURITY LEAD - MIDDLE EAST AND AFRICA, CISCO
ROLAND DACCACHE, SENIOR REGIONAL SALES ENGINEER, MENA, FIDELIS CYBERSECURITY
n Cisco’s threat-centric approach is ideally suited to meet the evolving security requirements. It turns the network into both a sensor and an enforcer.
BEING FRIENDLYCISO
“InCybersecurity.aworldofcyberattack threats moving faster than defenses, the greatest vulnerabilities are within the organization – including employees who are careless or untrained and use of personal devices.However, smart Middle East organiza tions should not create a culture of fear, but rather a corporate culture that enables employees.
16 OCTOBER 2017
Channel partners need to work with Middle East CISOs to take a software-defined approach to
“Instead of creating security products, Cisco is rebuilding its entire corporate strategy around security, making it a fundamental part of its entire business.” data centers that ensures security is architecture to everything.
END-TO-END VIS IBILITY FOR ADVANCED THREATS 2
“If I need to sum up our value proposition in one word, it would be “automation”.
n Fidelis offers a wholistic response platform that permeates both net work and endpoint from a single UI n Infoblox provides control and security at the core of the network, and then integrates into the wider security eco-system.
Discovering, tracking, reporting, solving, mitigat ing, or preventing—how can enterprises build an end-to-end visibility for advanced threats? With the explosion of data, the need for a more meaningful enterprise wide security has risen in demand. Digital transformation, that has been ruling the roost, has propelled the need for bringing in innovative solutions to protect the mission critical data. Though building a robust infrastructure is the need of the hour, the question that still resonates is whether end to end visibility is achievable or not. According to Kaspersky, Organizations can build an end-to-end visibility by strengthening their endpoint solutions with other means such as education, human expertise and machine learning. “Our HuMachine intelligence detects cyber threats with machine learning algorithms trained on big data from Kaspersky Security Net work, a cloud that contains Kaspersky user data and security expert insight. Kaspersky Endpoint Security for Business can provide more visibility and give IT security teams more control in terms of tracking changes in policies and tasks,” says Amir Kanaan, General Manager in the Middle East, Kaspersky Lab. For Cisco, its all about bringing a difference. “What differentiates us from other security vendors out there, is because it is a market [with] a bunch of point products, and we approach it across multiple products, our partner community can sell more services associated with deploying an entire architecture. It is unique to us; it’s very different and our partners have that capability where other point product partners don’t neces sarily have that capability. Cisco’s security strategy is not about products, but about integrating
n Kaspersky products are well-rec ognized among CIO/CISOs and our 270,000 corporate clients. Endpoint security has always been a priority.
n VMware sees strong Middle East demand for the VMware NSX network virtualization and security platform, which embeds security with micro-segmentation.
“Doing the same things as we did in the past and expecting a different result in the future is not a recipe for success.”
AMIR KANAAN, GENERAL MANAGER IN THE MIDDLE EAST, KASPERSKY LAB
THE WAY FORWARD
INFOBLOX
“Smart Middle East organizations should not create a culture of fear, but rather a corporate culture that enables employees.”
“Security architecture’s effectiveness depends on a vendor’s ability to gauge the threat landscape and regulate data that can be turned into security intelligence.”
DEEPAK NARAIN, REGIONAL PRESALES MANAGER –MENA, VMWARE
ENTERPRISE SECURITY—
technologies that would be completing and complementing the digital transformation tools. Digitization, as we all know, is all that enhances the user experience and has customer service at the heart and core of it. Moving the infrastructure to the cloud, dynamic authorization, BYOD, access control. Collaborative workforce etc are some of the traits that a sound digital organization will have in its cart.“In today’s complex security stack, customers always complain about vendor fatigue, and lack of resources to maintain so many different platforms, as administrative tasks take over most of the time of security personnel, leaving them with very little time to actually deal with security incidents and breaches,” says Roland Daccache, Senior Regional Sales Engineer, MENA, Fidelis Cybersecurity.
Peter Goodwin, Sales Engineering Director EMEA, Infoblox says, “Having the ability to discover what is in the network and visualize it, both the physical and virtual assets within the network, becomes key. We help our custom ers achieve that with our extensive discovery capabilities. Tracking where things move in the virtualized world is one of the benefits we bring as well as helping to fully automate the Orchestra tion process for virtual assets.
The right kind of training provided to the right kind of partners will go a long way in determin ing the reach of the security solutions to an ‘aware’ customer. Deepak Narain, Regional Presales Manager – MENA, VMware says“VMware and our partners are seeing strong Middle East demand for the VMware NSX network virtu alization and security platform, which embeds security with micro-segmentation. Middle East innovators such as the KNPC, KACST and AL-MAWARID Bank have seen strong success in deploying VMware NSX to enable secure digital workspaces.”
FINALLY Going back to where we started from, it is futile to deploy any sophisticated technology in your organization if the people working there are not ready for the upgrade. After all, it is not a software update in a phone or laptop where you have the facility to select ‘install overnight’. ë security into the fundamentals of everything the company does. More to the point, instead of creating security products, Cisco is rebuilding its entire corporate strategy around security, making it a fundamental part of its entire business.
17OCTOBER 2017
EFFORTS TO CO-EXIST Organizations that have prioritized digital transformation should not forget to deploy
PETER GOODWIN, SALES ENGINEERING DIRECTOR EMEA,
Above all, understand how you can use your endpoint and network controls to help protect and detect, while connecting the dots between them.Don’t just blindly rely on the data in your SIEM for root cause analysis.Make sure the events you are collecting in your SIEM include what you need to help you evaluate whether you are truly enforcing your policies and procedures about sensitive data.
Slightly less than half (48%) of the 12% of organizations that sustained a breach reported the major incident had resulted in the exfiltration of sensitive data report two or more occurringthreatsinpast12months actually encountered a breach, with 43% of those breaches involving exfiltration of sensitive data through encrypted channels the chief information officer (28%) and the chief security officer (23%) have the great est influence in overseeing the data risk assessment in respondent organizations
SENSITIVE DATA AT RISK
Key recommendations of Infoblox and SANS institute based on the survey is as follows; Not all threats result in significant breaches, as this survey shows. But the threats keep coming, and the chances for compromise remain high. Here’s a quick recap of major considerations related to data protection: Know your data and don’t neglect the obvious. Know your network topology, know how data should flow and design a defense-in-depth strategy, including policies,and the network and endpoint tools to enforce them. Secure your access management data and information. This information includs userIDs, credentials, roles and directories.
SURVEY 18 OCTOBER 2017
Ransomware, insider threat and denial of service are considered the top threats to sensitive data by respondents to the 2017 SANS Data Protection Survey. While the majority of respondents indicate they escaped actual compromise of sensitive data,enough respondents did lose sensitive data to provide valuable lessons from these events. User credentials and privileged accounts represented the most common data types involved in these breaches, spotlighting the fact that access data is prized by attackers. It is just as desirable to them as “sensitive” data being targeted for financial gain or destruction, that is, the data at which popular ransomware and wipeware are directed. While attackers are able to penetrate organizational networks through massively auto mated attacks conducted from afar, protectors are still using manual processes to identify sensitive assets and enable administrative policies to enforce security and response functions. Results also show that respondents still are not using easily available, critical resources, such as network topology maps and organizational workflow, to establish an information-centric, defensein-depth environment. Organizations need to reduce risk by first understanding their sensitive data, how it flows and where it resides. With this knowledge, they can establish the appropriate controls that support the organization’s business operations and then identify technologies to reinforce data protection policies and procedures.
