As cyber threats grow more sophisticated, protecting critical infrastructure is more important than ever. Ronen Ben-Hamou, Chief Growth Officer at Ceragon, discusses the rising risks in IoT security and the need to safeguard data from the edge to the cloud. From utilities to energy and banking, businesses must encrypt, authenticate, and monitor their networks to prevent breaches.
Ceragon provides end-to-end security solutions, from transport layers to edge devices, ensuring full encryption and real-time threat detection. With its recent acquisition of E2E Technologies, Ceragon enhances its capabilities in securing mission-critical networks. Learn how these innovations are shaping the future of secure connectivity.
Interviewer:
To start off, what are the key issues in server security right now?
Ronen Ben-Hamou:
What we see is, of course, everybody is seeing the threat of growing cyber attacks. While this was before just hackers playing around, now we see more and more growing attacks on critical infrastructures which have impacts on utilities, on energy, on banking, on different type of society. So everybody is seeing that it's not enough just to have something on the server. You need to protect all the way to the edge devices, and that means adding more and more cyber protection all the way to the devices, also the IoT ones.
Interviewer:
Right. Yeah. So IoT is obviously a clear kind of cybersecurity risk right now.
Ronen Ben-Hamou:
Exactly. So because we see many people add or many companies add a lot of devices on the IoT, whether it's sensors, cameras, different type of actuators or readers, all of this data give very critical data about your infrastructure, about everything that's going on in your network or your application. All of this data is being uploaded and then if it's not protected, you kind of give very good insight on everything on your operation to somebody who simply looks.
So what we see now is more and more the need to scramble the data, authenticate who has access to that data. Whether it's just simple sensors, you want to protect the data already on the edge on the sensor itself to make sure that if anywhere this data is intercepted, you cannot just easily get access to all infrastructure. We see, for example, in oil and gas, it's very simple. You have a lot of critical utilities, whether it's water or electricity, a lot of sensors that capture a lot of data, and now everybody wants to scramble to protect it, to do different type of mechanisms of security before you even upload the data to the cloud.
Interviewer:
Right. So where does Ceragon fit into this whole big cybersecurity pattern then?
Ronen Ben-Hamou:
Absolutely. So we are definitely there. So we give what we call end-to-end solution to our customers. Obviously some of our products are related to the transport layer where you have the different information from the different application, aggregated and then backhauled. So on that level, we already give full protection with cybersecurity, with encryptions in different levels and so on, and authentication of [inaudible 00:02:52]. The data itself as well as the software, you cannot just come and hack and change the software of the devices and so on.
But also, we take it all the way to the edge devices. So we have solutions for the access to the last mile or to IoT. For example, a company we just recently announced the acquisition E2E Technologies in the US, they operate in utilities, in energy, in oil and gas and so on. They have a lot of mechanisms, a lot of software for protection of such devices. We have software tools to monitor the whole thing and to give you the protection.
We also sense if anything changed in the behavior, so this is kind of predictive. When we look at changes, we monitor the behavior of the network. If somebody is trying to interact into certain devices, we will see that upfront. We will see that some anomaly happen in the type of communication interaction, prevent that, give alerts so somebody will go and monitor, as an example.
Interviewer:
Okay. Thank you so much for your time.
Ronen Ben-Hamou:
Absolutely. Thank you.