Milkor offering proactive and defensive cyber solutions


Milkor’s new cyber division is offering extensive solutions that have already attracted a number of clients.

Nelis Strydom: Head of Business Development: Africa at Milkor, told defenceWeb that Milkor offers a wide range of solutions, from cyber intelligence to asset/data protection and cyber security capabilities that allow hackers/intruders to be tracked and intrusions reacted on.

Milkor sees big growth and demand for cyber security solutions and has quite a few potential clients looking into this side of the business even though it was only established around a year ago. “Cyber security can make or break companies and governments,” Strydom said.

IT companies predict there are more than 250 000 different malware variants created every day to infiltrate vulnerable companies’ and defence ministries’ classified documents and intellectual property. Milkor saw the need to provide dynamic solutions in the cyber security environment that would not only counteract these malware attacks, but prevent them from happening in the future.

Milkor provides end-to-end security solutions for the monitoring, assessment and protection of information assets. The objective is to achieve complete data confidentiality, integrity and availability, ensuring data accountability and assurance (governance) by protecting and securing data, systems, media and critical IT infrastructure. This process is one of the essential measures for protecting and ensuring the privacy of valuable and confidential personal information.

Part of Milkor’s value proposition is the security operations centre (SOC), which runs 24 hours a day, seven days a week, constantly monitoring the security environment and systems. It provides worldwide security and maintains a consistent link into the worldwide security network for the most current information on threats. Specialised tools are used in minimising threats and making sure they don’t become a reality. The SOC technology is based on a security incident and event management (SIEM) tool. Analysts are able to detect and respond to security incidents and data breaches more efficiently with this tool.

Milkor’s cyber division offers various capabilities and solutions. This includes:
Network Security: this entails protecting/securing information for online privacy with web and email protection to detecting network intrusions and installing preventative measures i.e. web and email protection, intrusion prevention and perimeter defence e.g. Network Access Control, IPS, Honeypots and 5th Gen Firewalls
Endpoint and Mobile Security: this is the new face for Workforce Mobility and poses a greater risk. Initial hype started around 2010, when BYOD (bring your own device) policies came about and threats started entering companies through unsecured devices.
Data Security: this considers privacy as a subset of data protection. As the Internet of Things (IoT) rises, the risk of vulnerable entry points will rise. The importance of data protection increases as IoT and internet users grow resulting in the relevant storage growing at unprecedented rates.
SIEM (Security Information and Event Management): this is an integral tool and is essentially the collection and aggregation of data designed to provide a broader technical view and this is how Threat Intelligence is formed.
Pro-Active Security: this is a three-step approach using Tools, Processes and People. One security measure is to use a honeypot computer security mechanism to detect, deflect, or, in some manner, counteract attempts at unauthorized use or intrusion. Generally, a honeypot consists of data that appears to be a legitimate part of the site, but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, who are then blocked.

Identity Management is a form of defensive security that protects access to information and resources by managing individual identities, their authentication, authorisation, roles, privileges and permissions within or across system and enterprise boundaries. Vulnerability and patch management are tools used in defensive security measures also to identify and mitigate weak points in the system.

Governance, Risk management and Compliance (GRC): integrated activities that encompass, enterprise risk management (ERM) and compliance with applicable laws and regulations.

Communications security: Privacy is off vital importance. All communication platforms have to be secured i.e. online privacy, email protection, VOIP and instant Messaging which can easily become vulnerable points of entry.

Information Centre: Milkor offers a total solutions package providing a centralized secure control centre from which all communications and intelligence are processed.