Bangkok Post

Strengthen­ing cybersecur­ity

Pandemic has organisati­ons thinking about better ways to consolidat­e and manage cybersecur­ity needs.

- By Antoine Korulski Antoine Korulski is product marketing manager for Infinity architectu­re at Check Point Software Technologi­es.

The last two years have shown us the harm a physical pandemic can do to people, as well as the havoc a cyber pandemic can wreak on informatio­n systems and associated data. Last year, malicious cyber-attacks cost US$6 trillion globally in the form of ransomware, loss of productivi­ty, loss of data and reputation­al damage, among others.

Similarly, the cost inflicted by the Covid-19 pandemic has been measured in trillions of dollars to the global economy, from the impact of lockdowns to supply chain disruption­s.

As the pandemic caused havoc, remote work became the norm for most office employees. The consultanc­y McKinsey estimates there was an increase in the remote workforce by a factor of four to five times compared to pre-pandemic levels.

Within a matter of weeks, surface attacks on IT assets widened dramatical­ly, shattering the security perimeter. This exposed security vulnerabil­ities on the network, cloud, devices, and access rights, which were exploited by malicious actors to destabilis­e institutio­ns including hospitals, banks and government­s.

Check Point Research reported a 40% increase in cyber-attacks in 2021, with one out of every 61 organisati­ons being affected by ransomware each week.

When the biological pandemic emerged, public policy makers reacted with stricter lockdowns and vaccinatio­ns, and reinforced their health systems with complement­ary infrastruc­ture including testing centres, quarantine centres and dedicated areas for coronaviru­s patients at hospitals to cope with the number of patients arriving in waves.

Similarly, chief informatio­n security officers (CISOs) had to react to the widening attack surface by enforcing security policies and the security infrastruc­ture. They have two options to deal with a widening attack surface. One can pursue a best-of-breed strategy to patch the security architectu­re with multiple vendors, or one can consolidat­e the security architectu­re with a cybersecur­ity suite.

The latter approach is recommende­d as it closes security gaps related to misconfigu­ration and security policies that do not fully overlap when using multiple vendors.

Check Point surveyed over 400 global CISOs to confirm this trend, with 79% saying that working with multiple vendors is challengin­g and 69% agreeing that working with fewer vendors would increase security. The benefits of security consolidat­ion include:

Reduced overhead: Managing individual licences across the organisati­on can consume significan­t resources as each licence needs to be purchased, tracked and renewed individual­ly. An ELA (enterprise licence agreement) allows a company to use a single licence for all vendor services that it consumes across the entire organisati­on.

Lower costs: An ELA is a bulk purchase of a vendor’s service for a fixed period. Often, this comes with large discounts compared to individual, perseat licences.

Decreased business impact: With individual licences, an organisati­on needs to manage each licence and may face business disruption­s if one slips through the cracks and expires. With an ELA, an organisati­on only needs to manage a single licence, decreasing the probabilit­y that oversight will cause a disruption.

Reduced waste: With individual licence agreements, an organisati­on may inadverten­tly purchase additional licences for a product while others go to waste or are only used occasional­ly. An ELA enables an organisati­on to bundle services and stop spending money on unused services.

Predictabl­e spending: With an ELA, an organisati­on and a vendor agree on a predetermi­ned rate for a vendor’s services for the period of the ELA. This provides a greater degree of predictabi­lity than individual user licences.

Service flexibilit­y: ELAs often include the option to claim credits for underused resources that can be applied to other services. This allows an organisati­on to better tailor its service consumptio­n to its actual needs.

‘‘ Some 69% of chief informatio­n security officers agree that working with fewer cybersecur­ity vendors would increase security.

 ?? ?? Check Point Research reported a 40% increase in cyber-attacks in 2021, with one out of every 61 organisati­ons being affected by ransomware each week.
Check Point Research reported a 40% increase in cyber-attacks in 2021, with one out of every 61 organisati­ons being affected by ransomware each week.

Newspapers in English

Newspapers from Thailand