- 20 November 2012 11:09
Need for vigilance a common theme at M. Tech’s security show
SYDNEY, November 20. Although the title of distributor M Tech’s recent security conference was ‘Big thinking’, most presenters warned of the need for perpetual vigilance in protecting solutions, networks and data . There were seven presenters from leading industry players.
The in-house event at Dockside, Darling Park, Sydney, targeted the end user market, focusing on CIO, CTO, CSO, CFO, decision-makers from sectors including IT, Banking Finance and Government. The event drew 40 delegates.
Keynote speaker Ralph Pisani, Senior VP Worldwide Sales at Imperva, discussed ‘The compromised insider’ - the employee who unknowingly has a machine infected with targeted Trojans which is used to steal sensitive data. The trend to BYOD – bring your own device - deepens this problem, as does the consumerisation of IT, reference to the growth in finances and sophistication of hacking.
Dung Hua, Senior Sales Engineer from Websense, cautioned that a single breach can change a company’s future. He says CISOs are losing control of platforms and channels; end-points are becoming user-owned mobile devices; cloud applications now deliver data to uncontrolled locations and networks; and perimeters are open to social networking, social media, and the cybercrime that comes with them. He said: “Security has evolved - the bad guys’ modus operandi has changed, and the enemy is in your blind spots seeking your valuable data.”
Nathan Godsall, Riverbed’s Technical Account Manage Channels, said enterprises can successfully and intelligently implement strategic initiatives such as virtualisation, consolidation, cloud computing, and disaster recovery without fear of compromising performance.
Lawrence Loh, Regional Director Asia Pacific for Tufin, noted that little has changed in the way firewalls are managed since they were invented over 20 years ago - security experts still define individual rules on every firewall to grant or deny access. What has changed dramatically is the complexity of the operation. In today’s complex environment most policy rules/ACLs are related to application connectivity requirements, while most firewall policy changes are application-related. A great deal of time is spent on application deployment and decommissioning - and many organisations experience application connectivity disruptions as a result of network configuration changes.
Lawrence commented: “It’s clear that in order to meet the changing demands of the business and the increasing complexity of the infrastructure, a paradigm shift is needed in the way that firewall policies are managed.”
Anthony Mahoney, Sales Engineer ANZ for SolarWinds, presented on ‘Unexpected simplicity in IT management’, while Jason Ha, National Manager for Security at Dimension Data, discussed ‘Selective automated protection – putting visibility, awareness and protection into practice. Rick Choo, Regional Sales Director at BT, presented on IP address management for the new Internet.
About M.Tech Group
The M.Tech Group of companies is part of the Singapore Exchange-listed Multi-Chem Group. Established in May 2002, M.Tech is a leading regional distributor of IT security, application delivery, network and video communication solutions, with operations in 30 cities in 15 countries across APAC. M.Tech is also an authorised training centre for security and network certified courses.
For more details about M.Tech and its full spectrum of integrated products and solutions, please visit www.mtechpro.com For more information
Monica Chong, M.Tech Australia Phone: +61.2.8987 0400 Email: email@example.com
David Frost PR Deadlines, for M.Tech Australia Phone: +61.2.4341 5021 Email: firstname.lastname@example.org
Sign up now »
File MPS analyzes network file shares to detect and quarantine malware brought into the network through the Web, email, or other manual means, such as online file sharing.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.