Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Public money, private plans: MPs demand Post Office transparency

      13 June 2025

      Coal to cash: South Africa gets major boost for energy shift

      13 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      10 red flags for Apple investors

      13 June 2025
    • World

      Yahoo tries to make its mail service relevant again

      13 June 2025

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025

      Trump tariffs to dim 2025 smartphone shipments

      4 June 2025

      Shrimp Jesus and the AI ad invasion

      4 June 2025

      Apple slams EU rules as ‘flawed and costly’ in major legal pushback

      2 June 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Security automation tools are not yet Soaring

    Security automation tools are not yet Soaring

    By Obscure Technologies11 February 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Technology tools that automate and standardise the response to cyberattacks have allowed Nedbank to dramatically slash the time spent securing its operations.

    Automating routine tasks like intrusion detection and removing phishing e-mail has made its systems more secure and freed up its technicians for other tasks, said Japie Vermeulen, head of Nedbank’s Security Orchestration, Automation and Response (Soar) division.

    Nedbank’s Japie Vermeulen, second from right

    One network traffic monitoring task that took three hours a day is now finished in six-and-a-half minutes, while a process of removing rogue e-mails that previously took two hours is now down to two and a half minutes.

    The transformation was achieved using Soar tools, Vermeulen said at a TechCentral roundtable on “Securing the Future”. He believes he can free up six full-time professionals this year by using Soar tools to further automate Nedbank’s security measures.

    But the growing niche of Soar technology has a dark side, too, because automating a process can just “bake in” the badness of processes that should no longer exist at all. Ideally, implementing a Soar strategy should be preceded by examining the company’s processes first, so any antiquated steps can be eliminated or updated. Businesses often run unnecessary processes because nobody dares to question why something is done in a certain way, the panellists agreed, and automating them just compounds the problem.

    Ideally, implementing a Soar strategy should be preceded by examining the company’s processes first

    Vermeulen also says Soar tools must be managed by people who can code, are passionate about security, and understand the business and its risks. “If you don’t have skilled resources to run it, it’s just another tool sitting there and costing you money,” he warned.

    The roundtable, sponsored by Obscure, Dimension Data and Palo Alto Networks, brought together C-suite security experts from the public and private sectors. They all face the challenge of protecting their organisations from a barrage of assaults that forces them to spend a disproportionate amount of time and effort on firefighting, instead of focusing on adding value and taking the business forward.

    Boost to security

    Soar tools promise to boost security by connecting the often-unwieldy mess of products and processes to standardised, automatable workflows to response to incidents faster and in the same fashion every time. But their take-up isn’t soaring yet, with Gartner predicting that only 15% of organisations will be using them this year.
    The roundtable saw spirited debate between customers and technology suppliers, with CIOs speaking from their hearts and calling for vendors to work as partners, share the risks, and walk the journey with them.

    They also urged international companies to stop charging so much for their software, with Charles Kungwane, the Chief IT security officer of Motus, proposing that South Africans form a new regulatory organisation to determine how much software companies could charge, much as the construction industry is regulated. Other participants pointed out the impracticalities of that, since buying software isn’t the same as buying a square metre of property.

    Motus’s Charles Kungwane

    But Nampak technology architect Celia Geyer agreed that high prices are a real prohibitor in Nampak’s technology choices. “The challenge for me is that all these new threat analytics and tools that we need and that would make a difference for our organisation are just too expensive. This is a real challenge in South Africa overall,” she said.

    Nampak’s Celia Geyer

    South African organisations are an attractive target for cybercriminals because in security terms it’s lagging behind other countries, the participants fear.

    Yet the need for robust IT security was highlighted clearly by Cyril Baloyi, chief technology officer for the City of Johannesburg, who spoke about various incidents where old and badly maintained systems had collapsed, and a ransomware attack where a hacker tried to encrypt files on the computers.

    City of Johannesburg’s Cyril Baloyi

    “We were hit because we had holes and we knew about them, but we didn’t implement fixes on them. The whole thing is a messy, obsolete environment,” he said. “It was a blessing in disguise that we were hit because that made the political principals understand what’s needed.” Some of the measures being imposed now include taking a “zero trust” approach with employees, he said.

    Mauritz Grobler from Dimension Data said new technology often fails because of a significant gap between what it is capable of and the skills within the client organisation to make that happen. With security, it’s important to understand what the risks are, and ensure that someone at management level is responsible so whenever a threat is discovered they take ownership and drive the fixes through.

    Dimension Data’s Mauritz Grobler, second from left

    “Automation is the future of cybersecurity because we don’t have enough skills and we never will,” agreed Dario Fachin, head of IM – Global Information Security at De Beers. But automation tools are not plug and play, because out-of-the-box solutions show too many false positives so a lot of tweaking is needed, he said. De Beers is now using behavioural analytics and machine learning in its security measures, but it still takes a human to write the code and make the changes.

    De Beers’ Dario Fachin

    The benefits of Soar tools are expanding well beyond the initial field of security into automating other routine aspects of a business, said Matt Poulton of Palo Alto Networks.

    Palo Alto Networks’ Matt Poulton

    Soar is evolving from the “s” of security to the “o” of orchestration, and being used to automate and secure mundane tasks like human resources processes or cloud configuration.

    • This promoted content was paid for by the party concerned


    Dimension Data Obscure Obscure Technologies Palo Alto Networks
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleE-tolls to be hiked despite uncertainty over their future
    Next Article South Africa’s debt picture cause for real worry

    Related Posts

    NEC XON, Palo Alto Networks unite to unlock cybersecurity ROI

    29 May 2025

    Former Dimension Data boss joins iOCO board

    20 March 2025

    NEC XON achieves Palo Alto Networks Diamond Partner status

    4 March 2025
    Company News

    Huawei Watch Fit 4 Series: smarter sensors, sharper design, stronger performance

    13 June 2025

    Change Logic and BankservAfrica set new benchmark with PayShap roll-out

    13 June 2025

    SAPHILA 2025 – transcending with purpose, connection and AI-powered vision

    13 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.