Manage new digital offers in visibility and security
Carlos Caldeira, Manager of Oramix's Cybersecurity division, says data protection must be a priority, so all contexts where they are used, transported and maintained must be addressed.
Digital transformation in organizations adopts the use of new technologies such as IOT, Bigdata, Machine Learning, Cloud and Mobility. This change of paradigm gives more importance to data security wherever they are hosted, their transport and their use at the expense of mere perimeter protection. This change of concept increases the preponderance of cybersecurity and is now more important than ever.
"Cyber attackers are always on the lookout for a flaw that allows them an attack. Increasing the attack surface, increasing services and published micro-services, as well as automating the collection and verification of vulnerabilities, makes it more difficult to protect networks, systems and applications", said the Oramix Manager.
Many organizations are overwhelmed by increasing the scope and sophistication of current threats, and simply do not have the expertise, the processes and solutions put in place to address them.
"Cyber attackers are increasingly resourceful, and they find new ways to successfully carry out attacks. We see that most companies have been successfully attacked in the past, and many of them do not know if this happened", reinforces the Oramix Manager.
According to Carlos Caldeira, the way to address risks and threats brought about by digital transformation is to guarantee data protection processes, to incorporate these premises into the applications and devices connected since their initial integration.
New digital technologies are reinventing how organizations operate, are managed and interact with others and with individuals, from ERPs and CRM to management decisions. This automation and way of operating in cycle is integrating innovation and agility, however it can mean an increase of cybersecurity risks.
The increase in the value of information and its volume has never been greater than it is today. In addition, endpoints are particularly vulnerable with respect to the use of IOT devices, with their integration into organizations where they are not designed with security in mind.
“IOTs extend from consumer products to critical infrastructure systems, and attacks increase in frequency and complexity. These devices are being implemented in every industry and business, from financial services to healthcare, and from energy to the automotive industry.”
He says the focus must be on the data, as well as on the applications.
"The IT department is used to control access to the network and its systems, but digital transformation is bringing the proliferation of new applications, devices and new connected environments that a standard perimeter solution can not defend."
Just as data needs to be protected, security must be rethought and redesigned to try to keep up with the digital transformation and today's dynamic environments. Each connected device and application must be constantly monitored.
The business must have a way to have visibility, and ensure data safeguard principles, throughout the complex migration process of integrating the IOT and the cloud. Threats, risks and other security issues are now a joint concern of business and technical departments (IT, OT or mixed), and allow the correct digital transformation within an organization, by bringing security as a pillar to this process.