Subscribe
  • Home
  • /
  • Computing
  • /
  • Companies at risk of unauthorised access to critical data

Companies at risk of unauthorised access to critical data


Johannesburg, 09 Jul 2018
Troye technical director Kurt Goodall points to a number of defence mechanisms to protect one's business from threats.
Troye technical director Kurt Goodall points to a number of defence mechanisms to protect one's business from threats.

Recent local cyber attacks are a forewarning of things to come, and it clearly shows the vulnerabilities of South African companies. Although in recent attacks customers have not necessarily suffered any financial losses, this could quickly change with personal and financial information in the hands of cyber criminals.

Ensuring the integrity of company data is not a simple task, especially as cyber crime, fraud and data breaches are on the increase. Today, both small and large companies need world-class security solutions to safeguard confidential information, ranging from Internet threat protection to policy control for secure Web traffic.

Businesses need proper protection against cyber threats and intellectual property leaks, while also ensuring compliance with corporate content and access policies. Network and user activity monitoring is crucial as threats are not always external; companies need to secure all roaming users and mobile devices.

Troye technical director Kurt Goodall points to a number of defence mechanisms to protect one's business from threats. "These could include malicious URL requests, viruses, advanced persistent threats (APTs), zero-day malware, adware, spyware, botnets, cross-site scripting, and much more.

"Troye provides a world-class Web application firewall, which is ICSA, Common Criteria and FIPS-certified. It analyses bi-directional traffic, including SSL-encrypted communication, protecting customers against a broad range of security threats," he explains.

Goodall says there are tools to perform deep-packet inspection of HTTP, HTTPS and XML, as well as protection against OWASP, SQL injection attacks, cross-site scripting attacks, and cookie tampering. "One should also do form validation and protection, HTTP and XML reply and request format validation, plus JSON payload inspection, signature and behaviour-based protections, and data loss prevention (DLP).

"In addition, one should do traffic monitoring for intended and unintended data exposure, Denial of service (DOS) protection, authentication, authorisation and auditing support and reporting, and policy tools that provide for easier PCI-DSS compliance verification," he warns.

Troye's solutions, which include the Citrix NetScaler ADC/WAF, provide for unmatched security, superior Layer 4 to Layer 7 (L4-L7) load balancing, reliable GSLB, and increased up-time. Performing application-specific traffic analysis to intelligently distribute, optimise and secure L4-L7 network traffic for Web applications helps prevent application layer attacks.

The application delivery controller (ADC) allows legitimate client requests while blocking malicious requests. It provides built-in defences against DOS attacks and supports features that protect against legitimate surges in application traffic that would otherwise overwhelm the servers.

"An available built-in firewall protects Web applications from application layer attacks, including buffer overflow exploits, SQL injection attempts, cross-site scripting attacks, and more. In addition, the firewall feature provides identity theft protection by securing confidential corporate information and sensitive customer data," he concludes.

For more information about modern security solutions for the modern data centre, contact Troye at sales@troye.co.za or on (011) 705 2757.

Share

Troye (www.troye.co.za)

Troye is a leading 51% black women-owned level 1 BEE IT solutions specialist and professional managed IT services provider. The accreditation was issued in May 2018 by the South African National Accreditation System (SANAS) accredited BEE verification agency Honeycomb.

Over the past decade, Troye has designed and implemented superior integrated IT solutions for its small, medium and enterprise customers, concentrating on end-to-end virtualisation solutions.

Troye invests heavily in its customers through exceptional service excellence. This ensures a better understanding of the customer's business and technology requirements. More importantly, it enables customers to focus on their core business activities with the assurance that their investment in technology is safeguarded.

Troye focuses on minimising both cost and risk, maximising return on investment, driving innovation and safeguarding their customers' business for the future.

Editorial contacts