Advanced SOC Operations / CSOC , CISO Trainings , Compliance

Security Spending for the Long Term

Juniper's Paul On Security Investment, Policy Enforcement
Security Spending for the Long Term
Sajan Paul - Director, Systems Engineering India & SAARC - Juniper Networks

Over the years, security infrastructure has become a patchwork of overlapping solutions and frameworks that are increasingly hard to administer and scale. Policy enforcement is a challenge, and many times technology purchased to treat point problems become redundant. How can organizations make sense of this technology sprawl and optimize their existing infrastructure? [Also see: The Evolution of Security Technology]

"Look at your investments based on the longevity of the solution or problem," advises Sajan Paul, Director, Systems Engineering - India & SAARC, at Juniper Networks. "For example, a patch management system is never going to lose value because one of the most vulnerable components in your infrastructure is software. The other example is two-factor authentication. Making access harder is a common sense practice that is going to stay."

Investing in long-term solutions rather than point solutions will make security dollars go further, he says. The industry product lifecycle is three-to-five years, and some of these point products may end their usefulness in six months. [Also see: The New Economics Of Cybersecurity Risk]

Speaking on policy enforcement, Paul says that while firewalls have come a long way in terms of the visibility, control and accountability, we've reached a place where even that is not sufficient, and if you are only looking at the intelligence being generated by your systems, you are exposing yourself to risk from unknown issues and vectors.

"There is room for coordinated threat intelligence. There are several industry feeds, coming in terms of URLs, IP blacklists, IP whitelists, signatures - you could get all this information together, mine it for useful information and then apply it to your infrastructure as dynamic policies," he says.

Paul spoke at a recent security summit held in Mumbai, where ISMG caught up with him for some exclusive insights on how organizations can institute and manage effective policy enforcement programs. Paul speaks about the issues around managing the existing security infrastructure and ensuring a robust policy enforcement framework. Paul also shares some insight on:

  • Current trends in the security landscape ;
  • Using threat feeds for actionable intelligence;
  • Policy enforcement on scale and dynamic policy development.

Paul is the director for systems engineering and technology consulting for Juniper Networks in India and the SAARC region, covering both enterprise and service provider verticals. Paul has been an integral part of the telecom and networking industry for over 20 years in various capacities from design, driving technology directions and managing solution focus across many telecom companies in his career. In his current role, he drives strategic solution initiatives and technology architectures which uniquely help organizations build their next generation network infrastructure.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.