COUNTRY FOCUS: ITALY
“
IF TELECOMS ARE TO
DELIVER THE TRUE VALUE OF
THE DIGITAL EVOLUTION, THEY
MUST SERIOUSLY CONSIDER A
CYBERSECURITY STRATEGY WHICH
GUARANTEES COMPREHENSIVE
PROTECTION OF NETWORKS.
enough to overcome this complexity. A
strategy which starts from the bottom-up to
incorporate various security elements is vital,
ensuring data centres and enterprises can
evolve with the threat landscape to inhibit
and minimise attacks.
For a cybersecurity strategy to truly be
effective, it must first put in place processes
that can achieve consciousness of the
inherent insecurity of the technologies
to determine what data and assets to
protect, who or what to protect these
resources from and to identify the right
countermeasures to reduce risk exposure. For
instance, by introducing Software Defined
Networking (SDN) programmable fabric,
the solution can maintain a consistent
protection of any workload across the entire
cyberattack. With such a solution in place,
it can easily segment user access to the
resources and boost application visibility
and control to provide security intelligence
on threat protection. A hardened and
secure orchestration platform approach can
permit dynamic control with a pervasive
policy-driven approach to allow automatic
provisioning of security services, rapidly
enforcing and decommissioning policies.
A solution such as this could prove extremely
beneficial for enterprises whose corporate
networks are accessed from a range of
scenarios, including the office, an employee’s
home or a public Wi-Fi network. By leveraging
a unified access control solution that
addresses wired, wireless and remote access,
it can provide network segmentation and
content security to avoid the spreading of
malware and users with quarantined viruses.
This can provide powerful threat intelligence,
retrospective analysis and resolution security
56
INTELLIGENTCIO
Tullia Zanni, Head of Solutions
Marketing at Italtel
intelligence to safeguard core network
services such as Domain Name Service (DNS)
and Dynamic Host Control Protocol (DNCP).
Attacks, attacks and more attacks!
A solution which addresses the whole
security architecture while providing
resilience against the aspects of each attack
can be largely beneficial in overcoming
cybercrime. As ransomware quickly
emerges as one of the most dangerous
cyberthreats facing both organisations
and consumers (according to Cisco’s 2017
mid-year cybersecurity report), a solution
which is agile enough to manage tools and
solutions to gather information daily to
avert future breaches of data is key. This will
enable enterprises, service providers and
governments to provide effective security
with advanced threat protection, quick
detection and rapid containment to reduce
the impact of a ransomware attack.
Providing resilience against increasing
DDoS attacks should also be a key feature
of any cybersecurity strategy. By enabling
volumetric and application detection and
mitigation against a service provider’s
backbone, mobility edge and enterprise
data centre connectivity, key organisational
assets in the network can be protected.
An all-round approach
By incorporating advisory services into
organisation’s networks, it can place
them at the forefront of standard
and compliance policies – including
the latest General Data Protection
Regulation (GDPR) – to help build
trust with their clients and safeguard
personal data. An approach such as this
can not only pinpoint vulnerabilities
in networks through controlled
in-depth evaluation information
security exposure, but also provide a
cybersecurity lifecycle service which
www.intelligentcio.com