Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Dimension Data’s new offering helps organisations assess their security architecture

Zafirah Salim | April 9, 2015
Traditional approaches to information security are no longer adequate to protect information networks from modern threats, said Matthew Gyde, Dimension Data’s Group Executive, Security.

According to Matthew Gyde, Dimension Data's Group Executive, Security, cyber threats are still flourishing and traditional approaches to information security are no longer adequate to protect information networks from modern threats.

"Even employees are not safe from a variety of threats, including drive-by and watering hole attacks, which often occur over a weekend. In addition, we're seeing a low level of maturity in some large enterprises - many of which have spent millions of dollars on security technology," he said.

As a solution to safeguarding against cyber attacks, Dimension Data has introduced a new assessment solution that aims to help organisations assess the maturity of their security architecture, including its people, processes and technology.

Additionally, this new tool also offers validation, or enhancement of the security strategy and architecture programme. Other key features it offers are standardising and controlling best practice across systems and locations, as well as sharing metrics with the business to align IT security with the rest of the organisation.

"When assessing the robustness of an organisation's security, we cannot leave out the employee. In fact, it's essential that employees understand their role as both an asset and a potential security liability in an organisation," said Gyde.

Another key area that organisations need to focus on is to link their security strategy to the vision of the company, according to Guido Crucq, Dimension Data Asia Pacific's General Manager, Security.

This includes having a robust set of policies around vulnerability and threat management, as well as planning out incident response processes and procedures. He added that organisations must be able to address root cause issues and apply the right resources and controls in the most effective way to protect key assets.

 

Sign up for Computerworld eNewsletters.