Page 13 - Information Security Edition Dec 2021
P. 13

The  answer  to  protecting  the        teams can't see into the corners        i n t r o d u c i n g   a   “ D a y   Z e r o ”
    e n t e r p r i s e   a m i d   a   n e w   where  personal  mobile  devices    experience.  It  provides  new

    distributed  landscape  is  not  a      and  home  networks  have  been         employees  with  seamless
    new  security  product,  feature,       grafted  onto  the  corporate           access  to  relevant  resources

    or a different type of analytics,       ecosystem.  Therefore,  the             before their start date to simplify
    believes- Nitin Ahuja. He further       n u m b e r   o n e   p r i o r i t y   f o r   app management and integrate
                                            businesses  will  be  to  improve       cross-collaboration  tools  for  all
    adds that businesses will have
                                            visibility  on  all  endpoints  and     employees  to  work  effectively
    to  consider  modernizing  their
                                            workloads.                              across all devices and platforms.
    legacy  security  systems  since
    they are no longer applicable to  Organizations need to combine                 Expectations from Solution

    today's new realities.                  a d v a n c e d   r a n s o m w a r e   Providers
                                            protection  with  robust  post-         As  businesses  navigate  their
    Information Security                                                            multi-cloud  era,  they  need  to
    Operational Trends                      attack  remediation  to  mitigate
                                            damage.                                 build  a  security  strategy  that  is
    Our  network-based  life  is  now                                               cloud  and  platform  agnostic.
                                            Measures for De-risking
    w i d e n i n g   t h e   g a p s   i n   Investments                           This means adopting innovative,

    vulnerabilities in legacy security                                              elastic,  and  adaptive  security
                                            What  businesses  require  is  a
    technology and postures. Some           structural  or  architectural           innovations  that  can  deliver
    trends worth noticing include:          change  to  how  they  approach         unparalleled  protection  in  any


      T h e   r e s u r g e n c e   o f     security.  Businesses  need  a          cloud  –  identify  risk  contexts,
      ransomware and remote work            flexible,  consistent  digital           automate  security  checks  and

      creates  an  unpredictable            f o u n d a t i o n   t o   b u i l d ,   r u n ,   response  to  risks,  and  secure
      attack surface.                       manage,  connect  and  protect          east-west  traffic  between
                                            applications  anywhere  and  at         application  workloads  running
      Organizations'  move  to  the
                                            any time.                               across clouds.
      cloud has expanded the threat                                                 Prediction for 2022 &beyond
      surface.                              Addressing People-Centric
                                            Challenges post WFH                     2022 will be the year of Zero Trust,
      Applications  and  workloads          We  have  always  prioritized           where  organizations  'verify
      are top CISO concerns.
                                            educating  and  guiding  people         everything'  as  opposed  to
      Key  business  Priorities  &          t h r o u g h   c y b e r - h y g i e n e   'trusting  it's  safe'.  Governments

      Challenges                            practices including, setting up a       and  organizations  will  adopt  a
                                            two-factor  and  establishing  an       Zero  Trust  mindset  assuming
    The  actual  scale  of  attacks  is

    hard to discern because IT -            incident  response  plan.  We           that  they  will  be  breached
                                            empower  the  digital  employee         eventually. This approach will be
                                            experience by -                         the key to fending off attacks in

                                                                                    2022.
                     December 2021
   8   9   10   11   12   13   14   15   16   17   18