Intelligent CIO Africa Issue 82 | Page 69

t cht lk

t cht lk

Steve Flynn , Sales and Marketing Director , ESET Southern Africa
• Avoiding one-size-fits-all solutions through customised solutions , configurations , and policies .
• Securing both data at rest and data in motion , due to the need to support both cloud and on-premises protection , as well as securing data as part of workload migrations .
compliance violations , data governance problems , legal exposure , and the loss of customer confidence . At the same time , solutions that are difficult and expensive to deploy cost money , degrade employee productivity and take security professionals away from other tasks .
As businesses create their checklist , it is important to keep in mind some core functionalities for hybrid cloud security . These functionalities include :
• Protecting traditionally unprotected or poorly protected endpoints , networks and applications now being used more frequently in remote work , such as home networks or personally subscribed cloud services .
• Enabling cloud sandboxing as isolated test environments to study , analyse and plan action against suspicious programs and , or files .
• Delivering multilayered protection of the expanding number of applications , data and devices at the endpoint , server , network and cloud levels .
• Supporting an integrated platform design , rather than disparate security point products , to ease management and support automated prevention , detection , response and remediation .
• Improving time to value by speeding deployment , facilitating scalability , and reducing costs .
• Embracing a multi-purpose console to do more than just threat monitoring .
For more than 30 years , ESET has been developing industry-leading IT security software and services to protect businesses , critical infrastructure and consumers worldwide from increasingly sophisticated digital threats . From endpoint and mobile security to endpoint detection and response , encryption and multifactor authentication , ESET ’ s high-performing , easy-to-use solutions unobtrusively protect and monitor 24 , 7 , updating defences in real-time to keep users safe and businesses running without interruption .
Evolving threats require an evolving IT security company that enables the safe use of technology . This is backed by ESET ’ s R & D centres worldwide , working in support of our shared future . p
www . intelligentcio . com INTELLIGENTCIO AFRICA 69