Converged security solutions

1 May 2013 Integrated Solutions

Andrew Chester
Andrew Chester

Information is the lifeblood of any organisation today. Moreover, the ability to analyse and apply information strategically is critical to the survival strategies of most industries and sectors. When one considers the extent to which information security has matured and what is now available to practically any company, clearly security within the commercial sense has evolved into a dynamic and highly interesting phase of development.

There are many signature phrases that help differentiate and define information security. Phrases like ‘unified threat management’ (UTM) have represented the move toward more intelligent security services, or that which is based on the combination of physical and logical security controls.

Given that UTM was predominantly used for border, or perimeter, security within a networked environment, we are seeing a few leaders and visionaries within the security manufacturing field produce the next set of important technologies – these pieces of tech being namely next-generation devices with identity-integrated UTM.

Security and IT professionals can now start moving away from old IP-based technology and move toward identity based technology which follows just that – the identity and behaviour of a service, or person and inspects that behaviour on a level which IP-based technology cannot comprehend at all.

It is a logical level, one which has the aim to surpass traditional methods of detection and security and move into an even more intelligent realm – the human realm. This is the largest threat to any cyber, or information security initiative.

One of the only hurdles in this new realm is that only a few manufacturers currently have the vision to produce this next generation technology, others are still only further developing the traditional technology of building bigger walls with more traditional IP and policy-based features, thus only building larger walls out of different materials and not the old brick and mortar any longer.

But to what extent is the market aware of the relevance and power of converged security solutions? The simple answer is there is not extensive awareness.

The actual answer is that it completely depends on several factors – does the company have an Information Security (InfoSec) department? If not, do they have an InfoSec partner? If the answer to both of those questions is no, then the answer to the original question is "definitely not" and the actual question changes to “how long is that company still going to survive today?”

If the company has an InfoSec professional, department and/or partner – what do they base their decisions on and how much research and development do the InfoSec professionals do. Information Security professionals who do not conduct research and development today are still basing decisions on the ‘building bigger walls’ analogy mentioned earlier.

However, if they do practice even a reasonable amount of R&D then they will realise that it is not entirely about the benefits of converged solutions, let alone the solutions themselves – it is more about what answers and proactive information the converged solutions provide to you.

The largest threat in InfoSec is the human being and we as InfoSec professionals need to be able to proactively obtain and manage information in order to stop threats or limit existing threats to the smallest degree possible. Converged solutions allow you to intelligently analyse what is happening within your environment (I use the word environment because a closed network no longer exists), and proactively act on that information before it is too late.

Threat eliminating technologies follow the threat landscape trend and each manufacturer tries to envision what type of threat would be exploitable tomorrow and how are we going to prevent it. Technological converged solutions, such as threat intelligence, next-generation UTMs and identity integrated technology, was born out of the advanced attacks and threat landscape we are subjected to today.

I would imagine that more manufacturers are going to be working on developing the next phase of threat intelligence and other next-gen technology, perhaps combining threat intelligence with a better type of ‘learning’ intelligent anomaly detection and prevention – thus moving away from the traditional filter and rule-based intrusion detection and prevention arena and into a self-adapting anomaly detection and self-sustaining prevention mechanisms which factors in traffic, data and service identity.

However, any organisation which simply implements technological solutions to guard them against InfoSec and Cyber threats will surely fail due to the adapting attackers which we will always face.

For more information contact Ukuvuma Solutions, +27 (0)12 656 0311, [email protected], www.ukuvuma.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
Community-centric security architecture
Regal Security Distributors SA Integrated Solutions Residential Estate (Industry)
Securing any large area, whether it is a commercial park or a residential estate, is as much about protecting and monitoring the internal environment as it is about protecting the perimeter.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.