PWC
example , it can add value a way no single technology provider could . “ We understand how businesses function as well as understand the technology ,” he says . “ The technology we use to counter global threats is complicated . People don ’ t want to deploy it on their own . Networking organizations don ’ t know how the business units work . The problem has to be approached from both angles . Our deep business knowledge is what differentiates us , along with our partnership with industry leading technology providers like Palo Alto Networks , with whom we developed the Security Framework for Business Leaders last year to help our clients establish breach prevention security postures .”
In principle , keeping networks safe is quite simple . First , prevention of unauthorized access to the network thwarts any hacking attempt right on the border . If they can ’ t get in they can ’ t find anything out . Second , in the event of entry they can be contained from making any progress – this is done through segmentation and monitoring of all application and user activity . “ Once hackers breach outer layers of protection and get inside the organization they
242 May 2017