TechCentralTechCentral
    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Big changes to Joburg load shedding schedules

      30 October 2023

      Ditch the ‘useless politicians’, top CEO urges

      30 October 2023

      Fight looming over zero rating in South Africa

      30 October 2023

      Compared: Starlink prices around the world – including Africa

      30 October 2023

      M3 Macs incoming at Apple Halloween event

      30 October 2023
    • World

      Facebook subscriptions launched in EU – no ads for R200/month

      30 October 2023

      Sundar Pichai defends Google’s business practices

      30 October 2023

      Vodafone is poised to offload its Spanish operation

      30 October 2023

      Apple is losing Chinese consumers to Huawei

      30 October 2023

      G7 to agree AI code of conduct for companies

      29 October 2023
    • In-depth

      Africa is booming

      30 October 2023

      Quantum computers in 2023: what they do and where they’re heading

      22 October 2023

      How did Stephen van Coller really do as EOH CEO?

      19 October 2023

      Risc-V emerges as new front in US-China tech war

      6 October 2023

      Get ready for a tidal wave of software M&A

      26 September 2023
    • TCS

      TCS+ | Fortinet, and the invisible tech that powers our lives

      30 October 2023

      TCS | Mesh.trade’s Connie Bloem on the future of finance

      26 October 2023

      TCS | Rahul Jain on Peach Payments’ big funding round

      23 October 2023

      TCS+ | How MiWay uses conversation analytics

      16 October 2023

      TCS+ | The story behind MTN SuperFlex

      13 October 2023
    • Opinion

      Big banks, take note: PayShap should be free

      20 October 2023

      Eskom rolling out virtual wheeling – here’s how it works

      4 October 2023

      How blockchain can help defeat the scourge of counterfeit goods

      29 September 2023

      There’s more to the skills crisis than emigration

      29 September 2023

      The role of banks in Africa’s digital future

      22 August 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Promoted Content » Security automation tools are not yet Soaring

    Security automation tools are not yet Soaring

    By Obscure Technologies11 February 2020
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Technology tools that automate and standardise the response to cyberattacks have allowed Nedbank to dramatically slash the time spent securing its operations.

    Automating routine tasks like intrusion detection and removing phishing e-mail has made its systems more secure and freed up its technicians for other tasks, said Japie Vermeulen, head of Nedbank’s Security Orchestration, Automation and Response (Soar) division.

    Nedbank’s Japie Vermeulen, second from right

    One network traffic monitoring task that took three hours a day is now finished in six-and-a-half minutes, while a process of removing rogue e-mails that previously took two hours is now down to two and a half minutes.

    The transformation was achieved using Soar tools, Vermeulen said at a TechCentral roundtable on “Securing the Future”. He believes he can free up six full-time professionals this year by using Soar tools to further automate Nedbank’s security measures.

    But the growing niche of Soar technology has a dark side, too, because automating a process can just “bake in” the badness of processes that should no longer exist at all. Ideally, implementing a Soar strategy should be preceded by examining the company’s processes first, so any antiquated steps can be eliminated or updated. Businesses often run unnecessary processes because nobody dares to question why something is done in a certain way, the panellists agreed, and automating them just compounds the problem.

    Ideally, implementing a Soar strategy should be preceded by examining the company’s processes first

    Vermeulen also says Soar tools must be managed by people who can code, are passionate about security, and understand the business and its risks. “If you don’t have skilled resources to run it, it’s just another tool sitting there and costing you money,” he warned.

    The roundtable, sponsored by Obscure, Dimension Data and Palo Alto Networks, brought together C-suite security experts from the public and private sectors. They all face the challenge of protecting their organisations from a barrage of assaults that forces them to spend a disproportionate amount of time and effort on firefighting, instead of focusing on adding value and taking the business forward.

    Boost to security

    Soar tools promise to boost security by connecting the often-unwieldy mess of products and processes to standardised, automatable workflows to response to incidents faster and in the same fashion every time. But their take-up isn’t soaring yet, with Gartner predicting that only 15% of organisations will be using them this year.
    The roundtable saw spirited debate between customers and technology suppliers, with CIOs speaking from their hearts and calling for vendors to work as partners, share the risks, and walk the journey with them.

    They also urged international companies to stop charging so much for their software, with Charles Kungwane, the Chief IT security officer of Motus, proposing that South Africans form a new regulatory organisation to determine how much software companies could charge, much as the construction industry is regulated. Other participants pointed out the impracticalities of that, since buying software isn’t the same as buying a square metre of property.

    Motus’s Charles Kungwane

    But Nampak technology architect Celia Geyer agreed that high prices are a real prohibitor in Nampak’s technology choices. “The challenge for me is that all these new threat analytics and tools that we need and that would make a difference for our organisation are just too expensive. This is a real challenge in South Africa overall,” she said.

    Nampak’s Celia Geyer

    South African organisations are an attractive target for cybercriminals because in security terms it’s lagging behind other countries, the participants fear.

    Yet the need for robust IT security was highlighted clearly by Cyril Baloyi, chief technology officer for the City of Johannesburg, who spoke about various incidents where old and badly maintained systems had collapsed, and a ransomware attack where a hacker tried to encrypt files on the computers.

    City of Johannesburg’s Cyril Baloyi

    “We were hit because we had holes and we knew about them, but we didn’t implement fixes on them. The whole thing is a messy, obsolete environment,” he said. “It was a blessing in disguise that we were hit because that made the political principals understand what’s needed.” Some of the measures being imposed now include taking a “zero trust” approach with employees, he said.

    Mauritz Grobler from Dimension Data said new technology often fails because of a significant gap between what it is capable of and the skills within the client organisation to make that happen. With security, it’s important to understand what the risks are, and ensure that someone at management level is responsible so whenever a threat is discovered they take ownership and drive the fixes through.

    Dimension Data’s Mauritz Grobler, second from left

    “Automation is the future of cybersecurity because we don’t have enough skills and we never will,” agreed Dario Fachin, head of IM – Global Information Security at De Beers. But automation tools are not plug and play, because out-of-the-box solutions show too many false positives so a lot of tweaking is needed, he said. De Beers is now using behavioural analytics and machine learning in its security measures, but it still takes a human to write the code and make the changes.

    De Beers’ Dario Fachin

    The benefits of Soar tools are expanding well beyond the initial field of security into automating other routine aspects of a business, said Matt Poulton of Palo Alto Networks.

    Palo Alto Networks’ Matt Poulton

    Soar is evolving from the “s” of security to the “o” of orchestration, and being used to automate and secure mundane tasks like human resources processes or cloud configuration.

    • This promoted content was paid for by the party concerned
    Dimension Data Obscure Obscure Technologies Palo Alto Networks
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleE-tolls to be hiked despite uncertainty over their future
    Next Article South Africa’s debt picture cause for real worry

    Related Posts

    Accelerating IoT-driven transformation with HPE Aruba

    30 October 2023

    Tech is key to small business growth in South Africa

    30 October 2023

    Dimension Data to be renamed NTT Data

    27 October 2023
    Promoted

    Accelerating IoT-driven transformation with HPE Aruba

    30 October 2023

    Tech is key to small business growth in South Africa

    30 October 2023

    Acsa aims for carbon neutrality by 2050

    27 October 2023
    Opinion

    Big banks, take note: PayShap should be free

    20 October 2023

    Eskom rolling out virtual wheeling – here’s how it works

    4 October 2023

    How blockchain can help defeat the scourge of counterfeit goods

    29 September 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.