Print.IT - October 2015 - page 26

DATA SECURITY
26
PRINT.IT
01732 759725
are looking for (be it compliance,
security, anomalies, trends, etc.) big
data can become a huge challenge
and leave one unsure where to start.
That said, this is also an age when
almost everything can be bought
‘as-a-service’ and these offerings can
bring immediate effectiveness to a
big data gathering capability.”
Mark Noctor:
“Application self-
protection is a relatively new
concept that is beginning to gain
significant momentum thanks to the
rapid advancement of mobility and
Internet of Things (IoT) connected
devices. The more our devices and
systems are interconnected, the
greater the surface area for hackers
seeking to steal sensitive data.
Apps are especially easy targets,
as vulnerabilities in the binary
code make them susceptible to
reverse engineering and tampering.
Research has found that 84% of
attacks occur in the application
layer. Application self-protection
techniques, such as code-hardening
and cryptographic key protection,
strengthen an application’s ability
to ward off attacks and protect
sensitive data and IP.”
Ross Brewer:
“Effective IT security
heavily depends on skilled people
and well-defined policies and
processes, but without security
intelligence businesses will still
have no chance of mitigating today’s
threats. Just as business intelligence
allows organisations to connect
points of seemingly unrelated
data to find new opportunities,
security intelligence tools enable
organisations to see threats clearly,
so that they can respond as quickly
and efficiently as possible. There
are two key metrics that businesses
must consider when evaluating their
security posture – the time it takes
to identify threats, and the time it
takes to mitigate them. Clearly the
more time an intruder is permitted to
roam a system undetected, the more
damage they can do. Companies
seeking to improve data security
should use security intelligence
and sophisticated data analytics to
reduce this time to hours and, in an
ideal world, minutes.”
Jason Hart:
“Breach prevention and
monitoring alone will not prevent
cyber criminals. Furthermore, it’s
clear that password policies aren’t
working, so businesses need to
look for alternative ways to manage
passwords, authenticate users
and bolster security. One option is
to replace static passwords with
two-factor authentication, which
could include the generation of
One-time Passwords (OTP) to
authenticate users. Replacing static
passwords with OTP is inexpensive
and automated and could remove
approximately 80% of today’s
security problems. However, this
alone is not enough and companies
should also move to a ‘secure
breach’ approach, which ensures
data is effectively useless should
it fall into the wrong hands. This
involves adopting robust multi-factor
authentication solutions as part
of a holistic security strategy that
offers multiple layers of protection,
including encryption, access controls,
key management, network security
and strong authentication.”
Ross Brewer,
MD & VP,
LogRhythm
Jason Hart,
vice president
and CTO for
data protection
,
Gemalto
...continued
NEOPOST ARE EXHIBITING AT
LONDON CALLING 2015
Come and visit us on
the stand or for more
information go to:
londoncalling
To find out more about London Calling and register for the event visit:
The UK’s leading provider of mailing equipment and
software and expert in multi-channel communications
will be exhibiting at London Calling again this year.
Neopost will be showcasing how our technology can
enable businesses to deliver diversified, multi-channel
communications and services.
1...,16,17,18,19,20,21,22,23,24,25 27,28,29,30,31,32,33,34,35,...36
Powered by FlippingBook