Forcepoint talks about cybercrime in Malaysia and next-gen solutions 1

Forcepoint talks about cybercrime in Malaysia and next-gen solutions

While the consumer tech industry has weathered the brunt of a bearish market this year and skittish consumer sentiment with a host of high-profile product recalls and the demise of a noted wearable vendor in the market, cyber criminals are having a field day in Malaysia. According to network security provider Forcepoint, there were over 1,700 cases of hacking reported in Malaysia alone as of July 2016 and the number of attacks are slated to increase as time goes on.

For the uninitiated, Forcepoint is an online security provider business concerns that serves more than 20,000 customers worldwide to protect their businesses, intellectual property and networks from both internal and external attacks. Recently, they’ve launched their SureView Insider Threat solution, a total security package that deals with malicious or accidental insider incidents. Looking for a way to help with network threat detection Forcepoint has also released their Next Generation Firewall (NGFW) offering, Stonesoft NGFW 6.1. Extending firewall protection to the cloud, NSS Labs “Recommended” Stonesoft NGFW 6.1 gives customers enhanced security, scalability and operational efficiency to centrally and securely deploy and manage devices around the world.

We catch up with Brandon Tan, Principal Security Consultant and Office of the CISO, Southeast Asia to find out the lay of the land for cyber security in Malaysia and the region as well as what security solutions that Forcepoint has to offer for organisations.

Forcepoint talks about cybercrime in Malaysia and next-gen solutions 2

Brandon Tan, Principal Security Consultant and Office of the CISO, Southeast Asia


What is the state of cybercrime in Malaysia?
Cybersecurity is very much a global issue. When attacks happen in the US, chances are they will trickle down to other parts of the world too. From country to country, it won’t be very different however the intensity can vary. In Malaysia specifically, cybercrime has increased with an average of 10,000 cases per year – the highest incidences involve online scams and the hacking of corporate information systems. Forcepoint solutions help organisations in Malaysia protect against security threats and data breaches so that organisations can focus on what matters them most.

Forcepoint solutions include content security (web and email security), insider threat data protection, network security and security for cloud. In 2015, one-third of enterprises in Malaysia encountered malicious or accidental insider incidents that resulted in an average breach cost of US$3.8 million. It is a threat that cannot be ignored which is why we developed the Sureview Insider Threat solution. As we see it, attacks are becoming increasingly sophisticated. The nature of attacks will be advanced using two or more channels and launched in multiple stages to avoid detection by a multitude of point products. There will also be increased incidences of insider threat either through hijacked systems, rogue users or accidental user errors.

With the increasing reliance on cloud storage for company assets including IP in offsite data centers, what does Forcepoint cybersecurity solutions offer to address the access endpoint security?
Cloud computing poses challenges to both commercial as well as government organisations as it puts intellectual property (IP) at risk moving through different technologies in the cloud and is accessed increasingly outside of the corporate network but with great proxy servers similar to fineproxy to provide an additional.

Forcepoint solution protects users against data theft whether they are on or off the corporate network. Its powerful DLP capabilities enable organisations to secure personal data, intellectual property and other sensitive information on MacOS, Linux or Windows endpoints, and its preconfigured policies allow organisations to meet compliance requirements quickly and easily.It safely embraces cloud services such as Microsoft® Office 365 and Box by gaining thorough visibility and control over data in the cloud

As organisations transition towards cloud, they can have visibility and control over the applications that are permitted and provide the ability to restrict to those that are not Cloud providers – who are often cloud users as well – face these and other risks when trying to secure data in their cloud data centers. Securely operating hundreds (or thousands) of Linux servers in today’s threat landscape requires endpoint security designed specifically for highly scalable environments. Knowing that organisations are protected from the latest SSH backdoor, exploits and spy kits will help CISOs to fulfill business goals and move forward without fear.

Forcepoint has recently launched enhanced Stonesoft Next Generation Firewall (NGFW) 6.1 extending firewall protection to the cloud, giving customers enhanced security, scalability and operational efficiency to centrally and securely deploy and manage devices around the world. We also have cloud-based solutions that allow companies to quickly deploy web, email and cloud security to all users, regardless of location. This capability makes it easier for organizations of all sizes to manage their security across remote offices and the cloud.

On top of that, we are also addressing data sovereignty and performance issues by rapidly opening cloud data centers around the globe. Our ‘Cloud Storage Location Preferences’ function allows organisations to choose and know exactly where their data is processed and stored. Our network of carrier-grade data centers strategically located around the globe, not only enables availability and performance but also lets companies store data in compliance with local data residency requirements.

How mature is the Malaysia market in terms of the need for cybersecurity and awareness thereof? Do you have any data in terms of intrusions, attempts blocked and the nature of such attempts?