Follow demonstrated best practices. Ideas include implementing the top five CIS Critical Control families to eliminate the majority of your organizational vulnerabilities and making sure you address the business rules around data pro tection.Sources for these business rules include the GDPR, PCIDSS standards, and regulations such as HIPAA, SOX and GLBA. Look to automate. Automated data discovery tools can uncover sensitive data in previously unknown areas of your network. User-activity monitoring can help you know your users and what to expect of them, alerting you to possible compromise before any damage occurs, whether from malware or unintended disclosure from a valuable and trusted insider.
ë 257 68% 48% 78% 12% 28% Survey base of 257 IT and security multiplesamereportdevelopersengineers,administrators,managers,andprivacyexpertsthethreatoccurringtimes
AND REGIONAL HEAD FOR EMEA
Since traditional MSSPs do not offer incident remediation and security talent is at a premium, Paladion’s CyberActive MDR service solves this problem by taking away incident validation and remediation responsibilities from enterprises, and packaging threat detection, validation and response in a single service offering.
INTERVIEW 20 OCTOBER 2017
AMIT PRESIDENT AT
Paladion has been emphasizing on the need for speed in cyber security. How grave is the situation now and what should organizations do to bridge the gap in detecting a threat and reacting to it?
Talking about your MDRS solutions, why should a CIO/CISO pick you over your competitors?
A CLASSIC MECHANISMDEFENCEFORCYBER SECURITY
As targeted and sophisticated attacks have continued to rise this year, the success or impact of these attacks has been largely dependent on the speed at which enterprises are able to detect and remediate the breaches. Hence, there has been a greater need for the enterprises to increase the speed of security operations, right from detecting the attacks faster in their cycle, , faster investigation and faster response. It is an open secret that these attacks are going to rise only for different reasons, hence enterprises need to be ready well in advance and the only way as of today is to automate the process and organisations need to deploy automation platform for security operations which again is lacking currently.
“Paladion’s CyberActive MDR is a fully managed offering that can fix the disparity between the speed of compromise and the speed of detection. Organizations using managed security services or in-house SOCs can augment their security operations using MDR, or they can set up 24/7 security monitoring, advanced threat hunting, remote incident investigation and response in place of traditional SOCs.”
PALADION
Tell us more about the ‘Classic’ defense mechanism for Cyber Security? How relevant or necessary is it for the modern enterprises?
Top 3 tips for CISO’s for 2018:l Focus on Speed by bringing in Security Automation l Leverage Analytics for deeper detection l Diversify security skills to include forensics/Response/Cloud Security ë
ROY, EXECUTIVE VICE
The Paladion CyberActive MDR brings in a new breed of security talent that is complemented by our advanced machine learning algorithms and security analytics platform to enable faster than ever detection and response to cyber threats.
Our recent inclusion as a representative vendor in the Gart ner Market Guide for MDR services validates why CIO/CISOs should rely on our services to set up robust cyber defenses.
A classic defence mechanism for Cyber Security would involve Technology, Process level and People level controls in Preven tion, Detection, Response and Mitigation. While Enterprises have been gradually shifting their focus on Detective rule based controls while strengthening their Preventive posture, the surge in advance attacks and threat vectors have prompted the need for Deeper detection which are not just rule based but can also detect deep and early through analytics and anticipation. The need is also to build capabilities to respond faster when an inci dent is detected, there by making deeper detection and speed as a paradigm shift in adopting cyber security defence strategy.
How does the 2018 cyber security market look to you? What would be your top 3 tips for CISOs and channel partners? We believe there will be substantial increase in the adoption of cyber security products and solutions by the enterprises not just in Middle East but worldwide to protect their confidential data from security breaches and that will led to a greater thrust in driving the market.
It is important for regional enterprises to engage Managed Detection and Response (MDR) security partners such as Paladion who have capabilities to both detect non-signature based events triggering anomalous behaviour, and who would also ensure speed of response through automation.
300+ Professional Team | 200+ Enterprise Clients | 30+ International Awards 20+ Nationalities | 10+ Global Locations Meet us at Gitex 2017 Transcend your Digital Transformation Journey 8th - 12th October 2017 #704, Hall - 7, Dubai World Trade Center Arena, Dubai, U.A.E. Get the DigitalAlignadvantage.competitiveyourbusinessgoalswithTransformation
CYBER RISK: NOT JUST FOR THE PROFESSIONALS
Cyberattacks can no longer be thought of as a problem for the Chief Information Security Officer (CISO) and the security function, but rather an organisational issue, managed by leaders who understand their IT dependence and capable of choosing the most appropriate and effective risk treatment options.
n Establish a dialogue, grounded in the terminology of risk between business leaders, IT and information security that regularly and actively challenge each party to examine business impacts.
n Help business leaders deepen their understanding of how technology is changing the way the business operates, the resulting dependencies and where these are leaving the business vulnerable.
DR. ADRIAN DAVIS, CISSP, MANAGING DIRECTOR EMEA, (ISC)2 however means that many businesses, large and small, continue to build, buy or use their IT without security in mind, and open new doors for the attackers. Clearly the IT function can be asked to change their perspective, but this will only occur if they are given the funding and mandate to do so. Unfortunately, our Global Information Security Workforce Study pro gramme, highlights that this is not the case. Those who identify themselves as being IT professionals particularly report that their organisation doesn’t provide adequate resources for security training, while only 35% agreed their security suggestions are acted upon. Wider appreciation for the priority given to security is needed to ensure IT and organisations are built to be resilient. The first step is to engage the conversations that allow you to: n Assess cyber risk within the context of your business functions not your systems functions, including access to information, customer services, PR and reputation.
INTERVIEW 22 OCTOBER 2017
The proliferation of news stories covering attacks on major organisations and Web-based com panies alike, including Tesco, Equifax, TESLA, AdultFriendFinder and more highlight that any business operating in, or linked to,cyberspace is at risk.The current spate of ransomware attacks —WannaCry, Petya and others— go on to demonstrate that companies must expect and prepare for a constant level of threat and attacks that are often random in nature. The impact felt around the world illustrates our economic and societal dependence on the Internet and IT, and just how vulnerable we have allowed ourselves to become.Currently, organisations categorise informa tion and systems risk as a technology problem to be managed by the information security and IT functions. This leaves the many extremely talented professionals working on the front lines of cyber and information security on the defen sive, unable to keep up with the vulnerabilities introduced as organisations increasingly evolve with new technologies. They consistently give of their best day-to-day and in times of crisis. Their experience, however, demonstrates that the chal lenge of securing organisations and societies goes beyond their resources and the small pockets of deeply technical experts that analyse the threats. Security only comes when everyone understands and can respond to this growing threat. This starts with accepting the premise that all businesses, their customers and their employees rely on the information, systems and software that underpin the products, services and processes now driving our economy. The current widespread lack of understanding of cyber risk
n Include information security requirements from idea through to, design, development, engineering, testing and production of any product or service built, produced or bought by theThebusiness.knowledge is available to tackle the issues: The challenge lies in getting it to where it needs to be. As a non-profit professional association with over 125,000 members around the world, (ISC)2 is leading the conversation to embed a greater understanding of what we see on the front-lines into the decisions that are driving businesses and economies forward. ë
The digital transformation in business, trade and industry offers a whole host of opportunities but also throws up new challenges for IT infrastructures. Dealing with complex tasks and huge volumes of data calls for increasingly fast, flexible and efficient IT solutions. DISCOVER THE POSSIBILITIES WITH RITTAL. INNOVATIVE DATA CENTRE ARCHITECTURES INNOVATIVE CLOUD SERVICES EDGE DATA CENTRES SMART PACKAGE OFFERING FOR IoT SOLUTIONS Discover it – the new world of IT solutions. Balanced Cloud CentreDatacentre-in-a-Box IT Security Room RiMatrix SEdge Data Center Rittal Middle East FZE Tel: +971-4-3416855 I Email: info-it@rittal-middle-east.com I www.rittal.com/uae-en For Enquiries: Visit us at Hall 1 Stand F1-1
A CIO from a regional business conglomerate has simplified security to the extent of a simple and regular lock and key. Laptops are tethered to a lock. Though not a high-end security control, it helps the organization to an extent to know if an employee is taking the device home. Some organizations are following a clean desk policy that makes sure that no devices or data are lying at the disposal of outsiders.
