my.IT|Vol 2|No 2|2019|Fortinet

Page 7

In addition, its open standards design allows you to integrate software and solutions from a variety of vendors to enable seamless protection and actionable threat intelligence across all points in your network, from IoT to the cloud. Fortinet has brought together over 40 Fabric-Ready Program Partners to deliver pre-integrated, end-to-end offerings ready for deployment, reducing the technical support burden, security management challenges and costs for enterprise customers. If everything is working together, network hacking becomes much more difficult to do. Malaysia is moving towards the digital economy. How prepared is Malaysia to face this new economy, especially in terms of cybersecurity? The Malaysian government has declared its intention to accelerate adoption of technology and e-services to boost efficiency & transparency. For this reason, cybersecurity will remain high on its national security agenda. The government will also introduce a national cybersecurity policy in the first quarter of 2019. The policy will be implemented in hopes to overcome global and local cyberattacks in Malaysia, including protecting netizens’ personal information. As technology becomes central in driving digital transformation and business processes, it also makes the current enterprise IT environment more complex to secure and control. Some of the key factors include: Multiple networks, physical and virtual: Businesses are now relying on multiple networks for communication, including public/ private, wireless and 4G/5G networks. Adoption of virtualization, SDN and the public cloud is accelerating.

Off-network resource management: Applications and data are now accessed from a variety of locations including remote offices, branches, on the road or from the cloud. Mobility: Users access corporate resources from inside and outside the corporate network with an evergrowing range of corporate and personal devices (BYOD). Ever increasing bandwidth requirements: To keep up with business evolution and the data explosion driven by digital transformation, organizations must enable and protect higher data volumes and Ethernet speeds. Advanced threats penetrating businesses: The increase and sophistication of cyber-attacks don’t stop, exposing organizations to thousands of new malware variants found every day and new advanced targeted attacks. Lack of internal network security: Even as the sophistication of cyberattacks increase, and mobility and cloud get adopted by enterprises, many firms’ internal networks remain flat and open with no or basic security controls. Organizations’ traditional focus on perimeter security facilitates the propagation of threats within their internal networks, increasing the damage to the business.

What are some of the challenges facing cybersecurity industry in the coming years? We foresee four big challenges facing today’s organisations: complexity, borderless networks, speed in decision-making and talent shortage Complexity: As networks adopt new technologies and solutions, such as cloud and IoT, they are becoming increasingly complex. Deploying additional, isolated security solutions actually compounds the problem and increases the costs of deployment, management, and orchestration. Networks are borderless: Traditional security strategies designed to protect the edges of the network become less effective when the perimeter is constantly changing, resources are highly distributed, and data moves dynamically from IoT and remote devices across a network of physical, private, and public cloud environments. Speed and responsiveness: To remain competitive, networks need to deal with the twin challenges of exponentially increasing data volumes and the speed at which decisions need to be made. Security cannot afford to get in the way of business demands. Security skills shortage: A global shortage of cybersecurity talent combined with regulatory pressures continue to add to the complexity facing organizations. The number of available security professionals in the market cannot keep up with demand.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.