Converged security solutions

1 May 2013 Integrated Solutions

Andrew Chester
Andrew Chester

Information is the lifeblood of any organisation today. Moreover, the ability to analyse and apply information strategically is critical to the survival strategies of most industries and sectors. When one considers the extent to which information security has matured and what is now available to practically any company, clearly security within the commercial sense has evolved into a dynamic and highly interesting phase of development.

There are many signature phrases that help differentiate and define information security. Phrases like ‘unified threat management’ (UTM) have represented the move toward more intelligent security services, or that which is based on the combination of physical and logical security controls.

Given that UTM was predominantly used for border, or perimeter, security within a networked environment, we are seeing a few leaders and visionaries within the security manufacturing field produce the next set of important technologies – these pieces of tech being namely next-generation devices with identity-integrated UTM.

Security and IT professionals can now start moving away from old IP-based technology and move toward identity based technology which follows just that – the identity and behaviour of a service, or person and inspects that behaviour on a level which IP-based technology cannot comprehend at all.

It is a logical level, one which has the aim to surpass traditional methods of detection and security and move into an even more intelligent realm – the human realm. This is the largest threat to any cyber, or information security initiative.

One of the only hurdles in this new realm is that only a few manufacturers currently have the vision to produce this next generation technology, others are still only further developing the traditional technology of building bigger walls with more traditional IP and policy-based features, thus only building larger walls out of different materials and not the old brick and mortar any longer.

But to what extent is the market aware of the relevance and power of converged security solutions? The simple answer is there is not extensive awareness.

The actual answer is that it completely depends on several factors – does the company have an Information Security (InfoSec) department? If not, do they have an InfoSec partner? If the answer to both of those questions is no, then the answer to the original question is "definitely not" and the actual question changes to “how long is that company still going to survive today?”

If the company has an InfoSec professional, department and/or partner – what do they base their decisions on and how much research and development do the InfoSec professionals do. Information Security professionals who do not conduct research and development today are still basing decisions on the ‘building bigger walls’ analogy mentioned earlier.

However, if they do practice even a reasonable amount of R&D then they will realise that it is not entirely about the benefits of converged solutions, let alone the solutions themselves – it is more about what answers and proactive information the converged solutions provide to you.

The largest threat in InfoSec is the human being and we as InfoSec professionals need to be able to proactively obtain and manage information in order to stop threats or limit existing threats to the smallest degree possible. Converged solutions allow you to intelligently analyse what is happening within your environment (I use the word environment because a closed network no longer exists), and proactively act on that information before it is too late.

Threat eliminating technologies follow the threat landscape trend and each manufacturer tries to envision what type of threat would be exploitable tomorrow and how are we going to prevent it. Technological converged solutions, such as threat intelligence, next-generation UTMs and identity integrated technology, was born out of the advanced attacks and threat landscape we are subjected to today.

I would imagine that more manufacturers are going to be working on developing the next phase of threat intelligence and other next-gen technology, perhaps combining threat intelligence with a better type of ‘learning’ intelligent anomaly detection and prevention – thus moving away from the traditional filter and rule-based intrusion detection and prevention arena and into a self-adapting anomaly detection and self-sustaining prevention mechanisms which factors in traffic, data and service identity.

However, any organisation which simply implements technological solutions to guard them against InfoSec and Cyber threats will surely fail due to the adapting attackers which we will always face.

For more information contact Ukuvuma Solutions, +27 (0)12 656 0311, [email protected], www.ukuvuma.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Layered security for complex spaces
Regal Security Distributors SA Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.