Technology companies gearing up to tackle Cyber security The adoption of the hybrid work model has increased the dangers. Experts believe that the hybrid mode of working has increased the adoption of digital operations thereby increasing the need to protect the generated data.
A recent study by Forrester found that 80% of Indian organizations are planning to adopt a hybrid work model in the next 12-24 months. However, 71% of security leaders said they lack high or complete visibility into remote employees’ home networks, raising major security concerns.
Huzefa Motiwala, Director of Systems Engineering for India and SAARC, Palo Alto Networks, said hybrid work has brought multiple clouds, devices, networks and endpoints into the mix, which has widened the digital attack surface. “Swapping between these, while they remain part of the corporate network, can leave enterprises vulnerable to attacks. Too many of these can complicate cybersecurity strategy, while weak remote access policies and implicit trust across multiple devices make it easier for bad actors to gain access and organize breaches.”
Networking major Cisco said its Zero Trust platform provides a solution for securing all access to an organization’s applications and infrastructure. Zero trust is a security model based on maintaining strict access controls and trusting no one by default.
“Unlike traditional security, the security offered by XeroTrust is not based solely on location. This way, you can be sure that only the right people and devices have permission to access specific data at a specified time. We have There is also a secure hybrid work solution that integrates security at scale and makes it easier for users to verify devices, enable secure access and always protect hybrid workers from any location,” said Minhaj Jia, Director, Collaboration Sales, Cisco India and SAARC said.
IBM has also adopted a zero trust strategy that provides effective access control to balance trust and risk. “We leverage IBM security software solutions that use machine learning and artificial intelligence to analyze key parameters such as user, device, activity, environment and behavior in the context of determining an overall risk score. Makes more precise, contextual authentication decisions to better protect both the users experience,” said Prashant Bhatkal, security software sales leader, IBM Technology Sales, India and South Asia.
According to the Dell Technologies Global Data Protection Index report, many businesses lack the ability to handle mission-critical data because they are currently handling 10 times more data than they were 5 years ago.
“With the growth of this data, the need to manage business processes across multiple networks has increased significantly. Hence, it is imperative for businesses to ensure seamless management of data with customized cyber security infrastructure solutions. Penetration for malicious actors With an increase in points, as well as leaks in sophisticated ransomware, malware and sensitive information, the loss of mission-critical data can cripple an organization, slowing their growth in the digital age,” said Ripu Bajwa, Director Said and General Manager, Data Protection Solutions, Dell Technologies India.
At Dell Technologies India, employees are regularly updated about global data protection standards. “Our initiatives such as choosing a VPN (virtual private network), conducting password audits and adopting the right infrastructure solutions at the workplace keep Dell Technologies employees safe and optimistic,” Bajwa said.