Threat Prevention Software Expected To Take-Over In The Future

by April 19, 2018 1 comment

A secure life is what everybody yearns for – be it humans or your organization’s IT infrastructure.

When we talk about security in the present day world, I guess securing our computer network takes the first place on the priority list.

Now, not only your laptop needs to have antivirus but the entire IT infrastructure of your workplace needs to be safe and secure; It includes network, cloud, software, hardware, browser security and the list is long.

Though, just like prevention is better than cure, there is certain preventive software that protects your IT system. And when talking about innovation, there will be certain preventive software, which will take-over in the future.

We also had a word with industry giants on the topic under discussion, let see what they had to say:

Anjali Arora, SVP and Chief Product Officer of Rocket Software talking about security software stated, ‘There’s no way to predict what technologies will emerge in the future, but the number one trend that we see is multifactor authentication (MFA). No security system is foolproof, but a combination of passwords, facial recognition, phone verifications, geolocation and other related security approaches is going to be critical to protecting data. At the same time, this technology is going to need to work seamlessly because people don’t want to spend five minutes waiting for a text message with a code every time they want to bank online. User experience is overlooked a lot of the time, but if a security protocol is too difficult to use in the real world people will simply bypass it and rick serious information losses’.

On the other end, Ram Shankar Srinath, Senior Director, Software Engineering, Juniper Networks IEC mentioned two measures that will prevent the threat, he stated,

  • ‘A threat detection engine—Cloud-based threat detection engines to detect known and unknown malware. Known threats are detected using feed information from a variety of sources, including command control server and GeoIP. Unknown threats are identified using various methods such as sandboxing, machine learning, and threat deception.
  • ‘User intent-based policies—Create policies according to logical business structures such as users, user groups, geographical locations, sites, tenants, applications, or threat risks. This allows network devices (switches, routers, firewalls and other security devices) to share information, resources, and when threats are detected, remediation actions within the network. With user intent-based policies, you manage clients based on business objectives or user and group profiles. Unlike rule-based policies, which can contain several rules, you can define only one set of parameters for each user intent-based policy defined on a device’.

Whereas, Josh Feinblum, Chief Security Officer of DigitalOcean shared the preventions they take to keep their internal and external system safe from cyber threats. He mentioned three crucial points,

  • ‘We have a lot of systems that we’ve purchased and built to defend our environments, but the most important are foundational controls like two-factor authentication, jump hosting, and patch management.
  • Protecting systems requires a consistent and long-term focus on doing the fundamentals.  Once you are doing the fundamentals well, then you can get into cool emerging technologies like anomalous system and user behaviour detections.
  • Every environment is different.  The right multi-layered approach requires environmental context and a commitment to the fundamentals and should start with the easiest controls to implement that make the largest improvements to risk’.

He also said, ‘Security technology will continue to get better at detecting anomalous behaviour from systems and user with a low signal to noise ratio’.

Hence, these insights from the industry techies clear the air for the future.

1 Comment so far

Jump into a conversation
  1. Bimal Jha
    #1 Bimal Jha 4 December, 2018, 05:55

    Very Informative tech article. thank you Anjali!

    Reply this comment

<