Data Visibility is Key to Security Skip to main content

Gartner Forecasts Security and Risk Management Spending in India to Grow 12% in 2024

  GenAI-Driven Attacks Require Changes to Application and Data Security Practices and User Monitoring End-user spending on security and risk management (SRM) in India is forecast to total $2.9 billion in 2024, an increase of 12.4% from 2023, according to a new forecast from Gartner, Inc. Indian organizations will continue to increase their security spending through 2024 due to legacy IT modernization using cloud technology, industry demand for digital platforms, updated regulatory environment, and continuous remote/hybrid work. “In 2024, chief information and security officers (CISOs) in India will prioritize their spending on SRM to improve organizational resilience and compliance,” said  Shailendra Upadhyay , Sr Principal at Gartner. “With the introduction of stringent government measures mandating security breach reporting and digital  data protection , CISOs are facing heightened responsibility in safeguarding critical assets against evolving cyber threats.” Gartner analysts are di

Data Visibility is Key to Security


Details
    Published on Wednesday, 07 August 2013 06:56

Middle East organizations should devote more time and effort to gathering and using cybercrime intelligence, as it will give a good return on investment and assist in the establishment and review of IT security strategies and the creation of eCrime investigative measures.
cybercrime
The most important and obvious question surrounding this point is “how do you get that type of specialized intelligence?” The answer is companies and organisations should ensure they have a 360-degree view of their data, which includes data in motion, static data and volatile data.

 In order to achieve this, organizations should consider the implementation of a network capture and monitoring capability. This functionality, particularly during a network attack, would provide and identify essential information contained within the network data packets. This can assist the forensic analyst in determining whether the data traffic is routine or alternatively assist in identifying an attacker who is sending malformed packets to crash important systems or to gain unauthorized and privileged access. Permanent capturing of all network traffic is not normally necessary, however, having the capability to quickly employ such a capability can help to speed the analysis during an attack.


Secondly, commissioning an endpoint investigative capability across the enterprise environment enables full visibility into the ‘data at rest’. This ensures swift and efficient investigations into suspect assets, provides remediation and the ability to gather additional intelligence. Even with data packet capturing capabilities, difficulty remains in meeting an ever-increasing demand for resources to conduct intelligence assessments of the acquired intelligence. This is a genuine problem given the amount of data that a medium- to large-sized investigation may include. Therefore organisations should develop an intelligence analysis and remediation team, supported by robust policies, procedures, processes and best practices.


The recent history of hacking incidents and exploits shows there are recurring themes of failing to keep pace with the rate and variety of exploits. The worry is whether the lessons are being learned or is the gap getting wider? To reduce any such gap, organisations will need to understand the complex and dynamic developments of technical exploits and cyber security threats and how to make the most of available intelligence. They will need to invest in the skills necessary to enable them to gather intelligence in this ever-changing environment, otherwise, they will have to contend with playing ‘catch-up’ and being left with only a reactive posture.


There is a need for multidisciplinary partnerships between the public and private sectors to work on emerging problems with the abuse of technology by organised crime. This combined effort could produce a number of significant results, from developing research into technologies and tools, creating a repository for technical papers and improved intelligence. Some organizations are already encouraging their members, stakeholders and business partners to share knowledge, expertise and experience. This sharing of information and intelligence is giving companies the tools to put in place better defences to tackle the abuse of computers and IT systems. It is only through better understanding of the scale and the scope of the problem that they will be able to build effective strategies.


Organisations must realize that they cannot produce cybercrime intelligence in isolation. It will require them to establish internal and external partnerships that are supported by a framework of regulation and legislation. When establishing such partnerships there will be a need for organisations to transcend traditional boundaries in a cost effective and efficient manner, while maintaining control of their intellectual property and other critical assets. Any methodology needs to be broad to be adopted en masse, flexible to meet the needs of all and flexible to stand the test of time.


By Paul Wright, Manager, professional services and investigation team

Middle East, India and Africa at AccessData

Comments

Popular posts from this blog

Mobile Phones Sales Plummet

Details Published on Thursday, 16 August 2012 06:34 Worldwide sales of mobile phones reached 419 million units in the second quarter of 2012, a 2.3 percent decline from the second quarter of 2011, according to Gartner. Smartphone sales accounted for 36.7 percent of total mobile phone sales and grew 42.7 percent in the second quarter of 2012. "Demand slowed further in the second quarter of 2012," says Anshul Gupta, principal research analyst at Gartner. "The challenging economic environment and users postponing upgrades to take advantage of high-profile device launches and promotions available later in the year slowed demand across markets. Demand of feature phones continued to decline, weakening the overall mobile phone market. "High-profile smartphone launches from key manufacturers such as the anticipated Apple iPhone 5, along with Chinese manufacturers pushing 3G and preparing for major device launches in the second half of 2012, will drive the smartpho

$109B Cloud Services Market

Details Published on Wednesday, 19 September 2012 05:11 The public cloud services market is forecast to grow 19.6 percent in 2012 to total US$109 billion worldwide. Business process services (also known as business process as a service or BPaaS) represent the largest segment, accounting for 77 percent of the total market. Infrastructure as a service (IaaS) is the fastest-growing segment of the public cloud services market and is expected to grow 45.4 percent in 2012, according to Gartner. "The cloud services market is a high-growth sector," says Ed Anderson, research director at Gartner. "The key to taking advantage will be understanding the nuances of the opportunity and then prioritizing investments in line with the opportunities." BPaaS is the largest segment primarily because of the inclusion of cloud advertising as a subsegment. BPaaS is forecast to grow to $84.2 billion in 2012, up from $72 billion in 2011. In 2011, cloud advertising represented abou

India’s Mobile Market Challenges

Details Published on Tuesday, 30 April 2013 05:42 India’s mobile services market will reach Rs.1.2 trillion in 2013, up 8 percent from 2012 revenue of Rs. 1.1 trillion, according to Gartner. Mobile connections will grow to 770 million in 2013, an 11 percent increase from 712 million connections in 2012. “The mobile market in India will continue to face challenges if average revenue per unit (ARPU) does not grow significantly,” says Shalini Verma, principal research analyst at Gartner. “If the prevailing conditions do not change in the Indian telecom market, India will account for 12 percent worldwide mobile connections, but just 2 percent of worldwide mobile services revenue (in constant USD) in 2013.” Indian telecom operators are faced with two major challenges – growing their profit margin in the face of intense competition and successfully competing with over the top service providers, such as Facebook and WhatsApp. “As mobile voice services continue to get commoditized i