TODAY!Donotwakeupasitisjustanotherdayinyourroutine.Yoursecuritycanbecompromisedtoday.Impersonatorsarealwaysontheirfeet.Standguard! n
A Black Hat survey 2017 conducted by Thy cotic, a provider of PAM Solutions, revealed that nearly one third of respondents state that accessing privileged accounts was the number one choice for the easiest and fastest way to get access to critical data, followed closely by 27 percent indicating access to user email accounts was the easiest path to disclosing sensitive data.
W
<ANUSHREE@GECMEDIAGROUP.COM> n PHOTO: SHUTTERSTOCK
IT
HAPPENCAN BY: ANUSHREE DIXIT
EVOLVING ATTRIBUTES OF SECURE IDENTITIES
hile reading about privi lege access and secure identity and talking to some decision makers in some organizations, I came across some very interesting of not-sosophisticated examples of access management.
Dedicated surveys on PAM have revealed that privileged access has been one of the serious attack method that has been on the hackers’ favorites.
Identity Management basically involves identi fication, authentication and authorization. “To ensure that granular and controlled lifecycle of identities are managed, audited and finally reported, modern organizations need to have solutions like Identity & Access Management Suites, Privilege Identity Management Solu tions to begin with.” At Black Hat USA 2017, Lieberman Software Corporation surveyed attendees about this problem and found that 53% of polled IT security professionals stated that it’s challenging for them to secure systems that are disconnected from their corporate networks. And the situation may get worse. According to the same survey, 32% of those queried predict that more than one fourth of their end-users will not be regularly connected to the network in two years.
BUILDING FUTUREPROOF INFRASTRUCTUREMANAGEMENTACCESS
By 2018, Garter predicts that 50% of organizations will use authentication methods other than passwords for administrative access 50% As per ResearchAndMarkets. com, the global cloud IAM market might grow from USD 1,089.3 mnin 2015 to USD 3,424.5 mn in 2020
THE NEXT WAVE IN ID CARD AND ISSUANCE According to Intertec Systems, Access Control / Authentication devices will play a pivotal role for almost all transactions in future. Since the subject (who wish to access a resource) and object (resource being accessed) will be passing through the access management solution they leave an audit trail of the their actions. This collected data can be leveraged to identify patterns which can be leveraged in multiple ways. With inputs like Threat Intelligence sharing and identified violations we can automate the response enabling proactive network systems. Besides the security bit, the collected data can be leveraged for analyt ics and convert the same for applicable business opportunities.
PRASANNA TAPKIRE, SR. CONSULTANT, SECURITY, INTERTEC SYSTEMS
FINALLY Modern organizations are defined by their remote and disconnected environments and securing this environment is one of the toughest task that the organizations are faced with. So, what is on your agenda? ë “IT should be aware of the asset, user, geolocation, and cyber hygienic health of the computing device before access is granted; again, regardless of privileges.”
You have already categorised your employees by role and responsibility. The IAM is the natural home for this information, along with their access credentials. Tie IAM into a central ‘source of truth’ such as Active Directory that can also feed useful employee data to other systems such as HR and IT service management. By forcing all employees to access applications through a single identity hub, you can not only control who sees what, but also audit that access. If someone logs into a sensitive application outside office hours, your logs will show you. This is both a useful deterrent to insiders tempted by your valuable data, and a paper trail on which to base further action if necessary. There are three technologies and security best practices that all modern organizations should implement, which are; A Privileged Access Management model or PAM that reduces all user privileges, including
26 OCTOBER 2017 administrators and root, to standard users and controls privileged access. The second is Multifac tor Authentication in which all access outside of the perimeter or to sensitive data and applications should use at least two factor authentication.
30% 30% 50% 80% 30%
Gartner estimates that cloud delivered PAM will account for 30% of the market by 2019 According to Tripwire’s survey 30% of federal government said they are not able to detect every non-privileged user’s attempt to access files of organizations do not audit privilegedaccounts according to Forrester Research 80% of security breaches involve privileged credentials. According to Thycotic’s 2016 State of PAM report 30% of organizations allow accounts and passwords to be shared
MOREY HABER, VICE PRESIDENT OF TECHNOL OGY, BEYONDTRUST “Mobiles will also slowly replace the physical cards in future and we are already seeing the same happening for smart payments.”
COMMERCIAL
INTERVIEW 27OCTOBER 2017
MIDDLE EAST, ACCELLION
GOVERN WHAT YOU SHARE
CIOs and CISOs are overwhelmed by data. It’s everywhere in their organization and they can’t keep track of how much they have, where it’s stored, or who has access to it. This creates significant security and compliance issues for organizations. With Accellion, CIOs and CISOs gain total visibility into where all of their content resides. They can control who has access to what content and they have complete visibility into all file activity, including who is opening, editing, creating, downloading, uploading files. With this granular level of visibility, CIOs and CISOs can ensure only authorized users have access to sensitive content; they can leverage a number of security features to ensure all content is shared (sent, received, downloaded or uploaded) securely; and can reduce the number of entry points external parties have into their network. Lastly, CIOs and CISOs can produce auditable logs to demonstrate compliance with industry and government regulations, including GDPR. In total, CIOs and CISOs find Accellion incredibly integral in their efforts to mitigate the risk of a data breach or other form of data loss while also demonstrating compliance with rigorous industry and government regulations. ë
SAPAN AGARWAL, DIRECTOR,
“The motivation to keep your company out of the newspaper shouldn’t be driven by fear but instead by a shared company-wide value that, without customers, you don’t have a business.”
When the discussion on ‘Security’ leaves the boardroom, how welcoming are your solutions to the CIO/CISOs? How can they build a robust infrastructure with you?
Enterprise security today is a corporate culture, rather than norms and mandates. What would be the golden rule for any modern organization to initiate this culture? It’s been said before but it’s true: if you don’t want to see your company’s name in the newspaper tomorrow, do everything you can today to ensure your organization is secure. A data breach can have long-term repercussions to a company’s revenues, profits, customer loyalty, brand equity and shareholder value. If you don’t take care of your customers, namely protect their privacy, you won’t keep them. If everyone in the company knows this and it’s reinforced by the c-Suite and reflected in the investments made in technology, education, and penetration testing, then it can become a fundamental part of that company’s culture. Let us come out of the clichés of ‘security is a shared responsibility’ and ‘Every employee is a potential target’…...etc. Where are we falling short? Unfortunately, there’s no one culprit for why companies fall short in establishing a “security first” culture. If cybersecurity was simple and straightforward, every company would do it and cyber attacks wouldn’t happen. The reality is cybersecurity is just one expense in a company’s operating budget. In addition, there is an exponential rise in data being gener ated by IoT, machine learning, artificial intel ligence and other technologies that needs to be categorized, stored and, in many cases, protected. There is also an increasing reliance on third party service providers that have access to your systems and sensitive content and each of these are a security risk to your organization. Finally, cyber attacks are increasing in frequency and severity and organizations are constantly playing catch up to the latest cyber threat. In total, organizations must work harder to control, monitor, and secure their sensitive content. As a result, knowing where your sensitive content is stored, who has access to it and what’s being done with it is becoming increasingly important.
l Define a scalable automation-driven architecture to detect and respond to threats in a timely fashion
What role can channel partners play to help their customers be educated and prepared for such incidents?
