Intelligent CIO Middle East Issue 23 - Page 89

INTELLIGENT ENERGY network security, but it’s also essential to consider the importance of backup and recovery as part of a comprehensive approach to Availability. In today’s threat environment, an incident is inevitable; the important question is: how will you handle it when the worst happens? Modern Availability solutions enable the recovery of applications and data in minutes, rather than hours or days, so it’s worth taking a look at your current backup processes and tools to assess whether they still fit your purpose. gas companies’ most valuable data. Unfortunately, they’re also a common source of security compromises. Assessing and monitoring partners’ data protection capabilities can be a huge task – but it’s an essential piece of the Availability puzzle. Many oil and gas companies are adopting risk based security frameworks, such as ISO27001, to help them manage Availability across the extended enterprise and communicate expectations and concerns more effectively. Managing complex IT environments In a constantly changing threat environment, it’s also important to share threat intelligence with other organisations, so everyone gets a heads-up on emerging threats before they have a serious impact. ONG-ISAC, for example, was set up to enable oil and gas companies to replicate the intelligence-sharing successes seen in the financial services sector. Working with partners Third-party business partners, such as service providers, consultants and contractors, are hugely important in many areas of the business and they often have access to oil and With multiple remote sites for exploration and production and a massive array of network endpoints and cloud services, oil and gas companies need solutions that offer end-to- end visibility and centralised control over complex physical and virtual IT environments. Without proper visibility of the entire environment, it’s incredibly hard to protect valuable IP, such as exploration data, drilling technologies and refinery processes. It’s also very difficult to ensure continuous Availability of the data and services the enterprise r [Y\›ۋ[[\\[Y\[ۜY\\Z[][ۜ]ٙ\X[ ][YK\ ]][\X[]Bو\^\X[[\X[[\ۛY[˂\]XY\[XH[[\˜\[Y\Z[[H^H^B\]KH]Z[X[]Hو]H[\X\[XYH[ܙH[\ܝ[[]\X]H]]܂ܙY]\[\[U[\H]\[]ݙ\ MYX\و^\Y[K\Y[ۘ[[\XH\Y[ QPKYX[Hٝ\KH\Y[[[Y[[[ܙX][[]\[\ܛ[H\[x&\œY[ۘ[X\]\K][ٚ]XB][Y\[H]\\[X[\˜[\X]\[۝[[\B][ۚ[YX[H\HXY[ݚY\و]Z[X[]H][ۜ܈H[^\Bۈ[\\KH\[H\XYBYۚYX[[Y[HY[ۈ]XZ܈\Y\[X\][ۘ[[وXHXKH\XX[[\X[ \^Z[\[BTTKXHXH\[\Y\ TKH[XۚXݙ\Y[]]ܚ]Hو\[Z[XZ[[Y\X[[]\]Hو\Z UTH›[YHH]ˈSSQSSŽ