Oramix logo
Oramix logo
Oramix logo

Jul 2019

Manage new digital offers in visibility and security 

Carlos Caldeira, Manager of Oramix's Cybersecurity division, says data protection must be a priority, so all contexts where are used, transported and maintained must be addressed.


Digital transformation in organizations adopts the use of new technologies such as IoT, Bigdata, Machine Learning, Cloud and Mobility. This change of paradigm gives more importance to data security wherever they are hosted, transported and used at the expense of mere perimeter protection. This change of concept increases the preponderance of cybersecurity, being more important now than ever.


"Cyber attackers are always on the lookout for a flaw that allows them to attack. The attack surface, services and published micro-services enhancement, as well as the automation of vulnerabilities collection and verification, makes it more difficult to protect networks, systems, and applications", said the Oramix Manager.

Many organizations are overload with the increased scope and current threats sophistication level, and simply do not have the expertise, the processes and/or the solutions to address them.

"Hackers are increasingly skillful, finding new ways to successfully carry out attacks. We see that most companies were successfully attacked in the past and many of them do not know that it happened", reinforces the Oramix Manager.

According to Carlos Caldeira, the way to address risks and threats carried by digital transformation is to guarantee data protection processes and incorporate these premises into applications and connected devices, since its initial integration.

New digital technologies are reinventing how organizations operate, are managed and interact with others and with individuals, from ERPs and CRM to management decisions. This automation and the cyclical operating way are integrating innovation and agility, however, it can mean an increase in cybersecurity risks.

The rise of information value and its volume have never been bigger than it is today. Additionally, endpoints are particularly vulnerable, regardless of IoT devices usage, with its integration in organizations where, once again, are not designed taking account security issues.

IoT devices extend from consumer products to critical infrastructure systems, leading to more frequent and complexed attacks. These devices are being implemented in every industry and business, from financial to healthcare services, from energy to automotive industry.

Carlos says the focus must be on the data, as well as on applications.


"The IT department is used to control network access and its systems, but digital transformation is bringing the proliferation of new applications, devices and new connected environments that a standard perimeter solution cannot defend by itself."

Just as data needs to be protected, security must be rethought and redesigned to keep up with the digital transformation and today's dynamic environments. Each connected device and application must be constantly monitored.

Businesses must find a way to obtain visibility and ensure data safeguard principles, across the complex migration process of integrating the IoT and the cloud. Threats, risks and other security issues are now a whole concern for business and technical departments (IT, OT or mixed) that, by bringing security as a fundamental key to this process, provide the correct digital transformation within an organization.