Sun. Apr 21st, 2024

Sarenet views the evolution of the market as positive, especially in cybersecurity. We spoke with Aitor Jerez, commercial director of Sarenet, about trends for 2023.

Interview with Aitor Jerez, commercial director of Sarenet

How do you assess the evolution of the year in Sarenet?In the traditional business areas, connectivity, voice services and Data Center, the evolution has been positive in general, and very positive in the business area developed by our cybersecurity and customer engineering (CIC) department. For years we have said that we are a ¨telco with the soul of an integrator¨ and nowadays it is strange to find your communications provider carrying out integration projects for their clients with their own technical staff. The latter is very important and our clients are evaluating it very positively. It is common to find figures from telcos or other types of agents that sell digitization projects to companies but that in the end subcontract practically everything to third parties. In this subcontracting chain, something is always lost, from the outset, proximity to the client, which is one of our main attributes. CIC undertakes digitization and cybersecurity projects. This last area is booming and the knowledge accumulated in-house by our technicians is being reflected in the quality of the work of this department, which is increasingly in demand. However, not all are lights, we have also suffered problems with the supply of electronics that have caused us difficulties on more than one occasion, we have also been affected by the continuous rise in prices and the validity of the offers from our equipment suppliers and licenses, which has been shortened, and which hinders the natural cycle of a sale. Even so, we have been able to overcome the drawbacks and grow more than 37% over the target set in this area.Where are customers focusing most? Why do you think that is?Undoubtedly in cybersecurity and I would qualify it as “managed”. I would distinguish two types of customers. The first would be those that have already acquired a certain degree of complexity in their systems and networks, with their own IT staff. We offer this group a wide portfolio of services and measures to protect your company. What we find in this group is that they lack knowledge about these technologies. They need someone to manage their security measures so they can focus on issues closer to their business. Let me explain, an IT department should be looking for solutions that improve their business, listening to their internal customers to make their company more efficient and competitive, but they should not waste efforts on maintaining the technology that supports these solutions or simply protects them. They should be freed from the maintenance of their computing platforms and their protection against cyberattacks. We offer companies the maintenance of their platforms and the comprehensive management of cybersecurity measures. The other group of companies are those that, due to their size, do not have their own IT resources. They want to buy services that are very easy to manage without giving up their protection, so they must be secure as standard. For these companies we have designed the Safe Fiber +. It is a backup connectivity to guarantee its continuity and with a reconfigured cloud firewall to be able to face the most common threats. Service management is done from a client window in a very simple way. The best thing about this service is its price, affordable for all SMEs and micro-SMEs.They have launched the Security Operation Center, what will it provide to customers? What does it consist of?With our SOC we cover three needs. The first is surveillance, we become the eyes of the company. What we do is collect all events from security solutions or company assets. Sometimes these events are alerts that already indicate that something is happening, on other occasions we compare them in a SIEM (Security Information and Event Management). This is intended to centralize security events from various sources in real time, and to detect patterns of unusual behavior to alert us that something is happening. The SOC can be limited to notifying the client that they have a problem and giving them a recommendation for action, or cover the second need of the companies, that I act directly on the security devices. For example, if the SOC detects a denial of service attack on a client, it can simply notify the client or activate a mitigation measure during the attack. The third need is to report news, be up to date on what is happening and what are the most active risks at that time.What do you think will be the ICT trends that will mark next year?They will undoubtedly be in the area of ​​cybersecurity. I think that there is a small revolution currently in the approach to protection measures since the scenarios to be defended have changed a lot. Before we had a very well marked border between the Internet, where the dangers were, and the local network that was supposed to be safe. A firewall between the local network and the Internet access and a signature-based antivirus gave us a certain degree of security. But this scenario has changed in a very short time. Users connect from their homes with their own equipment to information that has been externalized to the “cloud”. This is traffic that doesn’t even go through that firewall installed on the customer’s network. We have added devices to local networks that are not PCs on which we could previously install our antivirus and which also connect via Wi-Fi, often without knowing where they are physically. We have also had to open the doors to remote maintainers of our systems and cybercriminals have become more active and sophisticated. In this new scenario, it is important to control who connects to our systems and under what conditions. Depending on the context, we will only give them the necessary privileges. For this reason, network access control systems (NACs) will be increasingly popular, as well as all systems and solutions that allow users to connect securely from anywhere. location, while protecting company data and applications. Manufacturers are designing these new solutions, and of course, we have a new soup of acronyms that accompany these new architectures and solutions, which I trust will become more familiar to us over time (Zero Trust, ZTNA, CASB, SWG, SSE, DLP, DEM, CSPM, SSPM, SUSE, RBI…) There will also be a bet on all those that incorporate Artificial Intelligence, which allows us, among other things, to discover and profile devices connected to our networks, detect an unknown virus and of which we do not we have your signature or unusual patterns of behavior on our networks to alert us.

By Alvaro Rivers

Award-winning student. Incurable social media fanatic. Music scholar. Beer maven. Writer.