The Guardian
Email YouTube Facebook Instagram Twitter

Boch partners Arcon to deploy PIMS in Africa

By Pete Oluka   |   12 May 2017   |   2:44 am

Internet of Things


Boch Systems Limited, a leading information availability Company has partnered with Arcon, another leading technology company to launch ‘Arcos’ meant to keep vigilant eye on critical infrastructure and information assets through Privileged Identity Management Solutions (PIMS), in furtherance of Boch Systems Pan-African vision to offer reliable, timely, and cost effective solutions.

Boch Systems with over a decade of experience in the Nigerian IT security market recently expanded to Ghana and will deploy Arcon’s solutions to organizations across Africa.

Speaking at a Customers’ Forum recently at Four Point by Sheraton where Arcos was launched, Mr. Chima Uzomba MD/CEO, Boch Systems Limited, said that with the increasing adoption of cloud computing, Internet of Things (IoTs), the future is bright for PIMS market, adding that Arcon as a Companyis bringing cost effective advanced technology to the African cyber security space.

“We signed a partnership with Arcon to represent them in the whole of Africa and deploy solutions to financial institutions and the telcos. Its flagship product- Arcos, is a Privileged Identity Management Solution (PIMS).

“Today, about 70% of cyber attacks that occur today are instigated from within from organizations. Most of them are caused by disgruntled staff, or staff with privileged access to company’s data. So, when access to the security protocols is compromised it affects the business.

“Therefore, Arcon’s solution is such that ensures your insider protocols are protected. Even if you have a third party who works with you, Arcon has a system to help organizations guide against breaches. It is a time-based access guarantor into your application and shares a link on what the person actually did. So, it helps you ensure that from the inside you are fully protected,” he said.

On the value proposition of Arcos, Mr. Uzomba said that the Solution has advanced from mere Privileged Access Management Solution (PAMS) to PIMS guaranteeing even protection from insider instigated network breaches and data theft.

“The first value proposition: this is an advanced technology. Formerly, you have what is called Privileged Access Management Solution (PAMS), but Arcon has narrowed it down to PIMS, which means you manage not just the access but who does what.

There are features that other competitors cannot boast of. Secondly, everybody wants to buy the right product at the appropriate price. Arcos is flexible with regards to pricing. Other solutions out there tend to remain on their high horses, but Arcos is willing to come down to your level and offer you service.

“In terms of customization, because the whole thing is designed by Arcon they are ready to offer you special attention. There are connectors we constitute which other competitors with over two hundred experts, which other competitions lack. And the inhouse developers are ready to customize”, he added.

During his presentation, Paresh Makwana, ARCON’s VP (Business Development) for Africa, said that having at the forefront of information risk management industry for more than a decade now, Arcon observed that enterprises remain most vulnerable in protecting their highly critical asset—data.

He said that the implementation team, which has been mapping diverse IT architectures of enterprises of all shapes and sizes and integrating risk-control solutions, often finds that firms usually keep a bulletproof network security to keep malicious traffic out. However, a very scant attention is paid towards protecting the digital assets.

According to the Arcon, the lack of proper mechanism in place like Privileged Access Management (PAM) / Privileged Identity Management (PIM) solution / Privileged Identity Management exposes enterprises to monumental data-security related risks, data extrusion as a result of growing ‘Bring-your-own-devices’ (BYOD) culture is fast becoming one of the biggest sources of data breach—apart from phishing.

He advised Companies that having an unambiguous IT security policy, which clearly specifies rules as to access to sensitive information from personal devices is the first step towards data security; however, he warns that this not enough.




You may also like