Converged security solutions

1 May 2013 Integrated Solutions

Andrew Chester
Andrew Chester

Information is the lifeblood of any organisation today. Moreover, the ability to analyse and apply information strategically is critical to the survival strategies of most industries and sectors. When one considers the extent to which information security has matured and what is now available to practically any company, clearly security within the commercial sense has evolved into a dynamic and highly interesting phase of development.

There are many signature phrases that help differentiate and define information security. Phrases like ‘unified threat management’ (UTM) have represented the move toward more intelligent security services, or that which is based on the combination of physical and logical security controls.

Given that UTM was predominantly used for border, or perimeter, security within a networked environment, we are seeing a few leaders and visionaries within the security manufacturing field produce the next set of important technologies – these pieces of tech being namely next-generation devices with identity-integrated UTM.

Security and IT professionals can now start moving away from old IP-based technology and move toward identity based technology which follows just that – the identity and behaviour of a service, or person and inspects that behaviour on a level which IP-based technology cannot comprehend at all.

It is a logical level, one which has the aim to surpass traditional methods of detection and security and move into an even more intelligent realm – the human realm. This is the largest threat to any cyber, or information security initiative.

One of the only hurdles in this new realm is that only a few manufacturers currently have the vision to produce this next generation technology, others are still only further developing the traditional technology of building bigger walls with more traditional IP and policy-based features, thus only building larger walls out of different materials and not the old brick and mortar any longer.

But to what extent is the market aware of the relevance and power of converged security solutions? The simple answer is there is not extensive awareness.

The actual answer is that it completely depends on several factors – does the company have an Information Security (InfoSec) department? If not, do they have an InfoSec partner? If the answer to both of those questions is no, then the answer to the original question is "definitely not" and the actual question changes to “how long is that company still going to survive today?”

If the company has an InfoSec professional, department and/or partner – what do they base their decisions on and how much research and development do the InfoSec professionals do. Information Security professionals who do not conduct research and development today are still basing decisions on the ‘building bigger walls’ analogy mentioned earlier.

However, if they do practice even a reasonable amount of R&D then they will realise that it is not entirely about the benefits of converged solutions, let alone the solutions themselves – it is more about what answers and proactive information the converged solutions provide to you.

The largest threat in InfoSec is the human being and we as InfoSec professionals need to be able to proactively obtain and manage information in order to stop threats or limit existing threats to the smallest degree possible. Converged solutions allow you to intelligently analyse what is happening within your environment (I use the word environment because a closed network no longer exists), and proactively act on that information before it is too late.

Threat eliminating technologies follow the threat landscape trend and each manufacturer tries to envision what type of threat would be exploitable tomorrow and how are we going to prevent it. Technological converged solutions, such as threat intelligence, next-generation UTMs and identity integrated technology, was born out of the advanced attacks and threat landscape we are subjected to today.

I would imagine that more manufacturers are going to be working on developing the next phase of threat intelligence and other next-gen technology, perhaps combining threat intelligence with a better type of ‘learning’ intelligent anomaly detection and prevention – thus moving away from the traditional filter and rule-based intrusion detection and prevention arena and into a self-adapting anomaly detection and self-sustaining prevention mechanisms which factors in traffic, data and service identity.

However, any organisation which simply implements technological solutions to guard them against InfoSec and Cyber threats will surely fail due to the adapting attackers which we will always face.

For more information contact Ukuvuma Solutions, +27 (0)12 656 0311, [email protected], www.ukuvuma.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.