Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Bespoke service-based information security

Jack Loo | May 20, 2013
Integralis guides its clients from a perimeter-based security approach to one based on data.

5) What can we expect from Integralis in the future?

Church: So our goal is to become the number one provider of security and risk, information risk management and compliance and those aspects. We already have a very strong position in the industry.

We are in the process of developing next generation risk-management based services platform. It is launching this year starting from the US. We look to extend that footprint out and further enhance our relationship with NTT Communications.

Ultimately we see security becoming the fabric within the whole of NTT group companies' underlying services. NTT Communications manages something like 40 percent of the world's Internet traffic through its IP backbone.

We are in a position, where going forward, we can use that scale to get ahead of attacks. For example, we will be able to see and predict DDos attacks happening before they start or as they start. We'll be able to embed our solutions within the whole of the NTT group portfolio going forward.

6) Can you tell me about this new project?

Sidaway: The way that we are driving the new risk platform is to be able to put risk in context with the business, and it means that we need to understand a larger data source.

It means we need to have a modular architecture and build components in that will resolve those risks. We have designed from the ground up a way of collecting a large amount of information, so we can inform and make risk decisions for the business through securities technologies and other technologies that are built into that architecture.

We wrap the platform with professional services and consistent engagement that can help make informed business decisions.

This is what the new risk management platform allows us to do but it's a modular architecture so as the business transforms and new technologies come on board, you can draw them in very easily.

A lot of managed security services are constrained because they are developed in-house and custom-coded. You can't really develop that any further. What we have is an open architecture that allows us to plug and play with those technologies that are appropriate as the risk threat constantly changes, we can drop in new technologies.

The whole focus is to enable us to see and understand the threat landscape. We can see where the business wants to go in terms of their strategy. We can then align those two dynamics together off this risk platform.

So they can say, "We want to fix this problem" or "We want to open up this new market" or "We want to exploit this new business opportunity", where we already understand our risks.


Previous Page  1  2  3  4  Next Page 

Sign up for Computerworld eNewsletters.