Several key learnings emerged from the recent WannaCry and NotPetya ransomware attacks: The speed with which the attacks spread was unprecedented for any previously known ransomware threats l The attacks weren’t limited to organisations in a specific geography, vertical or of a specific size l The impact was massive with WannaCry affecting 200,000+ machines across 100+ countries in a matter of hours and NotPetya costing companies hundreds of millions of dollars in impact How can they achieve a robust security framework to avoid being a victim to such attacks?
l Security response must be at machine speed to stop attacks that occur at machine speed l Automation is critical to scaling response time frames, especially in light of skilled resource shortage
l
What are some of the latest offerings from SentinelOne with which firms can create a strong cybersecurity strategy?
l Speed of response will be a crucial measurement factor to minimize risk and empower business growth l Deeper and richer visibility into cloud, datacentre and endpoint, including visibility into encrypted traf fic, will be critical to look beyond obvious threats
l Look at solutions that grow with the customer evolution, allowing integrated capabilities for prevention, detection, response and forensics along with API interfaces to integrate within customer environments
How do you see the cybersecurity space evolving in the next two years?
What are the learnings for enterprises from the recent ransomware attacks such as WannaCry and NotPetya?
Customers will shift focus to 3 critical aspects that will drive cyber security: l Automation will be critical to scale security operations
Tell us about one differentiating factor of you as a VAD?
Channel partners are critical in order to protect against the new breed of threats: l Educate them on the various solutions / approaches to protection - especially the move from reactive to proactive architectures
THE2017 WARRANTYCYBER
l Simplify and accelerate customer adoption of new solutions through overlay services such as deploy ment, remote monitoring & response, etc.
INTERVIEW 28 OCTOBER
NATHAN CLEMENTS, MD, EXCLUSIVE NETWORKS
l Security must move beyond reactive signature-based defense to a proactive model in order to detect & protect against ever evolving attacks
With the ransomware threats climbing up the ladder leaving some grave grievances, Exclusive Networks tells us how SentinelOne and the VAD together are armed to address this situation
SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacentre and cloud using edge-AI to help business secure their assets with speed and simplicity. It unifies prevention detec tion response remediation and forensics in a single platform powered by artificial-intelligence behav ioural analysis and intelligent automation to enable organisations to minimise their time to protection.
We are the only distributor for SentinelOne, which offers a cyber warranty worth USD 1million & customers who were running on S1 are protected against Ransomware / NotPetya etc. ë
How will the concept of ‘RoT’, Ransomware of things, change the course of security?
Investors and boards are willing to invest in security. And security teams may find themselves with a few more resources to work with -- not just ‘product’ needs, but the in-house security expertise that they often lack.
INTERVIEW 30 OCTOBER 2017
FOCUS ON THE CONSTANT- PEOPLE
When we examined Petya, we believe that the initial infec tion vector was been via malicious code masquerading as a legitimate software update. While our researchers theorized this possibility last year, this is the first significant use of that method of infection. It has proven frighteningly successful as software updates commonly use channels other than email or typical web downloads, presenting a challenge for traditional perimeter defenses.
The impact of such changes might be more “real-life” than infecting a computer, damaging people’s basic needs such as access to temperature-controlled food via a large scale refrigera tion attack, access to water via attacks on smart meters or ability to keep warm if a heating controller was compromised. At the moment these attacks are largely theoretical, and as we mentioned above by being aware of these possibilities, product designers can build security in by design to avoid these potential troublesome outcomes. ë
Volume VS Frequency: How has the evolution of ransomware been in 2017? With both Wannacry and Petya hitting in 2017 it’s been a hot year for ransomware, and this form of malware is one of security professionals biggest concerns. We believe we will continue to see massive attacks using ransomware with economic, employee and public safety ramifications. And the methods and types of malware will continue to evolve, including the evasive methods to hide their activ ity as well as their true intent. The trick will be to better understand the ‘human’ points in these attacks.
The intent or motivations of the attackers can range broadly includ ing financial gain, revenge, political or hacktivism. Understanding these intentions can help shape our security strategies. But it is even more important to understand the human point we call the ‘user’. How do they interact with the internet, with various applications? What privileges do they need, and how do they use the privileges they have? This is a key part of how researchers predict future shifts in the threat landscape, and how they foresaw the risk of infection through a compromised ‘product update’ last year. Understanding your organization’s ‘human point’ can produce more effective security strategies.
The vast array of connected “things” are yet another vector which cybercriminals could use to achieve their ends of finan cial gain, disruption or information extraction. There have been cases of smart TVs being vulnerable to ransomware and also a proof of concept of ransomware attacking heating controls.
For threats like Petya, we usually recommend not paying the ransom, but fear can affect wise decision making. But this awareness and coverage is also helping drive better security.
IBRAHIM,MAHMOUD-SAMY AREA VICE PRESIDENT EMEA MARKETS
“We at Forcepoint believe the approach to security the industry has relied upon for years, centered on protecting technology infrastructure, needs to evolve. For too long the industry has been in a cycle of developing products that simply cannot keep pace with the emergence of new threats.”
–
Reports have claimed that cyber criminals are using ransomware as a shadow tool or mask to invade other network perimeters? How can organizations be aware of this kind of attacks?
EMERGING
REGISTER FOR A MEETING ON
While each one may have their own version of what absolute security or wholistic security is, Sophos is changing the game with its flagship version of ‘Synchronized’ security. While secu rity scenarios across the globe are at loggerheads, the security vendor believes that it is ideally positioned to meet the needs of an ever-evolving threat landscape. In 2016, Sophos became the first security vendor to deliver synchronized security, directly linking next-generation endpoint security and next-generation firewall to share threat intelligence that enables faster detection of threats, automatic isolation of infected devices, and more immediate and targeted response and resolution.
BY: ANUSHREE DIXIT <ANUSHREE @GECMEDIAGROUP.COM>
AT THE CENTER OF SECURITY
As Cyber security remained one of the top priorities for organizations across the world, Sophos has seen a steady growth in 2017. “We have made strong progress in both the endpoint and network security segments by adding significant customer value through numerous product enhancements and additions through our rapidly growing born-in-the-cloud offering –
n
SYNCHRONIZING THE SECURITY PULSE
If an organization lacks end-to-end visibility, it does not take much time for a security event to become a security incident. In an upclose interview with Harish Chib, Vice President, MEA, Sophos, we take a profound look into how ‘Synchronization’ and ‘Simplification’ became the touchstone for Sophos in modern enterprise security.
Dwight D. Eisenhower had once said that we will bankrupt ourselves in the vain search of absolute security. Absolute security— enterprise security vendors may have encountered this question several times in their day-to-day conversations.
34 OCTOBER 2017 Sophos Central,” says Harish Chib, Vice President, MEA at Sophos. The company has a robust product roadmap with planned offerings that will incorporate next-generation machine learning and artificial intelligence technologies, which will further differentiate its offerings and strengthen the value it delivers to its customers and channel partners.
solutions”“Evenwith best-of-breed approach, different security solutions fail to share useful security information and as a result a security event soon snowballs into a incident.”security
“‘Next generation’ security is simply a way to describe the latest technologies in endpoint and network protection to make security better and faster. Next-Gen security should enable your defenses to be as coordinated as the attacks they protect against. It should combine an intuitive security platform with security products that actively work together to block advanced threats to give unparalleled protection.
