Intelligent CIO Europe Issue 05 | Page 56

COUNTRY FOCUS: ITALY “ IF TELECOMS ARE TO DELIVER THE TRUE VALUE OF THE DIGITAL EVOLUTION, THEY MUST SERIOUSLY CONSIDER A CYBERSECURITY STRATEGY WHICH GUARANTEES COMPREHENSIVE PROTECTION OF NETWORKS. enough to overcome this complexity. A strategy which starts from the bottom-up to incorporate various security elements is vital, ensuring data centres and enterprises can evolve with the threat landscape to inhibit and minimise attacks. For a cybersecurity strategy to truly be effective, it must first put in place processes that can achieve consciousness of the inherent insecurity of the technologies to determine what data and assets to protect, who or what to protect these resources from and to identify the right countermeasures to reduce risk exposure. For instance, by introducing Software Defined Networking (SDN) programmable fabric, the solution can maintain a consistent protection of any workload across the entire cyberattack. With such a solution in place, it can easily segment user access to the resources and boost application visibility and control to provide security intelligence on threat protection. A hardened and secure orchestration platform approach can permit dynamic control with a pervasive policy-driven approach to allow automatic provisioning of security services, rapidly enforcing and decommissioning policies. A solution such as this could prove extremely beneficial for enterprises whose corporate networks are accessed from a range of scenarios, including the office, an employee’s home or a public Wi-Fi network. By leveraging a unified access control solution that addresses wired, wireless and remote access, it can provide network segmentation and content security to avoid the spreading of malware and users with quarantined viruses. This can provide powerful threat intelligence, retrospective analysis and resolution security 56 INTELLIGENTCIO Tullia Zanni, Head of Solutions Marketing at Italtel intelligence to safeguard core network services such as Domain Name Service (DNS) and Dynamic Host Control Protocol (DNCP). Attacks, attacks and more attacks! A solution which addresses the whole security architecture while providing resilience against the aspects of each attack can be largely beneficial in overcoming cybercrime. As ransomware quickly emerges as one of the most dangerous cyberthreats facing both organisations and consumers (according to Cisco’s 2017 mid-year cybersecurity report), a solution which is agile enough to manage tools and solutions to gather information daily to avert future breaches of data is key. This will enable enterprises, service providers and governments to provide effective security with advanced threat protection, quick detection and rapid containment to reduce the impact of a ransomware attack. Providing resilience against increasing DDoS attacks should also be a key feature of any cybersecurity strategy. By enabling volumetric and application detection and mitigation against a service provider’s backbone, mobility edge and enterprise data centre connectivity, key organisational assets in the network can be protected. An all-round approach By incorporating advisory services into organisation’s networks, it can place them at the forefront of standard and compliance policies – including the latest General Data Protection Regulation (GDPR) – to help build trust with their clients and safeguard personal data. An approach such as this can not only pinpoint vulnerabilities in networks through controlled in-depth evaluation information security exposure, but also provide a cybersecurity lifecycle service which www.intelligentcio.com