INTELLIGENT BRANDS // Software for Business
J2 Software tackles security in
the hyper-connected world
/////////////////////////////
A
frican ICT company J2 Software
has launched a range of solutions
to keep up with the rapid growth of
associated attacks aimed at mismanaged or
unpatched devices. will not even know if something has been
lost,” he said. “When a new vulnerability is
discovered the cyber-criminals respond faster
than most organisations and they make sure
they exploit every new opportunity possible.
“Every day new devices are being added to
the corporate environment bringing new
threats and vulnerabilities in the picture,”
said J2 Software MD John McLoughlin. “This is why we push for visibility of
organisations’ entire environment and this
must go beyond the corporate network in
our modern, hyper-connected society.” “It is clear to me that cybersecurity and
compliance continues to be a massive
challenge for many organisations. Attackers
are getting more sophisticated in their
attacks and most people are defending
in the same way they always have. What
astonishes me is why they are not driven
to change how they are doing things in the
face of ongoing failure to stop the problem.”
McLoughlin added that systems live in-
house and in the cloud with data being
accessed and managed on several devices in
numerous locations. “Without visibility, you Mc Loughlin notes there are new threats
which are thrown into the mix every day.
“Simply put, without visibility there is no
proven way to respond and remediate these
threats in any meaningful amount of time,”
he said. “Depending which research paper
you read, the average organisation takes
anywhere from 160 to 229 days to realise
there has been a breach. That is almost
longer than it takes the latest mobile device
to become obsolete.
“So how is this possible when there are
so many security solutions available? The
answer is clear; it is because people are
using 10-year-old thinking to defend against
current threats. There is no data correlation
and even less automation.
“There is very little verification conducted on
existing defence systems and often once any
tool is deployed, the tick box is checked and
it is forgotten. Well, at least until they are
notified of the breach and their data is being
thrown around the web with abandon.
“Whether it is poor configuration, malware,
insider threats, data loss or disgruntled
users, visibility is the key to identify system
misuse, unpatched machines and solution
misconfiguration. It is just impossible to
believe you are secure and compliant if
you do not know where people access
systems, or the actual assets connected to
your environment. Without total visibility
companies will always find themselves in
the role of the fireman, constantly battling
and putting out fires, rather than continually
improving their security landscape.”
McLoughlin says real time visibility is the
only way to identify anomalous behaviour,
highlight changes and instantly respond
to attacks.
J2 Software has
launched a range of
solutions to keep up
with the rapid growth
of associated attacks
78
INTELLIGENTCIO
“Businesses cannot prevent threats, they will
unquestionably continue and even intensify,”
he said. “However, visibility gives businesses
the capability to respond immediately.” n
www.intelligentcio.com