Information system security transformation saves companies millions of dollars

The instability that the world as a whole is experiencing is the new norm for many companies worldwide, ranging from epidemics to commercial crises to ordinary and cyber crises, and 57 percent of board members believe the economically and politically remarkable society is the biggest. attraction and attraction. Of the risks that are clear in the news every day that are directly related to projects on the agenda of CIOs.
While information security managers work to add, modify or improve the logistics workflow, supply chains, business service delivery models, partnerships and geographic implications, and cybersecurity are seen in all of these programs as an additional obstacle or challenge that stands in the way. more successful business, But this position is misleading On the contrary, cybersecurity should be seen as an enabler of business acumen, just as travel insurance gives tourists the confidence to see the world, cybersecurity offers business leaders a mandate and a platform for innovation.
Netscope data shows that the percentage of unauthorized cloud applications used within organizations reaches 97 percent, and security transformation effectively reduces overheads in any organization, with many organizations reporting millions of dollars in savings. By integrating provider solutions and technology management integration, network overheads are significantly reduced because on-premises security is implemented without going back to the data center administrators. In fact, 79 percent of European companies reported that they saved OPEX by adopting a cloud-based security approach.
Security is traditionally defined as binary access decisions or to allow or block, and in this way it is positioned as a gatekeeper with the power to approve or restrict plans and programs. This is why cyber security personnel do not always have the best working relationships. In 2021, research revealed Netscope says that despite common goals, hostile and unintended relationships between cyber security experts and their IT peers jeopardize digital transformation projects estimated to cost $ 6.8 trillion globally between 2020 and 2023.
Until recently, the focus of security developments was on improving the ability to make binary “allow / block” decisions, and therefore security has inevitably continued to lose its reputation as an obstacle to innovation, and not succeed in doing business so much. to make possible. since it forbids it.
In an interview with Al-Eqtisadiah, Neil Thacker, Head of Information Security in Europe, Middle East and Africa at Netscope, said: “Things are changing for the better. Focus on operational efficiency and on the contrary, significant gains have already been made in this area. , but the successive turmoil and inevitable instability that companies have seen since 2019 has finally pushed security teams to make empowerment a primary goal, and since 2020, security teams have empowered employees around the world in the continuity of continuing their business on a unprecedented way. scale without any significant impacts, while providing ongoing support to employees and workers in their companies during turmoil and sensitive situations in the supply chains to ensure business continuity.It has the complete renewal of the return-to-market strategies of organizations facilitates the disappearance of its customer base overnight. ”
According to a recent report by the research firm Ventures, companies became the victim of ransomware attacks every 11 seconds in 2021, compared to 40 seconds in 2016. The research firm predicts that the damage caused by cybercrime worldwide will be nearly $ 10 annually by 2025. , Will reach 5 trillion.
“The number of attacks is only part of a bigger and broader picture, as cybercriminals have changed the way they operate and become more dependent on attacks targeting the cloud and cloud services,” Neil continued. As the general trend towards the cloud has been adopted by companies around the world, attackers to follow their example have moved to the cloud, they have moved both their infrastructure and their security attacks to the cloud. The most recent reports indicated that 68 percent of malware travels through the cloud rather than through traditional websites. Cloud storage applications are the most common method of malware transmission and represent 66.4 percent of cloud malware delivery providers.
He pointed out that what achieves security transformation when security is cloud-based and data-centric, the user and the location of the data are no longer the limiting factors. Where users and data remain secure, regardless of location or access device. An understanding of the deep context of data types and uses should enable the design of security policies and policies that are in broad detail and are not limited to allowing or blocking operations. This enables security teams to enable more security factors without opening the door to unnecessary risks. Securing the data means that security insight not only includes applications that are constantly monitored, but that business units can innovate and find productivity gains without always going through time-consuming security clearances that can take months before an application is allowed to be useful to be.
79% of European companies save on operating expenses

Leave a Comment