Intelligent Tech Channels Issue 40 | Page 40

Zero Trust Network Access ( ZTNA ) augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate securely .
Moath Alrawashdeh , Systems Engineer , Fortinet Middle East , elaborated on the importance of deploying security-driven networking by dropping legacy Wide Area Network ( WAN ) infrastructure for self-healing SD-WAN and explained that secure SD-WAN provides flexible security , improved user experience and simplified WAN operations .
Secure Access Service Edge ( SASE ) is another piece of the cybersecurity puzzle in this perimeter-less era . SASE is an emerging framework for the convergence of networking and network security services within a global cloud-based platform . Its benefits include , but are not limited to , zero trust network access , data and threat protection , better performance with reduced complexity , cost efficiency , and improved flexibility .
SASE is an emerging framework for the convergence of networking and network security services within a global cloud-based platform .
Visibility is also key to securing an organisation ’ s many endpoints and networks , according to Roland Daccache , Sales Engineering Manager – MEA , CrowdStrike .
Daccache explained that because cyberattacks have become much more sophisticated , modern solutions need to combine threat intelligence and telemetry to prevent them from recurring .
To drill down on the activities of malicious actors , you need to cross-check the metadata from your network against highfidelity intelligence feeds and capabilities to recognise unusual behaviour .
Rabih Itani , Country Manager , UAE , Vectra , said Artificial Intelligence ( AI ) can be used to drastically improve visibility and prevent threats from turning into breaches . AI-driven network detection and response ( NDR ) can increase the visibility of actual threats by 197 %, reduce alerts by 85 %, and reduce mean time to remediation ( MTTR ) from 60 days to only 4 hours , making it a crucial component .
Jamie Collier , Cyberthreat Intelligence Consultant , FireEye Mandiant , emphasised on the importance of leveraging intelligence-led security across a security function as it can significantly enhance decision-making around areas such as cyber-risk , threat hunting , and vulnerability management . Collier also explained how an intelligence-driven cyber risk assessment can make a prominent difference by focusing detection and response efforts and prioritising resources for ‘ real ’ versus ‘ perceived ’ threats , thereby ensuring efficacy and optimising security .
Anderson Pereira , Channel Solutions Engineer EMEA , Keysight Technologies , called for optimising the organisation ’ s network for an increasingly mobile workforce through the implementation of an active performance monitoring strategy that helps minimise downtime , troubleshoot outages fasterand improve security .
“ It is not too late for organisations to start adopting new approaches to cybersecurity that would make them wellequipped with the proper security tools and defences to tackle all the challenges accompanying the new normal ,” he said . “ The perimeter-less era is here to stay and businesses should become proactive in securing their greatest assets – users and data .” •
40