Synchronized security is a key innovation in next-generation security protection, and Sophos is delivering that through Sophos Security Heartbeat.
THE HEARTBEAT JUST GOT SYNCHRONIZED
The acquisition of Invincea has further strength ened Sophos’ leadership in this fast-growing
What does a next-generation security actually do? They are intelligent security platforms that not only lets you have an end-to-end visibility of your infrastructure, but at the same time has the capability to detect, manage and segment threat, leaving the need for minimal or no human intervention. Sophos has been actively delivering next-gen technologies in both network security and endpoint security, and in other areas of its portfolio as well. The two factors that differenti ates Sophos from other vendors is that it delivers industrial-strength, next-generation technologies, but in a way that can be consumed and managed by organizations of any size; and second, Sophos is taking the industry beyond ‘next generation’ with the next step of synchronized security –enabling the next-gen endpoint and next-gen firewall to actively communicate with each other to improve the effectiveness and manageability of security for organizations of any size.
“The Super star campaign is a part of Sophos’ plan to encourage our silver and authorized partners to generate revenue opportunities by driving sales of our latest security solutions and achieve their business goals”“Thechallenge enterprises face is to get the firewall and endpoint to communicate with each other.”
“Unlike other organizations in the cyber security domain, we do not believe the answer to complex threats lies in complex security
‘Synchronized Security’ has been the modus operandi of Sophos in approaching the evolving threat landscape. Security and synchronization can be definitely seen as paradox that definitely is on the wish list of CISOs but a difficult road to travel.“Until recently, the security industry had been treating network security, endpoint security, and data security as completely different entities, which did not communicate with each other. But as threats got more complex, and IT resources continued to be stretched, it was no longer possible to maintain this approach without compromising theorganization’s protection,” says Harish.Synchronized security is a best-of-breed secu rity system, which automates incident response, where the integrated products dynamically share threat, health and security informationbetween the endpoint and the network. It eliminates the manual work of trying to figure out who, what and when a compromise happened.The result: faster, better protection against advanced threats.
STEPPING UP THE LADDER WITH INVINCEA
NEXT-GEN SECURITY— THE SOPHOS DEFINITION
The strategy of adding layer upon layer of disparate security technologies really is no longer practical or effective. It is costly, complex and out of reach for the vast major ity of businesses who simply don’t have the resources to deploy, maintain and coordinate all these products. With an ever-increasing threat vector, there is a need to enable complete visibility at the desktop and at the gateway.We would recommend working with vendors, who can offer comprehensive integrated security or synchronized security approach, where they need a central security platform that has threat and security context across all devices and data, next-gen technology with the latest prevention technology built-in and intelligent protection for unparalleledprotection against advanced, complex threats.
2. How many additions were made to portfolio in 2017?
FINALLY
Signature less and uses product block techniques
Every company is founded upon a principle. But being a secu rity company, you always have to re-invent your principles to walk in parallel with your customers. For Sophos, the core mantra has been delivering security that is comprehensive.
Our portfolio consists of products across eight categories that includes Firewall , Web, Wire less, Email, Endpoint, Encryption, Mobile and Server. Every month we have an enhancement or addition in either of these categories
“Our philosophy ‘Security Made Simple’ guides every aspect of our business. We realize that the world needs an answer to progressively complex threats and this is not going to change anytime soon,” Harish signs off. ë
4. Why is Intercept X different?
1. How many partner programs were added or introduced in 2017?
“We have one dedicated partner program for our MEA partners which is simple and compre hensive. However, we have launched promos, incentives and campaigns to motivate partners from the region throughout the year”
3. How many vulnerabilities has Intercept X patched so far? Instead of trying to recognize attacks by individ ually approaching each variant, Sophos Inter cept X looks for the most common techniques used by various attacks and immediately stops it.
CORNERQUESTIONS
5. What would be your advice or offerings to the MEA organizations looking for an integrated security approach?
Work with with vendors, who can offer com prehensive integrated security or synchronized security approach, where they need a central security platform that has threat and security context across all devices and data
market. Invincea holds patents for machine and deep learning systems used to detect cyberthreats without relying on signa tures. The Invincea machine learning malware detection and prevention technology will be fully integrated into the Sophos endpoints products, which leverages Synchronized Security thus giving customers a best-of-breed security system with unparalleled prevention, detection and response. When integrated into the Sophos portfolio, any malware detected by Invincea’s machine learning will be automatically communicated via the Sophos Security Heartbeat to local enforcement points, like the XG Firewall and SafeGuard Encryption, thus enabling immediate isolation of the affected endpoint and protection of its data. The availability of Invin cea technology through the Sophos Central security manage ment platform will further enhance the Sophos synchronized security portfolio and real-time intelligence sharing.
6. What kind of strategic positioning will you have at GITEX 2017? Our experts will demonstrate how Sophos’ Synchronized Security works and strengthens the level of security by creating unparalleled integration between endpoint and network protection to its customers.
35OCTOBER 2017
THE ‘X’ FACTOR Ransomware as we all know has been evolving at a speed and course of its own. Needless to say, 2017 has been witness to some sophisticated attacks. Tools and techniques have failed to identify this new generation ransomwares. Sophos stands strong in its claim that their Intecept X is a gamechanger for the simple fact thatSophos Intercept X uses advanced anti-malware and anti-exploit techniques together to protect against these two vectors of attack.With thousands of vulnerabilities and exploits out there, Sophos is taking a new approach. “Instead of trying to recognize attacks by individu ally approaching each variant, Sophos Intercept X looks for the most common 20-30 types of attack behavior and imme diately stops it. Before a ransomware attack can encrypt more than a few files, Sophos Intercept X will stop it, remove it, tell the administrator if any other endpoint could be affected and roll back the encrypted file to pre-attack cached version.”
Enterprise security today is a corporate culture, rather than norms and mandates. What would be the golden rule for any modern organization to initiate this culture?
BINOY KOONAMMAVU, CEO & PRINCIPAL CONSULTANT, VALUEMENTOR.
FROM PROTECTION TO PREVENTION
Let us come out of the clichés of ‘security is a shared responsibility’ and ‘Every employee is a potential target’…...etc. Where are we falling short? With the influx of IoT and a profound liking for cloud by enterprises, the vulnerabilities and potential entry points for breach increases exponentially. It’s virtually impossible to restrict the devices and applications coming into the enterprise network or restrict external users accessing your business applications. In such a scenario, all that needs to be done is to ensure that the most critical assets are protected and are not being accessed by outsiders.
“Adapt a risk-based security program that prioritizes data and assets most important to business and focus on detection, response and remediation.”
Discovering, tracking, reporting, solving, mitigating, or preventing— where does your core strength lie and how can enterprises build an end-toend visibility for advanced threats? Our core strengths lie in discovering, tracking, reporting and preventing. Enterprises needs to invest in security programs that work in tandem and not in silos. This helps bring full visibility across networks, endpoints, cloud, virtual machines and logs and present a complete picture what’s going on in the enterprise network. It is equally important to be able to transform the data collected into intelligence.
