ADVERTISEMENT
TechEconomy
Thursday, May 15, 2025
No Result
View All Result
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » What Role Did a Viral Pandemic Play in Cyber Security Consolidation?

What Role Did a Viral Pandemic Play in Cyber Security Consolidation?

Techeconomy by Techeconomy
June 27, 2022
in Security
1

RelatedPosts

Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

May 15, 2025

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025

With cyber attacks against corporate networks increasing 50% year-over-year, it has become clear that the past year has seen a dual pandemic, a biological and a cyber one.

As the World Economic Forum warned us: We should prepare for a COVID-like global cyber pandemic that will spread faster and further than a biological virus, with an equal or greater economic impact.

To defend against an expanding attack surface, security teams are increasingly adopting new cyber security products to protect networks, cloud infrastructure, IoT devices, as well as users and access. However, stitching together different products from multiple vendors may create security gaps and operational overhead. 

Read more to learn why moving toward security consolidation can significantly enhance security posture, improve security operational efficiency, and greatly reduce TCO (Total Cost of Ownership).

Did the Covid pandemic instigate a cyber pandemic?

Both pandemics perform malicious actions on their victims. While a cyber pandemic affects information systems and associated data.  

Last year, malicious cyber attacks cost $6 trillion USD globally in the form of ransomware, loss of productivity, loss of data, and reputational damage, among others (with Africa alone losing over $4 billion USD to cybercrime each year).

Similarly, the cost inflicted by the Covid pandemic is measured in trillions of USD to the global economy from lockdowns to supply chain disruptions.

As the pandemic caused havoc, remote work became the norm for most office employees. McKinsey estimates that there was an increase in the remote workforce by a factor of 4-5x compared to pre-pandemic levels.

In a matter of weeks, the surface attack widened dramatically, shattering the security perimeter.

This exposed security vulnerabilities on the network, cloud, devices, and access rights, which were exploited by malicious actors to destabilise institutions including hospitals, banks, and governments.

Globally, in 2021, Check Point Research reported a 40% increase in cyberattacks with one out of every 61 organizations being impacted by ransomware each week, and Africa experiencing three times more attacks than the global average.

Pandemic and Cybersecurity
United BANK
Source: Check Point

How to prevent the next pandemic?

With the biological pandemic, politics reacted with stricter lockdowns, vaccination, and re-enforced the health system with complementary infrastructures including testing centers, quarantine hotels/centres, and dedicated areas designed for coronavirus patients at hospitals to cope with the number of patients flowing in waves.

Similarly, CISOs had to react to the widening attack surface by enforcing security policies and the security infrastructure.

CISOs have two options to deal with a widening attack surface. Either one takes a best-of-breed strategy to patchwork the security architecture with multiple vendors, or one consolidates the security architecture with a cyber security suite.  

The latter approach is recommended as it closes security gaps related to misconfiguration and security policies that do not fully overlap when using multiple vendors.

Check Point surveyed over 400 global CISOs to confirm this trend, with 79% of security experts saying that working with multiple security vendors is challenging and 69% agreeing that working with fewer vendors would increase security.

Pandemic and Cybersecurity
Pandemic and Cybersecurity
Source: Check Point

Security consolidation – the benefits

United BANK

â—Ź        Reduced Overhead: Managing individual licenses across the organisation can consume significant resources as each license needs to be purchased, tracked, and renewed individually. An ELA (Enterprise License Agreement) allows a company to use a single license for all vendor services that it consumes across the entire organisation.

● Lower Costs: An ELA is a bulk purchase of a vendor’s service for a fixed period. Often, this comes with large discounts compared to individual, per-seat licenses.

● Decreased Business Impact: With individual licenses, an organisation needs to manage each license and may face business disruptions if one slips through the cracks and expires. With an ELA, an organisation only needs to manage a single license, decreasing the probability that oversight will cause a disruption to operations.

● Reduced Waste: With individual license agreements, an organisation may inadvertently purchase additional licenses for a product while others go to waste or are only used occasionally. An ELA enables an organisation to bundle services and stop spending money on unused services.

● Predictable Spend: With an ELA, an organisation and a vendor agree on a predetermined rate for a vendor’s services for the period of the ELA. This provides a greater degree of predictability than individual user licenses.

● Service Flexibility: ELAs often include the option to claim credits for underused resources that can be applied to other services. This allows an organisation to better tailor its service consumption to its actual needs.

Check Point Infinity ELA – Defining the modern cybersecurity architecture

To meet the demand for security consolidation, Check Point offers an Infinity Enterprise License Agreement (ELA) Suite with a unified management approach to cyber security.

Check Point Infinity is a multi-layered approach to cyber security that protects all IT attack surfaces – networks, cloud, endpoints, mobile, and IoT devices – sharing the same threat prevention technologies, management services, and threat intelligence.

All under a single umbrella and license agreement. The ELA offers access to Check Point’s four product suite pillars:

1.       A unified cloud-native security suite – Check Point CloudGuard;

2.       Network and data centre security – Check Point Quantum;

3.       User & Access security – Check Point Harmony;

4.       Unified security management – Check Point Infinity.

Across Africa, customers in the public sector, financial services, and telecommunications industries are now choosing Check Point Infinity architecture to adopt a consolidated security approach.

By doing so, these businesses are realising preemptive protection against the most advanced attacks, while achieving on average a 50% increase in operational efficiency and a 20% reduction in security costs.

Unlike other consolidated security solutions on the market, Check Point Infinity has a flexible ELA (enterprise license agreement) that can be tailored to individual applications.

Loading

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares

Tags: Check Point ResearchCISOsPandemic
Previous Post

Imo Wealth Project now commences June 29 – LSEF

Next Post

The Time to Unlock Skills Development Potential of 4IR is Now, says PBT Group 

Techeconomy

Techeconomy

Related Posts

Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns
Security

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

by Joan Aimuengheuwa
May 15, 2025
0

This loosely organised network is made up of hackers of varying skill levels

Read more
Sophos MSP Elevate

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025
CyberDome and Cato Networks

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

May 12, 2025
Sophos warning about Chinese Cars -

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025
FG Launches Data Privacy Academy

Nigeria Virtual Privacy Academy: FG to Train Youth on Cybersecurity, Data Governance

May 7, 2025
Future of multi-cloud by Samson Aligba -

Securing the Future of AI Integration: Why an Enterprise-Grade Model Context Protocol Framework is Crucial

May 5, 2025
Next Post

The Time to Unlock Skills Development Potential of 4IR is Now, says PBT Group 

Comments 1

  1. Pingback: 54gene Joins Increasing Number of Startups Laying Off Staff . See Reason – Kiddo

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

CYBERSECURITY ESSENTIALS
byTecheconomy

BUILDING STRONGER NETWORKS AND COMMUNITIES

CYBERSECURITY ESSENTIALS
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Filmmaking and Technology: A chat with Micheal Chineme Ike
June 7, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
uba

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.