Subscribe
About
  • Home
  • /
  • Business
  • /
  • Shifting Security Strategy from "No" to "Know" in a time fraught with challenges

Shifting Security Strategy from "No" to "Know" in a time fraught with challenges

Businesses are increasingly being driven to adopt mobility, cloud and social networking, creating what can be described as a security nightmare. CA Southern Africa will address the security challenges facing businesses at the forthcoming CA IT Management Symposium, taking place on 20 February.

"The ongoing evolution of Identity and Access Management (IAM) DNA creates and refines the foundation for tactical and strategic security objectives," says Eren Ramdhani, solution strategist - security, CA Southern Africa.

"The proliferation of new technologies has introduced new risks and vulnerabilities as CIOs are forced to heed the call from business to embrace new technologies - such as social media integration - while maintaining regulatory compliance and adherence to standards. With the boundaries of organisations being blurred as new requirements for enterprise application programming interface (API) management are brought to the fore, extending the reach of API sets outside of the organisation need to be managed pragmatically."

Ramdhani notes that advanced persistent threats (APT) have proven overwhelming for information security departments as they scramble to thwart assaults that employ advanced attack vectors. "In the knowledge economy, attacks aiming to harvest confidential information - often related to citizen, company and government secrets - are on the increase. Traditional controls have proven to be too reactive to sustainably contain the financial and reputational damage arising from compromised systems.

"There seems to be a consensus that the traditional rigid security approach of 'no' lacks visibility and must be supplanted by the approach of 'know' where the ongoing discovery and classification of data allows organisations to accurately identify their business-critical assets and then define suitable policies and user awareness around who can access what, when and where, in the appropriate context."

Ramdhani will address these issues and other critical security considerations in his presentation at the forthcoming CA IT Management Symposium.

For further information on the CA IT Management Symposium 2014:
http://www.itweb.co.za/index.php?option=com_content&view=article&id=66525&Itemid=2869

Share

CA Southern Africa

CA Southern Africa is the leading provider of IT management solutions in sub-Saharan Africa. CA Southern Africa is an IT management expert. It provides solutions and services that cover the entire IT management life cycle encompassing all areas of IT and security from distributed to mainframe, mobility and cloud.

Through the use of technology, CA Southern Africa assists customers to transform the economics of IT by: controlling complexity; assuring the quality of IT services; reducing costs and risk, and providing information to make the right strategic decisions.

CA Southern Africa is the sole representative of CA Technologies in sub-Saharan Africa and is a member of the JSE-listed EOH group of companies.

For further information, log on to:www.ca.com/za.

Editorial contacts

Deirdre Blain
Blain Communications
(+27) 11 462 4974
blain@iafrica.com
Joanne Cawrse
CA Southern Africa
(+27) 11 417 8645
joanne.cawrse@caafrica.co.za