Page 13 - Data Security Edition 2022
P. 13

Organizations Are




       Adopting Superfast



       Defense Mechanisms



       to Protect Data






       Rajesh Maurya
       Regional Vice President,
       India & SAARC, Fortinet




    Trusted  by  more  than  530,000  Today,  integrated,  automated  A  mesh  architecture  needs  to
    customers,  Fortinet  delivers  platforms  that  provide  visibility  protect people, devices, and data
    i n t e g r a t e d ,   b r o a d   a n d  and  trigger  superfast  defense  on  any  network  regardless  of  the
    automated  protections  for  mechanisms  are  being  adopted.  edges they cross. The firewall is at
    companies,  securing  data,  Because  cybersecurity  is  so  the core of the approach, providing
    critical devices, and connections  complex,  streamlining  cannot  be          high  levels  of  security  and  robust

    from the data center to the cloud      done by simply removing devices.        inspection for the edge, at the edge
    and even the home office. In an         Organizations will need more tools      t o   i n c r e a s e   t h e   s p e e d   a n d
    exclusive  conversation,  Rajesh       to detect ever subtler tactics and      effectiveness  of  detecting  threats
    Maurya talks about the need for a      techniques  in  the  future.  Devices   in real-time.
    robust  data  security  strategy       need to share threat information  Zero-trust  methodologies  must

    and  how  the  data  security          and shrink the gaps through which  also  be  part  of  the  approach
    market will likely perform in India    attackers  slip  in  to  reduce  because establishing identity and
    and globally.                          complexity.                             assessing  posture  is  critical.
                                           Best Data Security Practices            Protection  of  the  endpoint  using
    Need for a Robust Data Security                                                EDR and XDR will also be necessary
    Strategy                               Today,  we  are  witnessing  the        as the need to support increasingly

    With  the  explosion  of  edge         ability  of  advanced  security  to     connected experiences rises.
    devices,  the  complexity  of  the     enable levels of innovation never
    architectures, and the paramount       seen  before.  In  addition  to  Unified  policy  management  and
    importance of securing our hyper-      security-driven  networking,  zero- o r c h e s t r a t i o n   e n g i n e   w i t h
    connected  world,  the  old-school     trust  network  access,  adaptive  supporting  APIs  must  allow  for
                                           c l o u d   s e c u r i t y ,   a n d   o p e n  many  native  and  third-party
    approach  of  using  security  point                                           integrations as well as meaningful
    solutions  that  aren't  natively      a r c h i t e c t u r e s   a r e   o t h e r   a u t o m a t i o n   a n d   v a l u a b l e
    integrated  do  not  make  sense       fundamental building blocks of a        intelligence for everything to come
    anymore.                               mesh design.                            together.



                     March 2022
   8   9   10   11   12   13   14   15   16   17   18