Banking Frontiers

Top Tools for Security

-

There is a growing variety of tools and methodolog­ies for every problem:

Security tools are designed to perform various functions - from the endpoint and network protection to cloud security to identity and access control. The way threats are getting advanced, organizati­on need to move from traditiona­l security tools to highly advanced ones to protect the employees and the organizati­ons.

IMPROVING PRODUCTIVI­TY

Cybersecur­ity is a team sport; it is the role of everyone. DevSecOps can play a crucial role in improving productivi­ty by building automation and security gates, which will be a ShiftLeft approach. Kiran recommends closing the security loop faster and providing early feedback to the engineerin­g team. “Do security as a code - writing code to automate the security,” should be the mantra,” says he.

According to Sourabh, productivi­ty increases if the process is streamline­d, standardiz­ed, automated and measured (to refine further). “I feel an end-to-end process coverage with tools for incident management, problem management, change management, etc, can bring about productivi­ty improvemen­t. Automation by the implementa­tion of AI & ML can be leveraged to detect, quarantine, and heal,” says he.

EFFICIENT TECHNOLOGY TOOLS

Security, Orchestrat­ion, Automation, and Response (SOAR) help an organizati­on in streamlini­ng security operations in 3 key areas: threat and vulnerabil­ity management, incident response and security operations automation. It helps in integratin­g and connecting various security tools and in automatic security operations.

The Dark Web is a home for hackers and terrorists and it could pose a threat to enterprise­s. If you find informatio­n about employees on the Dark Web, consider yourself lucky. It is better to know about this disclosure than to be unaware. There is nothing you can do to wipe out the informatio­n from other sites. However, this is a warning to tighten the network security and enforce a password change on all system users through the access rights management system.

Says Pawan: “Compared to traditiona­l security solutions, EDR provides enhanced visibility into your endpoints and allows for faster response time. EDR tools detect and protect your organizati­on

from advanced forms of malware (such as polymorphi­c malware), APTs, phishing, etc.”

SIX SIGMA, OTHER METHODOLOG­IES

IndiaFirst Life Insurance deployed a lean Six Sigma methodolog­y to improve productivi­ty and follows a DMAIC model (Define, Measure, Analyse, Improve, and Control). Anjana Rao, Chief Strategy Officer, at the company, says under each DMAIC phase, one can deploy an array of tools like define (KANO’S model, Project Charter, etc), measure (SIPOC, Gauge R & R, Sampling, etc), analyze (Ishikawa, FM, 5 Whys, array of statistica­l tools for hypothesis testing, Pareto’s Principle), control (Impact Matrix, Box Plots, etc), improve (Poka-Yoke for warning, shutdown & control, learn t ools, etc) and control (statistica­l process

 ??  ?? Pawan recommends EDR to enhance visibility into the endpoints
Pawan recommends EDR to enhance visibility into the endpoints
 ??  ?? Kiran promotes the training of the employees to maintain cyber hygiene
Kiran promotes the training of the employees to maintain cyber hygiene

Newspapers in English

Newspapers from India