EOH introduces managed Security-as-a-Service
July 2018, News, Cyber Security, Security Services & Risk Management
In today’s digital cloud era, organisations are actively pursuing the agility they need to stay ahead of competitors, leveraging new technologies to drive digital transformation. However, this is resulting in a new set of challenges, most notably how to ensure the security of increasingly distributed networks and an ever-increasing number of applications and endpoints.
Through its Technology Solutions (TS) division, EOH has introduced a solution to modern security concerns through a managed Security-as-a-Service suite of offerings. Mitigating 90% of cybersecurity threats straightaway, EOH TS provides a new approach to cybersecurity that offers a more strategic, efficient and cost-effective approach to securing a business from end to end.
“Transforming IT from a reactive business division focused on service delivery, to one capable of fuelling business growth, rests on the ‘as-a-Service’ model. This on-demand approach has changed the way businesses operate, offering solutions that enable proactive innovation, and security should be no different,” says Stuart Trainer, business unit director for information security at EOH’s Technology Solutions division.
“Security should be as responsive as all other mission-critical functions. For many organisations, it has become an extremely complex machine made up of many moving parts, leaving security teams sinking under the volume of all of the boxes they have to tick. Our solution is simple and responsive, integrating vulnerability management into the broader security management framework.”
Delivered by certified security engineers to solve real business security problems and meet regulatory requirements with auditable processes, EOH’s managed Security-as-a-Service offering helps organisations reduce the attack surface to the smallest possible footprint. Enabling a proactive security posture by eliminating vulnerabilities before they can be exploited, this solution reduces the complexity and effort associated with vulnerability management.
Trainer adds that security should not be viewed in isolation, and that EOH has included Backup-as-a-Service and Disaster Recovery-as-a-Service in its offering. Providing high-speed, verified backup, disaster recovery and data loss avoidance, these services are available for any app, any data, and on any cloud.
“Our certified specialists deliver a managed Security-as-a-Service portfolio that moves the complex tasks of information and network security from being a capital expenditure to a manageable monthly expense, while ensuring that all compliance obligations are met. As technology continues to be redefined – and to redefine how businesses operate – security must be an integral part of all facilities and services. Our approach engineers solutions specific to the client environment, tailored to meet their challenges.”
- Too safe to escape
July 2018, Technews Publishing, News
A recent story I was told highlights how we still take security for granted in our daily lives. Most people try to ensure that their houses, townhouses and apartments have some form of security in place ...
- Protecting the machines
July 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Industrial (Industry)
Security operations at industrial sites need to include cybersecurity and it needs to be treated with the same importance as the physical security of the site as well as health and safety standards.
- Securex 2018 pulls the (right) crowds
July 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
With over 6000 visitors attending and exhibitors expressing their satisfaction with not only the number, but also the calibre of the visitors, this year’s Securex was a winner.
- SLAs - Read the fine print
July 2018, Technews Publishing, This Week's Editor's Pick, Security Services & Risk Management
By insisting on an appropriate maintenance contract, security technology can be used to the full extent of its possible life.
- Securing your digital assets
July 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, IT infrastructure
Cyberattacks can’t be prevented, but companies and individuals have ways to keep the attackers out. However, the coming year will see more attacks and more losses because of poor cyber planning.
- The generations that matter
July 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
According to Doros Hadjizenonos, country manager, SADC at Check Point, we have entered the fifth generation of cyberattacks.
- News in brief
July 2018, News
Access and Beyond moves
Access and Beyond has moved into new and larger premises in Umgeni Business Park. A key motivating factor for the move was the need to establish a training facility for customers ...
- ESDA Namibia Expo 2018
July 2018, ESDA (Electronic Security Distributors Association, News
The Electronic Security Distributors’ Association (ESDA) will be holding a one-day expo at the Windhoek Country Club in Namibia on 22 August 2018.
- Randvest acquires BT-SA
July 2018, News
Randvest Technology Holdings, a private and independent investment holding company, has recently acquired Bridging Technologies SA (BT-SA).
- Online platform for targeted staff recruitment
July 2018, Technews Publishing, This Week's Editor's Pick, News, Training & Education
Hi-Tech Security Solutions launches online platform for targeted staff recruitment.
- How data leaks can be avoided
July 2018, This Week's Editor's Pick, Cyber Security, News, Security Services & Risk Management
MyID runs as a service, monitoring your ID number, email address, mobile number and credit card number for fraudulent usage or fraudulent input on the Web.
- Ignite Expo 2018
July 2018, News, Conferences & Events
Ignite Expo 2018 showcases Hudaco’s ability to provide a fully integrated security & ICT solution.