INTERVIEW 36 OCTOBER 2017
When the discussion on ‘Security’ leaves the boardroom, how welcoming are your solutions to the CIO/CISOs? How can they build a robust infrastructure with you? ValueMentor places great importance in understanding the challenges in business faced by our partners. This is crucial in creating whole some solutions for their security needs. Solutions provided in silos are ineffective in the long run. Our approaches are responded positively by our partners. How should various securities co-exist in an enterprise (if they should)? What kind of involvement or engagements can an ‘all-round’ security architecture expect from the vendors? Various security approaches functioning within an organization cannot function in silos, it only weakens the system. An effective security archi tecture is the one which is holistic and integrated in its functioning, evolving with the ever-advanc ing antics of the hackers. An all-round security architecture should take into account, application security, host security, network infrastructure security and security policies and procedures.
ë
The fact that it is almost impossible to foresee all threats and vulnerabilities, makes any corporate security program, reactive, rather than preven tive. It’s time to shift focus from protection and prevention. Enterprises also need to realize that it is not possible to protect everything and hence prioritizing what needs to be protected is of ulti mate importance. One golden rule for corporates would be: “Adapt a risk-based security program that prioritizes data and assets most important to business and focus on detection, response and remediation.”
Stop the MostCARBONAttacksBLACK.COM
l Cloud-based security model: Security should be cloudnative, pervasive, portable, and not dependent on traditional network perimeters
While the Internet has been a core component of business technology for nearly 20 years, over that same 20 years, its underlying architecture and technology have scarcely evolved. While today’s global Internet has gained in speed and capacity over the years, by and large it still functions on a “best effort” basis.
INTERVIEW 38 OCTOBER 2017
the evolving security threats – an approach built for the cloud because it was born in the cloud. By moving security, policy and controls away from the core and to the edge, Akamai makes security portable and pervasive –and keeps threats like DDoS attacks and malicious bots far away from your users, data and applications.”
We believe that any cloud delivery platform must have these core attributes: l SLAs based on delivery: Service levels must be based on how the experience or application performs for the end user l Resilient, predicable performance: Capacity, distribu tion and scale to outperform the Internet with 100 percent reliability
What are the mandates to execute a seamless intelligent digital experience? The transformation into a digital business is generally focused on three core areas: experiences; simplicity and agility; and innovation.Delivering quality digital experiences allows for higher engagement, retention, productivity and user satisfaction. Simplicity and agility enables lean, focused teams that aren’t encumbered by legacy systems and can use speed to win — speed to market; speed to evolve — by using services in the cloud. In addition, simplicity and agility is tightly linked with innovation. Innovation is enabled by providing an environ ment, often in the cloud, to enterprises and enterprises’ digital ecosystem to innovate faster and more efficiently.
And in a world where experiences, applications, data and infrastructure are increasingly moving to the cloud or hybrid environments, “best effort” is no longer enough. Cloud delivery works in tandem with your cloud infrastructure –ensuring that the digital experiences, applications and data your business relies on actually reach your users and customers in a way that is fast, reliable and secure. Cloud delivery is optimized for the secure high accessibility of content, applications and data on any desired device, in any desired location.
Trusting Akamai means having a platform that’s always there, always accessible, with a 100 percent SLA that the Internet can never provide alone. Akamai delivers security at the edge and not attached to your data center or cloud infrastructure, it’s entirely portable and works with absolutely zero impact on your website performance or the quality of your digital experiences. ë
How have cloud delivery platforms evolved in 2017?
How is Akamai a CIOs best friend here? By partnering with Akamai, you’re entrusting the flawless delivery of those digital experiences to the world’s. We enable every type of digital experience across every type of device and emerging technology, including mobile, IoT, AR/VR and 4K.
“WeDELIVERYtakeadifferentapproachtoaddressing
How has Akamai catered to this market?
Experience integrity: Digital experiences should be delivered in exactly the way the creator or provider envisions, no matter how large, complex or globally distributed
ENRIQUE DUVOS, DIRECTOR OF PRODUCT MARKETING FOR AKAMAI’S EUROPE, MIDDLE EAST AND AFRICA DIVISION
l Acceleration and intelligent routing: Content should be cached at the edge and compressed as required, and traffic should be routed based on paths optimized dynamically in real time to be faster than the native Internet for flawless performance
FLAWLESS DIGITAL
l
EXPERIENCE.ENGAGE.EXCITE.gitex.comConverging technologies, disruptive business models and moonshots collide across 60 real-world case studies from 80+ disruptive global practitioners HOW? @gitextechweek WITH TODAY’S FAST CHANGING TECHNOLOGY, IT’S EITHER EVOLVE OR BE EXTINCT. Get your passes before they run out at www.gitex.com or call +971 4 308 6805 MON/TUE 9-10 Big Cognitivehappiness,data,AI,cities Siim Sikkut, Government CIO (Estonia) Taking on Bitcoin & Etherium with an official virtual currency for Estonia and the EU MON 9 Robotics, 3D Printing, AR/VR, PatientCyber-securityExperience, Shafi Ahmed, Associate Dean, Barts & London Medical School (UK) World’s first AR/VR livestream surgeon (Google Glass, Snapchat, Twitter) / curator of NHS Twitter account MON 9 TUES 10 machineAI,Blockchain,robotics,automation,learning Raj Chowdhury, Previous Head of Innovation, ICICI Bank (India) World’s first to execute inter-bank blockchain transfer WED 11 WED 11 smartAutonomousvehicles,robotics,AI,technology Tin Hang Liu, CEO & OSVehicleFounder,(USA) Saved mobility sector millions of $$$ creating an modularopen-source,autonomousvehicleplatform SMART CITIESHEALTHCARE MARKETINGDIGITALFINANCERETAIL CO-LOCATED WITH Eight dedicated power conferences at this year’s GITEX EXPERTS INCLUDE EXPERTS INCLUDE EXPERTS INCLUDE EXPERTS INCLUDE Invite-only executive briefings daily HOSTED BY SAP, Google, Oracle, Wipro, Dark Matter, Microstrategy, VMWare, F5 and Enterprise Ireland Find out how you can apply - Email: Fahad.Khalife@dwtc.com 2017FORNEW NEWFOR2017 NEWFOR2017 NEWFOR2017 Game-changing advantage from the full GITEX experience – grow your network and source technology as you gain critical insight Gamification, data analytics, AI,automationdigitalisation, Patrick Grove, Co-founder and Group CEO, Catcha Group/ Co-founder & Chairman, iflix (Malaysia) Financial review RichlisterNetflixovertakinginAsia EXPERTS INCLUDE customisation,transformation,DigitalAR/VR,drones,magicmirrors Scott Emmons, Head of the Innovation Lab, Neiman Marcus (USA) Retail business model innovator through AI and big data EXPERTS INCLUDE Over 120 hours of high-level networking across 8 unique options &TRANSPORTLOGISTICS LEADERSTECH EDUCATION THURS 12+ + Cyber InnovationSecurityPartner Exclusive TransformationICTPartner VIP Majlis Lounge Partner Business Transformation Partner Exclusive TransformationDigitalPartner Grow your Business with Google Autonomous & Robotics Partner Mobile Reseller Feature Sponsor Finance Vertical Title Partner Smart Cities Vertical Title Partner Organised by Xerox Future of Work Global Tour OfficialPartnerAirline OfficialHandlerCourierPublisherOfficial PublicationOfficial
A SQL is an injection attack in which malicious code is used to attack data driven applications. It is an application security weakness that allows attackers to control an application’s database, letting them access data by tricking the applica tion in sending unexpected SQL commands. The data can include sensitive information like usernames, passwords, etc.
