• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

“A Holistic, well-rounded Security Approach is the need of the hour”


By VARINDIA - 2016-12-22
“A Holistic, well-rounded Security Approach is the need of the hour”

 

 

 

Rohit Oberoi, Director Channel - India & Middle East, Seclore Technology in an open discourse on End point security explains how 2017 will be a revolutionary year in terms of coming out with stricter regulations and policies by organizations to secure their networks and data - 

 

2016 has been an epic year for cyber security threats. The positive side is that awareness is also increasing. With data leakage stories making headlines every day, the topic has entered mainstream discourse. The day is not far when companies are sued by customers for not keeping their private data safe. 

 

“The growing awareness, coupled with the government’s willingness to acknowledge the national security risks posed by cyberattacks, makes us hopeful we will see meaningful progress made in the fight to create effective cyber-legislation by the end of 2017. 2017 will (hopefully) be the year global leaders finally recognize the need for an InfoSec Geneva Convention, setting standards for what cyber-activities are and aren’t acceptable. Holding highly confidential information hostage and using it as black mail or manipulate elections is a whole new level of warfare,” opines Rohit Oberoi, Director Channel - India & Middle East, Seclore Technology.

 

He continues, “Furthermore, in 2017, we can expect to see organizations placing stricter compliance regulations on their third-party outsource vendors and other external collaboration partners. Third-parties such as advisors, vendors, sub-contractors and business partners pose a huge risk to organizations because they require access to systems and data to conduct business, yet there is no accountability in the way they handle a company’s data.”

 

Drivers of the Endpoint Security Market

 

The value offered by firewalls and anti-virus solutions has been on the decline. Seclore predicts that 2017 will be the year when organizations will acknowledge the need to secure the data itself, and not just infrastructure and devices. “The shift to persistent data-centric has already begun with Enterprise Digital Rights Management (EDRM) capabilities as a key requirement in their Enterprise File Synch and Share (EFSS). In fact several vendors have already jumped on the data-centric security trend in 2016, with Citrix and IBM adding Rights Management features to their EFSS and Enterprise Content Management (ECM) offerings,” says Rohit.

 

Another primary reason for the increased interest in data centric security is that the business itself (which after all is the ultimate owner of the data) is becoming more aware. For example, when a bank sends confidential customer data to its credit card embossing vendors, the Operations Head is as concerned about data security as the CISO or CRO. For IT, this makes it easier to obtain buy-ins and budgets - not to mention making solution adoption much easier too. After all, employees are more likely to follow instructions if they come from their bosses rather than from IT.  

 

Large organizations vs Smaller Organizations - 

 

The days when Information Security was nice-to-have are long gone. Now it is considered a key part of overall Information strategy. “That is one reason we are finding that more and more organizations are opting for the integration route for data-centric security products i.e. integrating them with existing enterprise applications such as ECM and ERP products,” he says. 

 

Awareness is increasing even among the verticals not traditionally associated with strong Data-centric Information Security programs, such as the Indian Manufacturing and Knowledge Process Outsourcing. Even government agencies have now started focusing their efforts in this direction.

 

It is however difficult to characterize the nature of data breaches today in relation to company size. The reality is that most leaks are largely ‘equal opportunity thefts’ i.e. they do not discriminate based on the size of the company. “We feel that every organization’s security strategy should be driven by its individual needs and requirements, rather than size or market capitalization,” he says.

 

So does it suffice then to just resorting to endpoint security to avert advanced threats? 

 

“Security today is fragmented and not centralized; data security has traditionally focused only on securing information that stays within a boundary. A piece of data might be governed by one policy inside an application, by another policy on the endpoint, by yet another policy on a file server, yet another on the vendor’s inbox, yet another on the vendor’s file server, and so on. In fact, the very concept of endpoint security is boundary-centric and not data-centric – and endpoint security is the most potent symptom of this traditional approach,” explains Rohit.

 

And this approach, like he says while necessary has been proven insufficient in today’s flat world. Enterprises need a holistic, well-rounded approach to data security and governance. As hackers are taking a more targeted approach by exploiting higher value breaches beyond credit cards and social security numbers, no longer can we rely on just securing the infrastructure or devices. “And with new collaboration technologies and the use of outsourcing continuing to grow at a breakneck speed, it will be virtually impossible to keep up with hackers unless organizations evolve their infrastructures to support a data-centric security,” concludes Rohit. 

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.