Local organisations and individuals alike are increasingly reliant on IT and the Internet to boost productivity and remain competitive. As this reliance increases, more focus needs to be put on cybersecurity to ensure a safe online environment. People in general have grown complacent that attacks will not happen to them. There is an assumption that because the individual or the organisation has not experienced a breach, they are doing the right thing or are not a target and therefore would continue not to be.

Malaysia’s Science, Technology and Innovation Minister Datuk Seri Madius Tangau recently said there was a need to develop a national cyber security innovation ecosystem and that cyber security will continue to be a priority for Malaysia in the next five years. This is a step in the right direction because as cybersecurity continues to evolve and shift, awareness has to come from within, so that cybersecurity is acknowledged and prioritised.

In terms of intrusions, Forcepoint did a special investigation, named JAKU, into a botnet campaign earlier this year. We found that the botnet Command and Control (C2) servers identified are located in the APAC region, including Malaysia, Singapore and Thailand. This further stresses the need for vigilance in Malaysia. Botnets are a form of resilient, redundant and highly pervasive attack infrastructures that are repeatedly deployed by major threat actors, such as organised crime-sponsored attackers and rogue states via their agencies. Over the period of September 2015 to May 2016, an excess of 29,000 unique victims around the globe have been recorded by JAKU.

[perfectpullquote align=”right” cite=”” link=”” color=”” class=”” size=”14″]”Local organisations and individuals alike (in Malaysia) are increasingly reliant on IT and the Internet to boost productivity and remain competitive. As this reliance increases, more focus needs to be put on cybersecurity to ensure a safe online environment. ” Brandon Tan, Principal Security Consultant and Office of the CISO, Southeast Asia [/perfectpullquote]

How does Forcepoint’s security solutions assist in terms of data loss prevention and how does Forcepoint assets address BYOD for employees who may access company assets or other websites via their devices?

The increasing popularity of conducting business from personal devices also adds to the complexity of data loss as it creates additional avenues for hackers to gain a foothold without popping up on the security team’s radar. In fact, research has shown that employees represent the biggest threat to company security largely because insider threats are difficult to detect.

Forcepoint protects organisations sensitive data wherever it lives – on endpoints, in the Cloud or on-premises. It helps to address global and industry-specific regulatory compliance requirements with pre-defined policies that are maintained and updated by Forcepoint’s dedicated research team.

Forcepoint’s TRITON AP-DATA is an industry-leading DLP solution with the visibility and control to protect organisation’s data, whether it’s stored and accessed on mobile devices such Windows and Apple laptops or shared via email and IM. The behavioural policies combine content and context awareness to automatically identify high risk behavior by users, such as forwarding emails to personal accounts or packaging data using encryption for exfiltration purposes

How does Forcepoint assist with potential insider threats?
Insider threats are one of the most prevalent issues that organisations face today. According to Forrester’s 2015 Global Business Technographics Security Survey, 39% of breaches in 2015 could be attributed to an internal incident, and that number is only rising. Forcepoint offers SureView Insider Threat to the Malaysian market, allowing businesses here to quickly identify user behavior that may lead to, or suggest a compromise and quickly respond to critical scenarios. By identifying risky users early, breaches can be stopped before or soon after they start. The sophisticated behaviour analysis offered by the solution also gives context to suspicious activities.

It is safe to say that anyone in an organisation is a potential insider threat and everyone is a potential victim. An insider threat is not limited to malicious intent. More often than not, the insider is awell-meaning but careless employee who may be more focused on productivity than protecting the company’s sensitive or confidential information. By staying vigilant and deploying the right tools, enterprises can safely address insider threats without wrongly accusing employees.

[perfectpullquote align=”left” cite=”” link=”” color=”” class=”” size=”14″]”Hopefully as more companies shift more of their business online, they will have a heightened awareness about cybersecurity and place it as a priority. ” Brandon Tan, Principal Security Consultant and Office of the CISO, Southeast Asia [/perfectpullquote]

Where do you see the cybersecurity landscape in Malaysia shifting towards within the next five years? What do you foresee happening?

With more cyber-attacks happening around the world, we see that companies are beginning to see the importance of cybersecurity. According to IDC, organisations are expected to spend $101.6 billion on cybersecurity software, services, and hardware in 2020. This equates to a 38% increase from the projected $73.7 billion in 2016. Hopefully as more companies shift more of their business online, they will have a heightened awareness about cybersecurity and place it as a priority. This mind-set will help them move their business forward without fear of data loss or cyber threats.

For more on Forcepoint and their security solutions swing by their official site at www.forcepoint.com.