Intelligent CISO Issue 43 | Page 74

Traditional cybersecurity was made and developed for the time it was relevant in , but things have evolved .

THE EVOLUTION OF NETWORK SECURITY : WHY ORGANISATIONS NEED A NEW APPROACH

There is no doubt that the network perimeter has changed as workforces are now spread across office , home and remote environments . Traditional approaches to cybersecurity are no longer adequate . Here , Brendan Maccarron , Palo Alto Networks Channel Manager , Southern Africa , Westcon-Comstor , and Kylie Wilkinson , EMEA Vendor Product Manager at Westcon-Comstor , Palo Alto Networks , highlight how the rapid evolution of IT and accelerated digitalisation has impacted the network perimeter , as well as how Weston-Comstor works with partners to deliver Palo Alto solutions to end-users in this region .

h

How has the rapid evolution of IT and accelerated digitalisation impacted the network perimeter ?
KW : With the network perimeter , everything has changed . We see now , more evident than ever before , that people are working remotely . They ' re working from coffee shops ; they ' re working from different countries . This was all an idea in the past and as things have changed , it ' s become people ' s reality . So , you ' ve got people working from different locations , all trying to log into the same data , same set of information , same server . So , the perimeters have shifted from being an office bound space or a data centre space , to covering where all your employees or users are based .
How has traditional cybersecurity fallen behind ?
KW : Traditional cybersecurity was made and developed for the time it was relevant in , but things have evolved . As mentioned , we ' ve had a pandemic and different working scenarios for all that we ’ ve been faced with . So that ' s changed massively . Cybersecurity has had to keep up-to-date and there ' s been lots of ways that different vendors have gone about it . But it always boils down to research and development .
What tools and technology do organisations now need to proactively deliver protection against these advanced threats ?
BM : I think most importantly , it ’ s being able to identify the users and enable appropriate access , and , at the same time , safely enable them to control the functions around it . There also needs to be a focus on the detection and response and what technology behind it is in use to respond to threats and how organisations are remediating against these threats . I think those would be the key features to focus on initially .
What are the key requirements for a next-gen firewall ?
BM : Being able to identify the applications , regardless of their port protocol , or evasive tactics or
Brendan Maccarron , Palo Alto Networks Channel Manager , Southern Africa , Westcon-Comstor

Traditional cybersecurity was made and developed for the time it was relevant in , but things have evolved .

74 www . intelligentciso . com