Story image

Impact of legacy technologies on threat alert response and cloud adoption among Aus enterprises

12 Nov 2018
Sponsored

Article by Juniper Networks A/NZ systems engineering director Ash Halford

Despite being viewed as one of the most technologically mature markets in APAC, the reality is that most Australian enterprises today are hamstrung by the same technologies that once helped advance the nation’s IT economy.

A recent report we conducted in conjunction with Ovum Research has revealed the critical security challenges facing Australia’s IT managers as they wrestle with the systems that once helped advance the nation’s IT economy.

As cyber criminals discover new ways to mount attacks and respond in real-time to emerging revenue opportunities, enterprise decision makers have responded by deploying patchworks of new security solutions.

This has, over time, created siloed security tools, each reporting to their own dashboard.

In this environment, automation of key security operation tasks is essential to more effectively prioritise and analyse alerts, enabling security teams to respond faster to the most crucial threats.

According to the report, just 20% of Australian IT managers said they had a standalone management layer in place into which all their security tools can report and from where activities can be orchestrated.

Compounded by a growing wave of illegitimate security threat alerts, this presents a major management challenge for Australian IT managers as they are required to monitor multiple consoles and cross-reference between disparate screens and information formats.

The report also indicates that Australian enterprises have emerged as APAC’s least ‘cloudified’ market after Korea, with 64% of Australian IT managers reporting low-to-no migration of their company’s workloads to the cloud.

This trend is more representative of the entrenched legacy infrastructure prevalent among Australian enterprises than strict opposition by organisations to the cloud.

When it comes to securing these workloads, off-premises security policy management is not yet well established in Australia.

However, as the uptake of cloud-based services gathers pace, there will be a need for IT managers to extend security functions to the cloud.

In conclusion, the findings of the report should come as a serious wake-up call for Australian businesses that have become, or risk growing, complacent in their approach to security.

For Australian businesses to maintain their leadership, complexity and silos must be brought out of the enterprise security equation, and be replaced with a ‘single pane of glass’ approach to data management.

To download the full report, visit Juniper’s security webpage, The Shield.

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.