ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

A security trifecta: Encryption, analytics and applications

By Heather Wright
Fri 15 May 2015
FYI, this story is more than a year old

Data encryption, application security and analytics are proving hot security areas, offering businesses ways to ensure that even if breached, they can remain ahead of the game – and providing resellers new opportunities in the burgeoning security market.

Marco Corrent, HP Enterprise Security Products ANZ regional channel director, says data encryption is riding high thanks in part to the move to cloud.

He says data encryption mitigates against any perceived risks of putting data in the cloud and ensures if it is stolen, or breached in some way, the data won’t be able to be accessed due to it being encrypted.

“If an adversary does breach your network and steal data, if that data is encrypted and needs a special key to decrypt it, it’s worthless to the adversary,” Corrent says.

“It’s an area that is really gaining momentum because you’ve got a lot of customers moving data and workloads to the cloud. They no longer have full visibility and full control of that data.”

 “If a customer is looking to deploy a cloud strategy, that’s one of the best, hottest areas to be talking security at the moment,” Corrent says.

"Those customers often will have to present a risk assessment to the business and one of the key issues in that risk assessment is security and who has ultimate control of the data."

HP Enterprise Security, which has just appointed Duo as its second New Zealand distributor, alongside Arrow, recently bolstered its portfolio, acquiring Voltage Security in February to expand its data encryption offerings. Voltage sits alongside HP’s Atalla information security and encryption business and highlights the trend to focus on end-to-end protection of data itself.

Corrent says protecting applications from attack is also proving a key area.

"What we are seeing now is cusotmer built applications that are facing the web, are tied in to back-end company systesm and critical customer data," he says.

“Adversaries are recognising that they can target those applications for vulnerabilities.”

He says unintentionally, many applications are open for vulnerabilities, having been written without a security focus in mind.

“Applications are designed for a particular business outcome and genearlly are developed with functionality in mind. And for forever and a day, application developers have been writing applications without a real focus on security in mind, as this has traditionally been the responsibility of the security teams within an organisation.

“Now customers are realising that they’ve made significant investments in firewalls and perimeter security, but they’ve deployed custom build web facing applications, and while there are levels of security behind the application, if an adversary can get in via the app, that’s a new vector for attack.

“Those applications now need to be secured.

“It’s an area we are really seeing take off.”

But despite best efforts Corrent says being able to protect against attacks is becoming more and more difficult due to the sophistication and velocity of targeted cyberattacks, and many companies are investing in analytics.

“That way they can monitor their networks and applications and see nefarious behaviour and shut it down more quickly,” he says.

“While perimeter security is still front of mind with many customers, they understand that they are still being breached and that security information and event management solutions (SIEM) solutions help identify the adversary once they're in.

“You can spend a lot of money keeping them out, but it’s very hard to stop a rogue employee, or someone bringing a USB stick in, or someone responding to a phishing email.”

While security may be a hot topic, Corrent says there are many New Zealand organisations that are still not fully aware of the sophistication of the adversaries and similar to Australia, there is an attitude that targets are the really large enterprises and government department.

"In reality it can happen to any organisation that holds valuable customer data or intellectual property," he adds.

“I’m not sure there have been enough examples of severe high profile seccurity breaches in the New Zealand market to really spark customers up to thinking that they can be a target of a sophisticated attack and that they have to start thinking about it in more detail.

“In Australia the threat landscape is becoming more prevalent and there are more and more examples of breaches, with some Australian organisations in various industry verticals and some federal government agencies breached and reported in the press.

"That has generated a lot of interest at the highest levels within organisations to really start considering cyber security as a key requirement."

Related stories
Top stories
Story image
Dynabook
Dynabook refreshes Portg X30L series with the Portg X30L-K
The new model contains hybrid-architecture Intel 12th Gen Core P-Series 28W processor options, Wi-Fi 6E, along with Intel Iris Xe graphics.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Microsoft
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
Wireless
Hands-on review: HyperX Pulsefire Haste wireless mouse and HyperX Pulsefire XL Mat
With its lightweight Pulsefire Haste wireless mouse and RGB lit Pulsefire XL Mat, HyperX sets out to up your game and add a little colour to your desktop.
Story image
Microsoft
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Getac
Getac and Optalert expand partnership to promote industrial safety
Getac’s ZX70 Android tablets will be used to support Optalert’s Eagle Industrial early-warning drowsiness detection system for use in mining and transportation.
Story image
Cybersecurity
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
ChildFund
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
Malware
'Alarming' rise in ransomware threats - Verizon report
As criminals look to leverage increasingly sophisticated forms of malware, it is ransomware that continues to prove particularly successful.
Story image
Phishing
Vishing attacks reach all time high - Agari and PhishLabs
"Hybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of total share in volume so far in 2022."
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Booster
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Training
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Sony
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Artificial Intelligence
SAS announces new products amid cloud portfolio success
Analytics and AI company SAS is deepening its broad industry portfolio with offerings that support life sciences, energy, and martech.
Story image
Omnichannel
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
Ransomware
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll. 
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Training
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Cybersecurity
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Employment
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Vodafone
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
SaaS
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Gaming
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe solid-state drives with the WD_Black SN770 Game Drive.
Story image
Sustainability
Legrand unveils Nexpand, a data center cabinet platform
Legrand has unveiled a new data center cabinet platform, Nexpand, to offer the necessary scalability and future-proof architecture for digital transformation.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Ransomware
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.
Story image
Cybersecurity
Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
Ransomware
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Artificial Intelligence
Frost & Sullivan recognises Genesys as leader in new reports
Frost & Sullivan has recognised Genesys as a leader in the cloud contact centre market for its robust cloud and digital capabilities.
Story image
Surveillance
i-PRO releases smallest AI-based surveillance camera on the market
The new i-PRO mini network camera is now available, with a pocket-sized form factor and full AI analytics functionality.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Surveillance
Motorola Solutions acquires Videotec S.p.A for security portfolio
Motorola Solutions has acquired Italian ruggedised video security company Videotec S.p.A, along with its portfolio of highly versatile cameras.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.