About
Subscribe
  • Home
  • /
  • Internet
  • /
  • South Africa's second tier businesses slow to adopt IT security

South Africa's second tier businesses slow to adopt IT security

Johannesburg, 09 Apr 2010

South Africa's mid-sized companies are lagging behind enterprise-level companies when it comes to protecting themselves against internal and external security threats.

On an international comparison basis, the top-tier local businesses measure up very well in terms of protection. One step down there is a different picture altogether.

“Unfortunately, in these companies there is much less focus on security. Often security is just rolled into the key performance indicators of general IT activities and is not a responsibility consciously shared between IT, risk management and the board of directors. Internationally, the focus on security and risk management has been driven by the enforcement of regulations, which is a phase SA is about to enter into,” says Hedley Hurwitz, MD of Magix Integration.

Local companies are fairly advanced in establishing their perimeter security, but continue to underestimate the threat from their own trusted employees and third parties they interact with. Internal security still remains the biggest risk, with almost no visibility of activities and commensurate controls. An integrated IT security solution is the best investment a company can make.

“As more people face the prospect of unemployment or want access to a better lifestyle, the temptation level rises to steal information, which has a street value, and manipulate systems and data for financial gain. The insider threat grows stronger as the computer literacy of the average employee increases,” adds Hurwitz.

“No matter how complex and impenetrable perimeter security solutions become, the external opportunist will always find internal people looking to make some extra money. As always, without the correct policies, procedures and solutions in place, most will have a good chance of escaping without being caught.”

Magix Integration will be showcasing a number of IT solutions designed to help companies manage their internal and external risks and threats, at stand 23 at this year's ITWeb Security Summit from 11-13 May 2010. Held at the Sandton Convention Centre, the 2010 ITWeb Security Summit brings together leading international and local security experts and industry innovators, as well as a blue-chip audience of IT and security professionals.

The solutions include:

* Intellinx - This solution provides detection and protection against enterprise fraud, whether it stems from inside or outside of the organisation. It is perfectly suited to tackle fraud in the call centre, insurance, medical aid and financial service arenas, among others.

* Safend - Secures and protects the endpoints on a company network. It stops data theft and manipulation through its content discovery and inspection, encryption and comprehensive device and port control. Safend solutions are used around the world by small to mid-sized companies, multinational enterprises and government agencies.

* ObserveIT - Provides the ability to audit and record all user activities performed on a company's server platform. It records and indexes every window session on a network - either via remote access or console access, according to usage metadata. All recordings can be searched, navigated and replayed to identify any specific activity. Detailed reporting and real-time alerting ensures strict compliance with corporate security policies.

* IP Locks - Offers non-intrusive monitoring of the enterprise database environment. It is able to work across multiple database platforms. It has five components: vulnerability assessments, user behaviour monitoring, user privilege monitoring, metadata monitoring and content monitoring.

* Varonis - Gives companies total visibility and control over their data residing in documents and is able to ensure that only the right users have access to the right data at all times. It is suited to a whole range of companies in a variety of vertical sectors including the financial services, healthcare, energy, manufacturing and technology arenas.

Register for the IT Web Security Summit at http://www.securitysummit.co.za.

Share

Editorial contacts