Cloud Security , Endpoint Detection & Response (EDR) , Endpoint Security

Relevance of Perimeter Security In Cloud Migration

Forcepoint's Rodrigues on Why User Behavior Analysis is Key
Relevance of Perimeter Security In Cloud Migration

Despite organizations moving to the cloud, perimeter security continues to remain important for security teams, says Alvin Rodrigues, security strategist, Asia Pacific, at Forcepoint. (See: ID Management's Role in Cloud Security)

"It [perimeter security] does have its place in the entire security posture," says Rodrigues. "A company just at the beginning of its digital transformation journey will be focusing on how do they drive greater automation, how do they drive greater policy management, how do they drive security ....from a perimeter standpoint," says Rodrigues in an interview with Information Security Media Group. (See: Why Perimeter Security Still Matters)

When it comes to cloud security, Rodrigues lists out other technologies that organizations must consider, including user behavior analysis. "By having user behavior analysis in place, you add an extra dimension of security because now you are able to identify a potential threat before it happens," says. "In the earlier case, it was more threat-centric [approach] - you depend on devices to prevent infiltration into the organization. In this case, you prevent negative elements to do exfiltration of data out of the organization."

In this audio interview with Information Security Media Group, Rodrigues also discusses:

  • How to achieve balance between security and privacy;
  • Why perimeter security cannot be ignored;
  • Whether new security solution are designed to address new age threats.

Rodrigues has more than 20 years of experience in the IT industry, and he is the senior director, security strategist, Asia Pacific, at Forcepoint. Prior to joining Forcepoint, he was the marketing director for Asia Pacific at Fortinet. He speaks at public forums and events on security, and engages with executives one-to-one or over roundtable discussions to understand their security challenges and propose solutions optimized to their business needs.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.