Technology Magazine June 2022 | Page 25

“ VMWARE DELIVERS BUILT- IN , DISTRIBUTED SECURITY SOLUTIONS DESIGNED SPECIFICALLY FOR THE THREATS CUSTOMERS FACE TODAY ”

Q . YOU ' VE MENTIONED IN REGARDS TO THREATS TO BUSINESS , THAT THERE NEEDS TO BE A PIVOT AWAY FROM PREVENTION TO INTRUSION SUPPRESSION . CAN YOU ELABORATE ?

» With geo-political tensions spilling over into cyber space , organisations must now invert the security paradigm and ‘ assume a breach ’ in order to effectively defend from within . Our new stark reality is that intruders can and will get into any environment . But , to prevent escalation we have to suppress their threat campaign by detecting , deceiving , diverting and containing , all without revealing ourselves to the adversary .

The core of this strategy should see endpoint detection and response integrated with network detection and response solutions , while also using deception technology to divert intruders . Attackers typically use nation state attack campaigns to hijack complex digital transformations and execute integrity attacks . Organisations need to recognise the urgency required in pivoting away from prevention techniques and towards intrusion suppression to combat these advanced cyber threat adversaries .
technologymagazine . com 25