In 2016, SQL injection was implicated in a hacking incident in the US election. A security breach involving the personal data of 200,000 Illinois voters was due to the exploitation of a SQL vulnerability.The related database had to be taken out of service for 10 days to recover from the attack. While this wasn’t an attack that anyone believes was intended to influence elec tion results, it seems likely that the hackers could have gone further had they chosen to. ë
INJECTION
In 2014, a hardware manufacturer,Archos was hit by a SQL injection attack. The French company, which manufactures Android tablets and smartphones, fell victim to a hacking group known as “Focus.” While this particular hack didn’t involve any credit card numbers or bank ing details, it was still a major embarrassment for the company. The following month, the hacking group posted two batches of 50,000 of the firm’s customer details online for anyone to see.
WHAT IS SQL INJECTION?
HOW TO DETECT AND PREVENT SQL INJEC TION ATTACK? To determine if your application has been com promised, routine application database audits should be performed. Regularly updating serv ers and applications is one practice that will help keep any organization on point. Organizations should also adopt other practices like keeping tight restrictions by giving users the minimum access possible. They should also remove stored procedures that is no longer needed. Organiza tions should also use application specific user accounts.
40 OCTOBER 2017
HOW TO RECOVER FROM SQL INJECTION ATTACK? l Identify the issue l Analyse the root cause l Determine a recovery plan l Plan for future prevention l Communicate your plan SQL INJECTION ATTACK IN NEWS
In 2015, TalkTalk, a UK based telecom company and ISP suffered a major data breach and the cause was an SQL Injection attack. TalkTalk’s incident affected 157,000 customers, resulting in plenty of negative publicity and inevitable reputational damage. Around 16,000 of the worst-affected customers had their bank details exposed in the attack, with over 100,000 losing personal data. The company’s share price took a hit of 30% at the time.
BoothHallGITEXVisitNetworkSelf-DrivingThe™usat:TechnologyWeek2017#6#CLD08 08OCT 2017 DUBAI WORLD TRADE ~12CENTRE juniper.netBUILD MORE THAN A NETWORK.
n BY:
To steal you at gun point holding nothing but an imaginary knife is what ransomware is all about. The world experienced serious ransomware attacks this year. As WannaCry, Petya, Locky have become a household name, global security has reached a moment of emergency. If ransomware hits your business, is your organization ready for it? Does your organization have a backup and disaster recovery plan? Are the employees educated on recognizing suspicious attachments and links? When we express our concern about these issues, there are no simple solutions. But it is important to quickly detect the presence of hack ers in the networks as soon as possible. DIVSHA BHAT SHUTTERSTOCK
The2017rise as a digital power not only requires digital awareness among the growing set of internet users but also demands the strengthening of the IT infrastructure with regards to security.
42 OCTOBER
<DIVSHA@GECMEDIAGROUP.COM> n PHOTO:
WANNACRY OR BE SAFE?
EVOLUTION RANSOMWAREOF
43OCTOBER 2017
In a world of survival of the fittest, ransom ware has adapted to meet the demands of its inventors. Cybercriminals have moved on to target corporate users whose data has more value. While ransomware gets a lot of atten tion because of the damage it can cause to a business, its families actually makeup a small but rapidly growing percentage of attacks. In early 2017, Kaspersky Lab’s researchers discovered an emerging and dangerous trend: more cybercriminals are turning their attention from attacks against private users to targeted ransomware attacks against businesses.The attacks are primarily focused on financial organizations worldwide. Kaspersky Lab’s experts have encountered cases where payment demands amounted to over half a million dol lars.The total number of users who encountered ransomware between April 2016 and March
44 OCTOBER 2017
“Whether targeted for attacks or not, enterprise networks should be able to defend against all threats including mobile ransomware” CHERIF DJERBOUA, HEAD OF TECHNOLOGY FOR AMEA REGION, TREND MICRO.
2017 rose by 11.4% compared to the previous 12 months – from 2,315,931 to 2,581,026 users around the world. The number of users attacked with Cryptor’s rose almost twice, from 718,536 in 2015-2016 to 1,152,299 in 2016-2017.
Lushen Padayachi, Head of BT Security, Middle East and Africa says that it is evident now that the cyber-crime has overtaken traditional crime as criminals are growing in sophistication and in number. “Sophisticated and more compli cated attacks are on the rise where criminals are now targeting more specifically to improve their success rate. An increasing number of insiders are stealing data and defrauding employers. As criminals continue to evolve, businesses need to as well and hence they cannot become compla cent about cyber security at any point and must consistently relook policies, question assump tions and investments, and understand the risks and issues your company faces presently” he adds.The rapid growth of next generation cloud applications is also adding an extra layer of complexity to the challenges of ransomware and becoming a new target for criminals. While the CIO’s analyse the dangers posed by these attacks, there are additional measures to help ensure protection through data backup. Backup strategies won’t necessarily prevent an attack from occurring but can serve as a last line of defense. It can enable enterprises to destroy all affected data and then restore it from a backup.“Cloud ransomware attacks pose a rather more complex problem. That is, as soon as an attacker hijacks a user’s cloud access, or manages to get any form of admin privilege, they can encrypt all of the data in the cloud. The focus has to be on cyber resil
LUSHEN PADAYACHI, HEAD OF BT SECURITY, MIDDLE EAST AND AFRICA.
AIDS Malware – First known ransomware WinLock – Leveraging premium SMS The Revolution – Anonymous online payments using Bitcoin CryptoWall – First demanding Bitcoin payments Android Defender – Fake antivirus & lock screen PCLock – Copycat ransomware pretends to be Cryptolocker TeslaCrypt – Goes after online gaming save files WannaCry – Fastest spreading RansomwareGpcoderPetya – File encrypting malware returns Reveton – Pretends to be a law enforcement fine Torrent CTB–LockerLocker– Uses TOR for command & control SimpLocker – Targets android devices KeRanger – First targeting OS X Locky – Delivered via Microsoft Word documents The1989Rise of Ransomware 20162014201220052017201520132010
“As criminals continue to evolve, businesses need to as well and must consistently relook policies and assumptions”question
1bn Ransomware generates $1 Billion per year for Cyber criminals
RISE OF RANSOMWARE IN VARIOUS VERTICALS
FINALLY With a new ransomware being released every day, organizations should realize the need for an effec tive tool to secure their endpoints. Organizations should look for next generation security solutions like Managed Detection & Response that deliver advanced threat detection and collaborative breach response on a 24x7 basis. As long as the victims pay ransom, the attacks will keep grow ing. The organizations should take charge of their own security and stay safe! ë
“Focus has to be on cyber resilience – prevention coupled with an ability to get back up and running quickly, with a minimum of disruption and zero data loss”
“The network security weakness such as poor configuration, weak authentication, or lack of proper network monitoring can be abused by threats like ransomware, data breach, or targeted attacks. Organizations should secure their sys tems and be able to prevent any form of intrusion from taking place,” he adds.
BRANDON BEKKER, MANAGING DIRECTOR, MIMECAST MEA.
Whether it is a police department, airline or even an online casino, ransomware can hit anyone. The first line of defense for an organization is to be responsible for adequate ransomware education for employees and also for an action plan that can be followed without confusion if their systems are attacked. However, Cherif Djerboua, Head of Technology for AMEA region, Trend Micro believes that whether targeted for attacks or not, enterprise networks should be able to defend against all threats including mobile ransomware.
commented Brandon Bekker, Managing Director, Mimecast MEA. Bekker also adds that cloud ransomware defense will quickly move beyond the prevent stance with mitigation quickly taking over as the
In December 2016, Los Angeles Valley College, a member of the California Community College system, paid almost $28,000 to retrieve stolen data from an unidentified ransomware attack. Similarly, the University of Calgary in June 2016 paid $16,000 to recover stolen emails.
