APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Networking
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    The Network Economy, Fibre Investment and a Better Place to Live

    Gary McLaren, CTO, Hong Kong Broadband Network Limited

    What is CLOUD doing to our networks?

    Sam Schoelen, Chief Information Technology Officer, Continental Resources

    Stepping into IT Mainstream with Advancement in Big Data and CDN

    ColinBoyd, VP & CIO, Joy Global Inc

    Connect, Engage, Disrupt-XaaS and the Power of IoT

    Charlie Isaacs, CTO, IoT, Salesforce

    Secure Smart Homes Need Control on Site, not in the Cloud

    Simon Hunt, CTO - Home Gateway Security, Intel Security

    Software Defined Networks and Network Function Virtualization

    Massimo Rapparini, CIO, Viavi Solutions

    Software Defined Networks- A New Spine for IT

    Scott Fenton, VP & CIO, Wind River

    Leveraging Digital Platforms to Facilitate Patient-Centric Healthcare

    Ricardo Vong, Head of IT, Malaysia, and Lekha Satish, Innovation & Internal Excellence Lead, Asia at AstraZeneca

    right

    To Upgrade or Not to Upgrade -That is the Security Question

    Adam Jaques, Senior Director of Worldwide Marketing, Pulse Secure

    Tweet
    content-image

    Adam Jaques, Senior Director of Worldwide Marketing, Pulse Secure

    When we think of security, we probably think ‘software’ first. But software runs on hardware, and if network security and access appliances are aging, the security profile may be crumbling – without an organisation being aware of it.

    Network security and access appliances sit at the edge of the network, determining who can be let into the network and how much access they should be given. Since security threats are evolving by the day, these appliances need up-to-date software to appropriately protect both company and users from harm.

    But, let us consider the vulnerabilities of outdated hardware appliances. If appliances are three to four generations old, the latest software versions are likely not compatible with existing hardware, so the business is left running out-of-date software.

    This leaves two choices:

    • Upgrade hardware to be sure of getting the latest software to maintain robust protection, or,

    • Keep current hardware and entrust network security to out-of-date software

    Frequently, companies choose the latter option. After all, their hardware appears to be working, so why upgrade it?

    An admin might think, “As long as my end users aren’t calling me to complain, everything must be working fine.” Unfortunately, ‘working’ does not equal ‘secure.’

    For example, suppose the net admin uses OpenSSL for backend services. Over the past few years, OpenSSL has identified several vulnerabilities. Hackers know this, so they look for devices running older versions of OpenSSL to exploit. Advanced security applications are able to monitor such events and quickly provide patches in software updates.

    But, if an appliance can’t run the latest security software and the business is using an older version of OpenSSL, it is wide open to an attack.

    That is just one example among the hundreds and thousands of enhancements and updates constantly being created to address new risks, threats, and vulnerabilities.

    Aging hardware is also a risk because it will ultimately fail at some point. That is a generally accepted principle when deploying hardware: there is a mean time between failures. It is why equipment is only guaranteed for a certain number of years. After that, the likelihood of failure becomes statistically high.

    So, aging hardware presents a double risk: an organisation might suffer a breach because of out-of-date security software and might completely lose functionality because of equipment failure. Both eventualities will leave IT staff scrambling to repair the damage. The good news is—they can prevent a catastrophic situation by being proactive in upgrading their network security and access appliances.

    Upgrading hardware not only prevents security breaches, but, it also brings quantifiable value to daily business operations. For example, advanced security software updates include new features to make deployment easier through wizards. Therefore, what took 30 steps before may take just five now. By minimising the clicks, it streamlines administrative tasks, saving both time and money.

    In addition, with every new generation of hardware come leading-edge components: memory, processors, hard disks, network interface cards, etc. New hardware can handle more users and manage traffic faster and more reliably than ever so you can do more with less.

    Take a hard line when it comes to upgrading hardware. A business will gain increased security to meet today’s sophisticated threats, reduce network complexity, improve productivity, enhance the user experience, and lower bottom line costs. The only thing to lose is the experience of getting hacked and we can all do without that.

    Weekly Brief

    loading
    Top 10 Networking Solution Companies - 2021
    ON THE DECK

    Networking 2021

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://networking.apacciooutlook.com/views/to-upgrade-or-not-to-upgrade-that-is-the-security-question-nwid-4655.html