Intelligent Tech Channels Issue 11 | Page 16

ENTERPRISE TECHNOLOGY Organisations want to associate themselves with channel partners who are well-versed with the security threat landscape in the region. Ray Kafity, Vice President, Middle East, Turkey and Africa, Attivo Networks. for attack prevention. For example, the Attivo Networks ThreatDefend Platform is strategically designed to provide early detection of threats like Advanced Persistent Threat (APT), BOT, ransomware attacks, stolen credentials and man-in-the-middle (MitM), in addition to accelerated cyber incident response tools and methods. Furthermore, deploying the Attivo Camouflage for Dynamic Behavioral Deception provides automated self-learning technology to match the environment for the highest levels of authenticity. This technology will also simplify operations with automated deployment and will respin deceptions after an attack to avoid attacker fingerprinting and evasion. All in all, the channel needs to ensure their approach helps organisations meet the length and breadth of their security concerns. They need to raise the conversation to drive the focus to current cybersecurity solutions and become consultants to customers instead. For the reason being, as technology evolves into a new era of modernity, the cyber landscape also evolves as a complex new dimension for warfare. BEYONDTRUST Morey Haber, Vice President of Technology, BeyondTrust Organisations are facing an unparalleled variety of threats from ransomware to targeted attacks. According to the 2017 Verizon Data Breach Investigation Report (DBIR), 62% of breaches featured hacking, with a whopping 81% of hacking-related 16 breaches leveraging either stolen and/ or weak passwords. In addition, 51% of breaches included malware and 43% were socially driven attacks. Businesses are trying to keep up by hiring the best talent, installing defence solutions, and testing policies and procedures in the case of an incident or full out attack. Unfortunately, many businesses cannot tackle all of these problems due to size, budget and expertise. This is where the channel can help more than ever. Just like a multi-tasking operating system, a good security professional can easily help multiple organisations simultaneously while still leaving bandwidth for other tasks. It is about economies of scale; by using a security partner part time to help shore up defences, instrument policies and procedures, and even assist with The vendors we have relied on to provide these solutions are evolving to help provide them in real time, and security-focused channel partners leverage their expertise across multiple clients simultaneously to meet scalability. Morey Haber, Vice President of Technology, BeyondTrust. resources and technologies. Organisations can outsource the monitoring, response and even policy testing as a part of these MSP offerings and implement technology that the channel partner has years of experience implementing. CISCO Scott Manson, Cybersecurity Lead – Middle East and Africa, Cisco Morey Haber, Vice President of Technology, BeyondTrust. monitoring of threats, businesses of all sizes can benefit from security best practices typically reserved to enterprise environments or having full time staff. Awareness of security threats is critical. The vendors we have relied on to provide these solutions are evolving to help provide them in real time, and security-focused channel partners leverage their expertise across multiple clients simultaneously to meet scalability from the smallest business to multinational enterprises. These consultants can be ‘pay for hire’, but the trends in the channel are changing. More and more channel security partners are becoming Managed Service Providers (MSPs) to scale their As we’ve seen so far in 2017, malicious criminals are finding new ways to access company data. The avenue of attack is staying the same with denial-of-service (DDos) and malware attacks leading the hunt for data exploitation. Criminals, as a majority, still look to make a profit. However, in 2018 we will see a change in the methods criminals use to exploit information. Criminals look to exploit human vulnerabilities, not just system vulnerabilities. The next generation of attacks will use data and analysis to emulate the behaviour of specific users. With the amount of data that we, as everyday users, are pushing out into the Internet, criminals can begin to formulate a backbone story to our job and daily life. This is where social engineering comes into play. One of the most challenging trends in the channel is the dramatic shift in business Issue 11 INTELLIGENT TECH CHANNELS