Intelligent CIO Africa Issue 34 | Page 14

LATEST INTELLIGENCE THE SECRETS OF EVALUATING SECURITY PRODUCTS PRESENTED BY Download whitepaper here I ’ve been watching the anti-malware industry for a long time as a user, service provider and now cyber security industry analyst. For many years it was the only line of cyber defence and most of the folks I know from “back in the day” have a love hate relationship with their anti-virus provider. Les Correia and Migo Kedem are both heavy weights in the anti- malware industry and their collaborative efforts have produced the book you are reading now. To be honest I'm not even sure folks read introductions anymore as the sentiment is "why bother when it's really the content I am after?" Fair point, but if you are reading this now, I think it's time to explain just how important this book is from a business perspective. For me I believe 14 INTELLIGENTCIO we have evolved from a very two-dimensional relationship to cyber space to a three-dimensional cyber environment. Most small & medium business were architected along the lines of "inside the firewall" = things I need to care about and "outside the firewall" = Things I don't need to care about – a very 2-D space. Along came SaaS and cloud hosting and we find ourselves plunged into the deep end of the pool. The third-dimension is really about "someone else's computer that I need to care about". Those in enterprise architecture The Secrets of Evaluating Security Products 4 have been living in 3-D space for some time with data-centre architecture but there is a new twist: "someone else's computer that I need to care about and have limited control over" 3-D. n www.intelligentcio.com