The mission of this group is to bring together utility professionals in the power industry who are in the thick of the digital utility transformation. 

Post

Digital Expansion Leads to Cybersecurity Solution Constriction

Paul Korzeniowski's picture
B2B Content producer, Self-employed

Paul is a seasoned (basically old) freelance B2B content producer. Through the years, he has written more than 10,000 items (blogs, news stories, white papers, case studies, press releases and...

  • Member since 2011
  • 1,593 items added with 564,973 views
  • Sep 29, 2022
  • 299 views

Utilties have been adopting digital technology, like cloud, mobile, social networking, in growing numbers. One ripple effecti is their systems have become larger, more dispersed, and more difficult to secure. In response, energy companies are now reducing the number of security vendors that they deal with, according to market research firm Gartner Inc.

Security is top of mind among energy company executives. As a result, they have been investing in a growing number of solutions. Managing such diversity is challenging, so many started to pull back on the number of vendors that they deal with. In fact, 75% of organizations are consolidating their security vendors in 2022, up from 29% in 2020.

Organizations are consolidating to reduce system complexity and lower their risk. As more solutions are deployed, ensuring that new security holes are not being created becomes more challenging.

SASE and XDR Gain Acceptance 

Two technologies are gaining traction as the consolidation occurs. Secure Access Service Edge (SASE) combines network security functions together with the principles of SD-WAN to deliver security functions typically used with cloud applications. SASE functions typically consolidate Firewall as a Service (FWaaS), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB) and Zero-Touch Network Access (ZTNA) into a single system.

Extended Detection and Response (XDR) is the latest version of endpoint detection and response (EDR). It employs deep analytics and automation to detect, analyze, and remediate potential digital security threats.

Energy company struggled to secure their devices as they embraced digisal technology and their networks expanded and became more complex. In response, they are now limiting the number of suppliers that they deal with.

Discussions

No discussions yet. Start a discussion below.

Paul Korzeniowski's picture
Thank Paul for the Post!
Energy Central contributors share their experience and insights for the benefit of other Members (like you). Please show them your appreciation by leaving a comment, 'liking' this post, or following this Member.
More posts from this member

Get Published - Build a Following

The Energy Central Power Industry Network® is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.

If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.

                 Learn more about posting on Energy Central »