Story image

Is managed security the answer to cyber crime?

04 Mar 2016

Businesses now more than ever need to stay on top of the emerging threat landscape, according to CenturyLink.

The company says new tools and evolving methodologies are giving hackers the resources to mount attacks more frequently, creating greater profits, turning cyber crime into a commercial enterprise.

Stuart Mills, regional director for CenturyLink ANZ, says the emerging threat landscape can be an enormous drain on internal resources.

Mills says managed security services give businesses a new way to keep pace.

“In some industries, cyber security is beginning to attain a core business service status, as the volume and value of information skyrockets,” Mills explains.

“It’s a lot to keep up with, especially if you consider the growing number of risks attached to company data,” he says.

“Instead of building up an internal cyber security centre to tackle these risks, companies can simply get someone else to manage it, so they can focus on their core business,” Mills says.

Mills says there are ways managed security services can help businesses keep up with the evolving cyber threat landscape.

Up-to-date defences

“Unlike internally managed security infrastructure, with standalone components that can become obsolete over time, managed security services are continually evolving to adapt to changing threats,” says Mills.

Endpoint protection

Mobile device use and the rise of the Internet of Things is dramatically expanding companies’ potential threat surfaces, Mills explains.

"Managed security services often provide device management, with endpoint protection and intrusion detection to protect the entire ecosystem,” he says.

Real-time response

According to Mills, a managed security service gives organisations the benefit of around-the-clock monitoring, management, and support without having to continuously maintain an internal team at all hours.

“Because there is always support at hand, incidents can be dealt with immediately,” he says.

Threat intelligence

“Threat intelligence working hand-in-hand with predictive analytics lets companies tap into a deep resource of up-to-the-minute intelligence on the latest threats from around the world,” says Mills.  

Lower overheads

Mills says externally managed security lets organisations offload the expense of maintaining a full-blown security operation internally.

“Because managed security providers can leverage their technology for multiple clients, it lowers the overall cost of security for end customers,” he says.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.