News in the Channel - November 2022

IT SECURITY

CONTINUED

by a VPN combined with a strong authentication solution, this has now changed to a package of products: SDWAN, Secure Web Gateway, CASB, Firewall as a Service (FWaaS), Zero Trust Network Access (ZTNA), all being controlled and managed centrally. That is a whole Armageddon of cybersecurity tooling and acronyms that come with it, all components are needed for building a secure working environment. The IT environment has changed to a hybrid cloud where all kinds of new devices are connecting and to tap into the opportunity, partners need to have fuller appreciation and understanding of the customer’s needs and how they – as solutions and services providers – can help the customer achieve their long-term goals.

memory breach detection, and threat containment to help IT teams keep close to the issue at hand.” Jason agrees that partnerships are important. “Oftentimes, the main issues that customers face include getting it spun up with their environment; a lot of times they don’t know the prerequisites needed to do this such as a specific server with certain memory requirements,” he says. “Depending upon the size of the company, certain factors such as the personnel matter – they may not have the personnel with the right experience, that have ever implemented new systems, or know how to configure settings on various systems. All these lead to two things that IBM identified as the greatest leading causes of reported breaches – misconfiguration and human error.” Going forward With hybrid working and cyberattacks continuing to increase, demand for security products will too in the coming 12 months. “We’ll see a tremendous increase in requests for security tools, whether that’s security monitoring or security scanning, and we’ve even seen that also around governance, risk and compliance,” says Jason. “I believe in the future, you are going to continue to see the need for an increased security tool set, monitoring, scanning and compliance across all marketplaces. And I would hope that we would see an increase in security educational platforms. “As for the threat landscape, unfortunately, I believe you are going to see more of the same, which is increased attacks from financially motivated cyber actors that are usually seen as ransomware groups such as Conti, LockBit and BlackCat. We have seen an uptick in malware deployments and continue to see a great deal of phishing campaigns and fuzzing. Malware is typically delivered over a network that infects, explores, steals or conducts virtually any behaviour an attacker wants. And because malware comes in so many variants, there are numerous methods to infect computer systems. Phishing is a technique utilised when attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a website, in which the perpetrator masquerades as a legitimate business or reputable person. Fuzzing is a black box method consisting of activity of analysing code and testing it by finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.” Bart adds that several product categories will see increases in demand in the next year. “A product category that helps in securing the ‘new normal’ is Secure Access Service Edge (SASE),” he says. “Where remote working traditionally was set up

Jason Manar Kaseya

As for the threat landscape,

unfortunately, I believe you are going to

see more of the same, which is increased attacks from financially motivated cyber actors

“There is more automation and businesses are more dependent on technology. This means that risks for all organisations no matter their size are getting bigger and more dispersed in terms of location due to the increase in hybrid and home working. As well as this, cyber criminals are becoming shrewder, and their attacks are harder to spot. Due to this, multiple authentication and identity management practices will become more widely used by more businesses. As such, for those in the IT security market, they will need to develop IT solutions focused on identity management and zero trust. “Further, IT security will become more proactive, rather than being an incident response. To do this, within the IT security environment, channel partners must focus on educating organisations of all sizes to ensure that they are protected from cyberattacks in the future.”

hp.com

kaseya.com

kyoceradocument solutions.co.uk

uk.tdsynnex.com

20

Powered by