Intelligent Tech Channels Issue 40 | Page 51

EDISON MAZIBUKO , TECHNICAL DIRECTOR , DRS – A CYBER 1 COMPANY

A

EDITOR ’ S
HOW CAN SOLUTION PROVIDERS HELP THEIR CLIENTS TO DEVELOP COMPREHENSIVE ENDPOINT SECURITY MANAGEMENT POLICIES ?

Endpoint solutions have had to evolve to cater for the distributed workforce while ensuring the same standard of security is provided inside corporate networks . Organisations need to consider breaking security silos by consolidating solutions and getting more from their endpoint security . How these endpoints are managed is vital and we are seeing more organisations moving to the SaaS model , therefore , reducing complex infrastructure . Having an endpoint solution with automated workflow capability will be the difference between keeping up with threats or playing catchup . The ability to integrate endpoint security with third-party integrations , such as threat intelligence feeds , will give any enterprise the Edge against adversaries .

With analysts projecting the cybersecurity market by 2025 to be close to US $ 30 billion in the MEA region , not understanding the
INTELLIGENT TECH CHANNELS
INTELLIGENT

TECH CHANNELS Issue 40Q &

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources . Endpoints can include PCs , laptops , smart phones , tablets and specialised equipment such as bar code readers or point of sale ( PoS ) terminals . Endpoint security management systems , which can be purchased as software or as a dedicated appliance , discover , manage and control computing devices that request access to the corporate network . Required elements may include an approved operating system , a VPN client and anti-virus software with current updates . Channel experts share insights on how solutions providers can help their customers to improve their endpoint security posture .

EDISON MAZIBUKO , TECHNICAL DIRECTOR , DRS – A CYBER 1 COMPANY

organisations ’ strategies will limit solution providers with pitching best-of-breed technologies . This is short-sighted and often limits the ability for an organisation to pivot and adapt to changing requirements effectively . The fact that most enterprises today are running multiple endpoint solutions proves this . Today , solution providers are also faced with the need to protect legacy systems or unsupported operating systems . Understanding the customers architecture , infrastructure and capabilities will ensure channel partners contribute positively to the zero trust security principles .
With endpoint security management being the number one priority for many organisations in MEA , it is critical for channel partners to listen to the customers ’ requirements , understand their current environment and toolsets . Sometimes the right solution is dependent on the requirements and toolset of the customer . Don ’ t make the mistake of not understanding the customer ’ s needs .
As the IT industry has generally struggled to address the skills shortage , it goes without saying that there is a massive skills shortage across the cybersecurity industry . However , there is no shortage of driven , analytical and out of the box thinkers that can be brought into cybersecurity from schools or other industries . The right candidates can help close the gap with enough training , workshops and enablement sessions .
Consequently , many organisations are migrating from endpoint protection
platforms ( EPP ) to endpoint detection and response ( EDR ) route . XDR is a new approach that provides visibility across endpoint , cloud , network and third-party data . This enrichment truly breaks down the silos taking endpoint security management to the next level .
Given that most organisations are promoting remote working and adoption of hybrid work models , the convergence of network and security has brought us the secure access service edge ( SASE ). This cloud-native model provides the benefit of a unified platform without the burden of legacy infrastructure . The solution is perfect for the hybrid work model , allowing efficient and secure access to cloud resources and seamless access to on-premises applications . This convergence brings the best in connectivity ( SD-WAN , NaaS ) and security ( FWaaS , endpoint security , web security and network security ).
51