5 IT Leaders Explain Why They’re All-In on Intrinsic Security
With the sheer number and severity of cyberthreats rising worldwide, business leaders count on IT and security organizations to mount a strong defense. Their organizations’ reputation and customer loyalty depend on it.
Some enterprises continue to deploy one-off security products as they’ve done for years. Yet, leading innovators take a more modern, successful approach to combating cyberattacks. They’re building in—not bolting on—protection with intrinsic security. This defense-in-depth, zero-trust approach strengthens security postures.
Policy-based and automated, intrinsic security delivers greater protection and additional peace of mind, according to five IT leaders worldwide. Here’s why they’ve invested in an intrinsic security strategy and recommend that peers make the shift, as well.
1. Boost Security, While Improving Employee and Customer Experience
Because all our people are working from home, we have enforced inactivity timeouts and endpoint security for all company-managed devices with licenses for each. With data residing on the cloud, backups are also stored there, including another copy at our off-site disaster recovery site. Our success during this time is measured in continued employee productivity and an on-going focus on customer experience.
Jeremiah Chunge Munyasa, head of alternative channels and technology, Genghis Capital
Genghis Capital Ltd, a leading investment bank in Kenya, maintained full business continuity throughout the recent health pandemic as a result of its decision to become a cloud and digital-first business that takes security very seriously.
Genghis Capital’s Cloud-First Business Model Ensures It Weathers Business Disruption
Dive deeper into Genghis Capital's cloud and intrinsic security strategy via IntelligentCIO.com.
2. Advance Security, Speed and Flexibility
We want to offer our researchers and medical staff the best, state-of-the-art infrastructure and offer them a workplace that allows them to work anywhere and always have access to applications and data. … We now manage our data in one central place and offer a workplace that is accessible anytime and anywhere. Through self-service and automation processes, researchers have easy access to the computing power they need when they need it. The new infrastructure also allows them to securely share data with research partners elsewhere in the world.
Roel Sijstermans, head of IT, Netherlands Cancer Institute (NKI)
The Netherlands Cancer Institute (NKI) in Amsterdam is a comprehensive cancer center comprising a research facility and a cancer clinic. Because of technology and stronger data security approaches like intrinsic security, NKI can provide researchers and nurses with the best, state-of-the-art infrastructure. IT also equips staff with a new digital workplace, so they can work anywhere and always have access to their applications and data.
Curing Cancer: Can Tech Help Us Find the Answer?
Cancer is the world’s second leading cause of death. The Netherlands Cancer Institute (NKI) wants to lower the odds and believes technology will help them find the cure.
3. Time-Saving Security Automation
The attack vectors and user experience have changed, because people are no longer just using their phones. They are on laptops and bigger screens, so that changes the way we look at security. We’ve had to change security policies to adapt to the new normal, where people are working somewhere that might have a hostile network. We leverage VMware Carbon Black solutions for their effective threat hunting capabilities...giving us the chance to conduct advanced attacker profiling and intelligence enrichment.
Jimmy Sanders, head of information security, Netflix DVD
Netflix DVD is the premier DVD-by-mail rental service. The company chose VMware Carbon Black for its endpoint detection and response (EDR) capabilities. Intrinsic detection and prevention also help the organization create time-saving automated security responses.
Q&A with Netflix DVD’s Jimmy Sanders
VMware's Carbon Black team sits down the head of information security to talk about strategy, use cases and success stories.
4. Safely Accelerate IT Modernization
SAIC continually partners with government clients to enhance services and fortify protections around the nation’s most critical information assets. Our government customers want to leverage the same hybrid cloud capabilities that leading businesses are adopting to optimize application performance. Cloud governance and security are key priorities for SAIC customers. And we need to support that with modernized infrastructure that accelerates their journeys to the cloud, while optimizing workflows with consistent cloud management tools across disparate platforms.
Matt Livingston, VP platforms, SAIC
Science Applications International Corporation (SAIC) is a systems integration firm dedicated to helping government clients modernize IT systems and manage cybersecurity risks. Because national security can never be compromised, the company teamed up with VMware to help manage cyberthreats and attacks for its own operations and key government clients.
SAIC Helps Modernize Government IT with Secure Hybrid Cloud Management
When your largest client is the U.S. government, you have to be very good at what you do.
5. Automate Security and Streamline Compliance
We have built an unbelievable private cloud on-premises with VMware’s stack. And we’re able to respond quicker than we could in a public cloud. We’re able to control costs and security better on-prem. And a lot of that is by keeping it simple and keeping it automated. When you keep it simple and automated, that drives better security practices and better uptime and compliance.
Matt Van Syckle, CTO, State of Montana
The U.S. state of Montana is navigating cybersecurity challenges facing all highly regulated industries. The government believes ease of use and automation are key to success.
Navigating Cybersecurity Challenges in Highly Regulated Industries
At VMworld 2020, IT visionaries from the U.S. state of Montana, Interfaith Medical Center and SAIC explored how they navigate today’s cybersecurity challenges.