Ransomware attacks have increased four-fold since 2016. The healthcare, education and retail sectors are the most popular targets due to the valuable and sensitive data they possess. According to a report from Bitsight Insights, the education sector is the most targeted with 13% of all higher education institutions experiencing ransomware attacks higher than other targeted sectors – 3.5% of healthcare and 3.2% of retail.
BACK TO THE BASICS
IDC predicts - By 2018, There Will Be a Doubling of Ransomware Attacks on Healthcare Organizations ience – prevention coupled with an ability to get back up and running quickly, with a minimum of disruption and zero data loss, in the event of a successful ransomware attack”
DO’S & DON’TS TO STAY SAFE FROM RANSOMWARE n Install all security updates for your computer n Beware of e-mails that ask you to enable macros to view the content n Make safe and secure backups n Update your software on regular basis n Do not click on links in unwanted emails n Do not unsoliciteddownloadattachments n Do not click pop up ads in unknown websites n Never pay the ransom. There is no guarantee you will get your files back even if you do so Do’s Don’t’s
46 OCTOBER 2017 default position.
According to a news report, a hospital admitted to paying $17,000 in ransom to get back online, but the financial impact was far greater; patients were diverted to other hospitals, employees spent countless hours focused on the attack, and com munity distrust grew about the hospital’s ability to provide the best patient care.
#1 in everything now in one place.
SECURITY
MARKET WATCH $2tn $11bn 12% $6tn 600
The Middle Eastern cyber security sector is currently thought to be worth around $11.4 billion Global colocation market will grow to more than US$50 billion by 2020, a CAGR of over 12% from 2015 to 2020. Cybercrime will continue rising and cost by$6globallybusinessesmorethantrillionannually2021.
The global cost of cybercrime is estimated to jump reachingthree-fold,$2trillion by 2019
Hologram revealed that the world’s largest global cellular network dedicated to Internet of Things (IoT) devices, capable of working on 600 cellular networks in 200 countries.
n Refrain from opening attachments that look suspicious
The global enter prise governance, risk and compliance (GRC) market is expected to grow from $5.8 billion in 2014 to $11.5 billion by 2019, at a CAGR of 14.6% for the period 2014 to 2019, according to Micro Market Monitor. Rising cyber threats number and severity
$12.22bn
n
Growing use of cloud and IoT
Patch and keep your operating system, browsers, antivirus and software up to date.
n Switch off unused wireless connections, such as Bluetooth or infrared ports.
WAYS ORGANIZATIONS PROTECT THEMSELVES FROM CYBERATTACKS
Key Drivers for Increased Adoption of Internet Security
n Install a browser add-on to block popups as they can also pose an entry point for ransom Trojan attacks. n Ensure to disable file sharing.
n Adjust your security software to scan compressed or archived files, if this feature is available.
Managed Security Services Market Report, globally is expected to garner $40.97 billion by 2022, registering a CAGR of 16.6% during the 2016-2022.period
The global mobile security market will reach $73.5 billion by 2022. Organizations are increasingly paying attention to hardware security measures, rather than just software, and the widespread adoption of BYOD policies has compelled them to invest heavily in custom apps for mobile security.
Be sure to back up all the important files on a regular basis.
n Use strong passwords. n Deactivate AutoPlay.
The global big data security market size is expected to grow from $12.22 billion in 2017 to $26.85 billion by 2022 at a CAGR of 17.1% driven by the evolving regulatory landscape, increasing variety and volume of business data generated from various sources, and increasing cyber-attacks demanding scalable high security solutions.
n If suspicious process is spotted on your computer, instantly turn off the Internet connection.
The estimate is based on activities.crimesorednationincreasegrowth,year-over-yearincludingcybercrimehistoricalfiguresrecentadramaticinhostilestatesponandorganizedganghacking 16.6% $5.8bn $ 73.5bn
n
The sectorhealthcareisexpected to grow at the second highest CAGR from 2017 to 2022.
Innovative DevelopmentProductFavourableRegulations
Security challenges are growing in today’s increasingly connected world. These challenges must be addressed in ways that combat threats without sacrificing convenience, as part of a more satisfying, mobile-centric experience at work. A secure mobile experience will not only make us safer, but will also fuel further innovation in how services are offered and delivered. Let’s take a look at some best practices to help transition to a mobile ID platform
ARTICLEGUEST
50 OCTOBER 2017
The industry is poised for the next phase of the digital revolution. This involves expanding the user’s solutions and choices and enhancing products while extending their use cases through a growing range of services and development support. It is also about expanding an industrywide ecosystem of mobility partners that can work together to innovate and bring new solutions to market.
of credentials using mobile phones are conducted in a highly secure, closed-circuit environment protected by end-to-end encryption. Other issues that have been identified when moving driver’s licenses to smartphones include:
l Optimizing flexibility for online authentication if a citizen’s smartphone battery is dead;
4. Industry Partnerships- The next phase of mobility solutions is partnerships that extend the ecosystem. Our recent engagement with NXP showcases the importance of strong partner ships in the mission to forward the adoption of mobile solutions. The HID Global Seos® credential technology will be embedded in NXP’s SmartMX-based secure element devices. Through the collaboration, NXP and HID Global aim to enable the use of wearable devices, to open electronic locks at commercial buildings, hotels and workplaces in the future. Additionally, NXP and HID Global are cooperating on a broad range of opportunities to expand the adoption of secure access to more applications and use cases. ë
TRANSFORMING
l Protecting privacy by ensuring citizens are in control of the data that is made in different 3.scenarios.Services and Support- A crucial element in the next phase of today’s mobile revolution is the addition of services and support. This includes software development kits (SDKs) to easily integrate encrypted credential provisioning technology onto phones, and to implement the cloud services and portals that are required for managing IDs. SDKs are what enable ecosystem partners in a healthy market to extend use cases across a growing range of market segments, and to create innovative, customised mobile access solutions that can be fully integrated into their back-end systems.
THE USER EXPERIENCE FOR A MORE CONVENIENT, TRUSTED AND SECURE DIGITAL WORLD WISAM YAGHMOUR, REGIONAL SALES DIRECTOR – MEA AT HID GLOBAL
1. Choice of Device - Expanding solutions and choices is particularly important. Users should have a wide variety of options for carrying their trusted IDs, from phones to wearables to fitness and health devices. They also should have many options for the types of IDs they can carry on their mobile devices to access data, doors and cloud applications, or receive bank transaction notifications on their phones for approval before 2.execution.Choiceof Credential- The next frontier of mobile choices and solutions is the ability to carry driver licenses, passports, social security cards and other citizen IDs on mobile phones. The latest solutions go beyond simply loading an image of a physical driver’s license on a mobile phone; they now ensure that all transactions related to over-the-air issuance, managing and presenting
Sophos Intercept X is a next-generation endpoint detection and response platform designed to stop ransomware, zero-day exploits, and provide detailed threat intelligence. • Stop ransomware before it can take hostages • Block zero-day attacks with signatureless anti-exploit technology • Get easy to understand threat insight and root cause analysis • Automate remediation and malware removal For more information please contact salesmea@sophos.com Learn more and try for free at www.sophos.com/intercept-x A completely new approach to endpoint security. INTERCEPT
BE PART OF THE JOURNEY ! PARTICIPATING18COUNTRIES 2400+C-LEVELEXECUTIVES ROUNDS29 OF GOLF WWW.GECOPEN.COM ORGANISED BY CSR PARTNERIN ASSOCIATION WITHBROUGHT BY To Advertise or sponsorship opportunities contact: Ronak Samantaray: ronak@gecmediagroup.com