Inteligência artificial 

Aumento da produtividade. Catalisador de inovação. Colaborador criativo. Seja qual for a sua visão de IA, a Unisys fornece as soluções, a experiência e as ferramentas para realizar todo o potencial de negócios da sua organização.
Explorar

Otimização de logística

Mantenha a carga em movimento — apesar das interrupções. Descubra como os modelos de IA com patente pendente que usam dados em tempo real podem economizar tempo e aumentar a receita ao melhorar a utilização da capacidade, o planejamento de rotas e o gerenciamento de inventário.
Explorar

Consultoria

A natureza do trabalho está mudando. Vamos desenvolver seu negócio juntos. Prepare sua organização para o futuro com os serviços de consultoria da Unisys e avance como uma entidade digital em primeiro lugar.
Explorar

Histórias de clientes

Explore vídeos e histórias em que a Unisys ajudou empresas e governos a melhorar a vida de seus clientes e cidadãos.
Explorar

Pesquisa

Embarque em uma jornada rumo a um futuro resiliente com acesso às abrangentes pesquisas da Unisys, desenvolvidas em colaboração com os principais analistas e empresas de pesquisa do setor.
Explorar

Centro de Recursos

Encontre, compartilhe e explore ativos para apoiar seus principais objetivos operacionais.
Explorar

Carreiras

Curiosidade, criatividade e um desejo constante de melhorar. Nossos associados moldam o amanhã indo além do conhecimento especializado para dar vida a soluções.
Explorar

Relações com investidores

Somos uma empresa global de soluções tecnológicas dedicada a impulsionar o progresso das principais organizações do mundo.
Explorar

Parceiros

Nós colaboramos com um ecossistema de parceiros para fornecer aos nossos clientes produtos e serviços de ponta em muitas das maiores indústrias do mundo.
Explorar

Opções de idiomas

Idioma selecionado:

Português
5 Min Read

A New View of Cybersecurity for Public Sector Policymakers

setembro 17, 2020 / Unisys Corporation

As the war on cybersecurity evolves and intensifies, policymakers face a near impossible challenge of anticipating and understanding its twists and turns, the new threat vectors and the relative merits of current security approaches. If policymakers and government officials are to create cybersecure environments, they must shift their philosophy and strategy from protectionism to active response that reduces risk, minimizes damage, and stays ahead of new threats and weapons. This is a war for the data, not the infrastructure.

Does this mean that traditional approach toward cybersecurity is failing? – Yes, the traditional approach can and must be replaced. The traditional approach is failing because it relies on tools, capabilities, and strategies built on a decades-old foundation that is hardware-based, network-first, and perimeter-focused. It relies on the notion that perimeters can be hardened enough to prevent intrusion, but history proves that false. There is no magic technology or hardened perimeter that will keep out determined intruders.

The cybersecurity incidents and breaches are now inevitable. What is needed is an approach that recognizes the inevitability of breaches and makes networks and systems resilient, reduces risks, mitigates attacks, and minimizes damage. Moreover, this approach will save time, lower costs, and increase effectiveness.

Identity, Instead of Perimeter

Public sector networks and systems contain an invaluable repository of state secrets, citizen private data, and law enforcement information. Protecting them is one of the most profound responsibilities of policymakers. If policymakers and decision makers remain focused on preventing intrusions, they will forever be relegated to fighting yesterday’s war, reacting after the damage is done. Under the new approach, identity replaces the perimeter as the starting focus. All access to systems and data is controlled entirely by the authentication of the requesting individual.

Shifting From Prevention to Active Response – a Public Sector Imperative

These are the principles and measures of the new approach:

  • Zero Trust: Assume every access request is invalid until validated, because in today’s world, you cannot control or secure everywhere your data must go.
  • Software-Defined Perimeter: Provide seamless least-privilege access and a reduced attack surface.
  • Micro-segmentation: Create micro-perimeters – hyper-secure tunnels to protect critical workloads of data in flight, isolating critical assets, minimizing lateral movement, and prioritizing the most important assets.
  • End-to-End Encryption: Protect data in transit, no matter the underlying infrastructure to reduce attack surface and compliance and audit scope, and ensure confidentiality, integrity, and data access.

The active response is crucial because it prevents a threat from moving around a network. It also minimizes additional infections while it is being investigated. The adversarial methods and models of cybercriminals are constantly evolving. The contested networked environment is not static, nor should be our strategy and response. The ability to detect, adapt, and respond in dynamic fashion at network speeds to ensure resiliency – that is the future.

The above new approach reflects the realities of today’s actual environment and where it is headed. There are enemies to defeat and threats to avert, and yesterday’s approach will not serve. Citizen trust in public sector entities is a delicate commodity, easily diminished when breaches disclose a failure to secure data.

For more information, please click here.