Marketing vs. reality

August 2015 News & Events

The security industry has really got its work cut out for it. In South Africa, most of us are more focused on the physical security side of things due to the country’s extreme levels of crime and the perception among syndicates that it is a safe haven – not necessarily an incorrect perception.

It’s therefore not surprising that some of our local security manufacturers are thriving, not only on South African soil, but also internationally. It’s a given that if a product makes the grade here, it will easily meet the needs of other countries, in terms of reliability, usability and durability. (Read more about our local manufacturers in the September issue.)

However, while local and international physical security companies are putting their best foot forward and promising the world, there seems to be a bit of a disconnect with the real world. We often hear how some big brands just don’t perform as expected, or more often don’t integrate as expected, creating havoc as an integrator tries to resolve basic problems in a multi-million rand deal.

Maybe the cause is a lack of testing and poor pilot projects that should put products through their paces. I saw an example of this at a recent thermal camera shootout, which Hi-Tech Security Solutions will report on in the September issue. Perhaps we assume that because company A has a product that performs in a certain way, that when company B launches the same product it will deliver the same performance. Therefore, we buy the cheaper product from B only to realise too late that B’s product is the poor cousin of A’s product.

This is why it is so important to select the right partners for the job and to do your own homework. It’s worth running pilot projects and well designed shootouts to determine exactly what you are getting. If you’re paying for performance, proving that performance is a small investment in the success of the whole project.

Sadly, the cyber security market is in a similar space. South Africans are more focused on who’s at the door than who’s in the network. This leads to rash buying decisions influenced by marketing hype and biased advice from sales people.

An example of this is the hype around BYOD (bring your own device). There are many companies offering solutions to help corporations stay safe from attacks and malware from mobile devices that employees use and are connected to the corporate network. This is an area any company should be aware of and should secure.

However, in the Verizon 2015 Data Breach Investigations Report (DBiR), a report that collates data of breaches over the past year from 70 different companies and organisations across 61 countries (including South Africa), analysing over 79 790 security incidents, the mobile threat is seen as minimal. Only 0.03% of the mobiles carried what the report terms 'higher-grade malicious code'. The rest was malware aimed at collecting user data and blasting adverts at the poor user, not breaching corporate data stores. (Sadly, well over 90% of mobile malware is targeted at Android, 96% according to FireEye.)

Another interesting snippet from the DBiR is that between 70% and 90% of malware samples are unique to a single organisation. This is due to the more organised nature of cyber crime, which sees the crooks slightly altering the code of a common piece of malware so that its signature is not picked up by your traditional antivirus scans. The malware does the same function, but it’s harder to detect by traditional means. All this makes one wonder how effective your antivirus product really is if all it does is look for known signatures*.

So when a disaster happens, the MD ends up wondering what he spent so much money on; similar to the physical security trauma of finding out your awesome million rand surveillance installation captures high resolution shots of ladies’ hairdos and men’s bald spots and not much else.

* Do not uninstall your antivirus product; they still do an important job. And if you don’t use an antivirus solution, now’s a good time to start. And yes, I know how wonderfully, fantastically and spectacularly brilliant and virus free Apple’s desktop OS supposedly is, but get one anyway.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Integration and IoT made easy
Technews Publishing SMART Security Solutions Access Control & Identity Management
The security industry is built on silos, be it surveillance, access control, alarms and others, but integration has become a critical issue in recent years. SMART Security Solutions speaks to Integr8 Systems about its local hardware and software.

Read more...
Mobile credentials taking off
Technews Publishing SMART Security Solutions Paxton Secutel Technologies Access Control & Identity Management
Mobile smartphone access is becoming more common, with use cases ranging from Bluetooth, NFC (Near-Field Communication), or QR codes to manage secure access to commercial and personal locations.

Read more...
SMARTpod talks to Armata’s Richard Frost
Technews Publishing SMART Security Solutions Videos
SMARTpod, the podcast by SMART Security Solutions, recently spoke to Richard Frost from Armata about the company's new 'all-in-one' cybersecurity bundle designed to relieve cyber stress in the SMB market.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...