MANAGING SMAC SECURITY CHALLENGES
There is no doubt about the fact that the usage of SMAC brings a number of advantages to the enterprise. In fact, organizations cannot afford to ignore this trend, as this could only mean losing out in today’s competitive marketplace. Given this scenario, organizations are gearing up their enterprise security architecture to accommodate SMAC.
For instance, to accrue several benefits offered by the cloud model, while addressing security threats, Reliance Big Entertainment and Reliance Entertainment – Digital have built a robust security policy.
“We have adopted a hybrid model where we have created a private cloud for apps and websites which require the highest form of security. We have used Unified Threat Management (UTM) and Web Application Firewall (WAF) kind of application layer security apart from firewall and secured line of businesses for data flow management,” informs Sayed Peerzade, Vice President – Technology at Reliance Big Entertainment & Reliance Entertainment – Digital.
The company has also adopted proper encryption tools like SDM for video content as well as captured analytical data which flows across to be in central storage. Considering growing security risks, organizations are realizing that traditional enterprise security approach needs to undergo significant changes and are evaluating and implementing solutions that offer holistic security.
We have planned to implement SIEM with the goal of introducing greater intelligence and automation into the collection, correlation, and analysis of log and alert data, which in turn, allows security analysts to focus on what is most important – Makesh Chandramohan, Head–Information Security & Business Continuity, Birla Sun Life Insurance
A case in point is Birla Sun Life Insurance, which is using Security Information and Event Management (SIEM) technology to ensure robust security. Makesh Chandramohan, Head–Information Security & Business Continuity of Birla Sun Life Insurance informs, “We have planned to implement SIEM with the goal of introducing greater intelligence and automation into the collection, correlation, and analysis of log and alert data, which in turn, allows security analysts to focus on what is most important.” He believes that contextual security, like monitoring actions of an employee after resignation, change in behavior patterns, increased access to the corporate assets on odd time, etc, is very important.