• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology

What we get wrong all the time with security

Allan Tan by Allan Tan
August 30, 2019

Has shopping for a security solution ever felt tedious? Some U.S. media, for example, PC Magazine, have the [shopping] exercise easier by providing comparison tables listing the features of competitive solutions, and even offering recommendations to fit different situations.

However, the situation may not be as clear cut in Asia given that many solutions are delivered by way of channels. Still vendor marketing, media coverage and analyst commentaries do make it sound easier than it seems.

The result is that sometimes we are led to believe that buying for a security solution is as simple as buying a smartphone.

Bada bing, bada boom!

Truth be told even the simplest home security solution comes with a complicated set of parameters

FutureCIO spoke to Yee Keat Phuah, senior manager, Product Engineering at Silverlake to shed some light on current practices in the security solutions space, including common mistakes adopted in the journey towards securing the enterprise.

Critical step for securing the organisation

Often most enterprises start their security journey with the security solution in mind. Yee Keat Phuah, argues against this and suggests that the first step actually begins with identifying the company’s most valuable asset. He also suggests having someone to police the police.

“You should also identify the most trustworthy people in the organisation as they will be the ones you should lean on these to help protect the business,” noted Phuah.

Critical step in security solution purchase

Most common bad practice

For Phuah, buying the best security solution won’t deliver the expected results if it is handed over to the wrong people.

Common bad practice in security

 “There are more security products out there in the market today. But people fail to see that security products are just like locks. Every lock has a key. Whoever is given responsibility for the key can become the weakest point in the security system,” noted Phuah.

Questions to ask internal security team

He is quick to remind us that while the security solution is important, asking who will be charged with the keys to the company is just as important.

One size fits all security strategy

As with many things in business, not all security solutions are created equal. Phuah is of the opinion that depending on the situation, some solution may actually be sufficient for the job at hand. He cautioned that the best practice is to first understand the security requirements of the business before identifying the solution and approach to tackling the issue.  

One size fits its all security solution

First question to ask solution vendor

Given the wide availability of security solutions, it is important to ask the right questions. Phuah suggests asking your vendor – “why do I need your product?” The reseller or vendor must provide clear steps on how they can solve your security needs.

Questions ask to security solution vendor

Gartner acknowledges that there is no perfect protection and that security needs to be adaptive, everywhere, all the time.

Related:  Software to power top five car tech trends for 2022
Tags: data protectiondata securityGartnerSecurity and risk managementSilverlake
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe