Intelligent CISO Issue 33 | Page 41

EXPERT OPINION

Let ’ s count the ways a unified , cloud-based cybersecurity posture benefits regional businesses

The rising popularity of remote working now guarantees that our future workspaces will be hybrid , which presents many problems for security professionals . Hadi Jaafarawi , Managing Director – Middle East , Qualys , explains why he thinks the answer lies in a unified cloud-based response .
Hadi Jaafarawi , Managing Director – Middle East , Qualys he Middle East

T region is known for its propensity to adapt . The past 12 years have doled out two global economic crises – 2008 ’ s Great Recession and the economic turmoil caused by COVID-19 . It was here , in our region , that some of the world ’ s greatest innovations occurred , as enterprises , public and private , found ways to do more with less . This was made possible because of cloud computing ecosystems .

The latest changes have been so jarring that we have begun to casually throw around the phrase ‘ new normal ’. And not without reason . Pure on-premises environments were rapidly becoming a thing of the past before the pandemic , not least because of the lure of cloud as a platform for cost efficiency and operational agility . The rising popularity of remote working now guarantees that our future workspaces will be hybrid : New . Normal .
This presents many problems for security professionals – an eclectic carnival of devices , a vast attack surface , a lack of control over all of it and , of course , rising expectations . Under such pressure , it would be tempting to take it one day at a time , procuring different components of a security solution in separate rollouts : endpoint protection , network monitoring , cloud security , container security and so on . This approach , unfortunately , leads to an uneven threat posture – a multi-vendor tapestry plagued by false positives and overworked human resources . In the hybrid-workplace future that is to come , we will need to do better .
The unified response
Let us take a step back and imagine what tools we can leverage to gain a properly filtered view of our technology environment that automates the mundane and alerts our security team only to genuine ‘ activities ’ of interest . Let us consider what is required to ensure a holistic solution that does not cost us prohibitive sums while diverting resources from more innovative pursuits .
A unified cloud-based response fulfils all these ambitions and more . We will all soon have at least one foot in the cloud . And when it comes to security , the massive compute power extant within such environments is ideal when trying to deliver real-time information on everything from suspicious network processes to the upgrade status of apps on the endpoints . Low latency is all www . intelligentciso . com
41