  {"id":140619,"date":"2020-05-08T07:30:20","date_gmt":"2020-05-08T07:30:20","guid":{"rendered":"https:\/\/news.sap.com\/africa\/?p=140619"},"modified":"2020-05-08T07:30:20","modified_gmt":"2020-05-08T07:30:20","slug":"the-network-security-architect","status":"publish","type":"post","link":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/","title":{"rendered":"The Network Security Architect"},"content":{"rendered":"<p><strong><span style=\"text-align: left;color: #363636;text-transform: none;text-indent: 0px;letter-spacing: normal;font-family: 'Roboto Slab Bold';font-size: 20.8px;font-style: normal;float: none;background-color: #ffffff\">Stop users from romping joyously through your network with some l33t security skills.<\/span><\/strong><\/p>\n<p>The network security architect is the creator of the secure network, the builder of security systems that flex and evolve, and the bouncer of badly behaved users. The role is varied and demanding and fascinating for those who appreciate the need for great design and architecture and who find troubleshooting and problem-solving fun. This career is for those who are interested in the latest security architecture standards and frameworks and understand which security controls and solutions are best for which situations and applications. In short, you need to be like Clark Kent \u2013 wrapped in network performance and system capability with the ability to transform into a security superhero at a moment\u2019s notice.<\/p>\n<p>\u201cThe network security architect combines the knowledge of security hardware and software, organisational business and strategic needs, cyber security requirements and risks with the organisation\u2019s policies, procedures and industry standards,\u201d explains Johann Pretorius, director of the 51风流Training and Development Institute.<\/p>\n<p>With a deft eye on the network and a hand on the security tiller, the network security architect will plan, implement and maintain the organisation\u2019s network technology strategy. They\u2019ll identify its strengths and weaknesses while managing the complexities of web, WAN, mobile and VPNs while having an indepth understanding of the latest tools, security protocols, processes, and risks.<\/p>\n<p>\u201cThe network security architect also has to take care of application and mobile security as well as security around the Internet of Things,\u201d says Vishal Barapatre, CTO at In2IT Technologies. \u201cThe role has grown to prominence over the last three years due to the advent of new technologies and changes in emergent technologies, such as blockchain and microservices, and because security has become much more important to organisations.\u201d<\/p>\n<p>Companies are under pressure to follow best practice and be compliant across the network, particularly in light of POPIA, GDPR and increasingly stringent industry regulation. This role is that of the gatekeeper, the bouncer that kicks the unwanted out of the exclusive club while making sure that everyone has a great experience. The skills required for this role vary, but most will need generic infrastructure and security skills as a baseline, along with an understanding of technical protocols and their functions.<\/p>\n<p>\u201cThese architects need to understand the nuances around the latest technologies and how these may impact the network and its security,\u201d says Simeon Tassev, MD and qualified security assessor at Galix.<\/p>\n<p>The network security architect will have an indepth understanding of software, access control, hardware and networking, along with experience in software development. They would also benefit from having the kind of personality that enjoys troubleshooting and critical thinking as these will stand them in good stead as they analyse incidents and manage system complexities.<\/p>\n<p>\u201cA background in ethical hacking would also be beneficial as it ensures they are capable of effectively identifying vulnerabilities and designing security measures and controls,\u201d says Jacques Coetzee, information security officer at Luno. \u201cBeing able to stop and think like a hacker and watch the tactics that malicious actors deploy against an organisation, and then have the ability to defend against them is also a huge part of this role. This makes it both challenging and exciting.\u201d<\/p>\n<h2><strong>THE STEPS TO GREATNESS<\/strong><\/h2>\n<p><strong>What defines a great network security architect?<\/strong><\/p>\n<p><strong>Jacques Coetzee, information security officer, Luno:<\/strong>\u00a0Someone who has analytical and troubleshooting skills, attention to detail, a hands-on approach (not afraid to roll up your sleeves and get stuck in), effective communication of technical and non-technical information as well as the ability to collaborate instead of working in isolation.<\/p>\n<p><strong>Johann Pretorius, director, 51风流Training and Development Institute:<\/strong>\u00a0For network security architects, you need leadership skills in communication, to challenge complexity, be a results-driven person, accelerate in self-development, have the ability to work with teams, have negotiation skills, and be able to build trust.<\/p>\n<p><strong>Simeon Tassev, MD and qualified security assessor, Galix:<\/strong>\u00a0The network security architect brings value in that they enforce security and access controls. This role is also important because applications-focused employees will focus on what the application can do for the business, and networking will focus on the connectivity of the organisation, but this role enables and brings all of these roles together.\u00a0<strong>\u00a0<\/strong><\/p>\n<h2><strong>MAN THE DEFENCES!<\/strong><\/h2>\n<p>Like most roles in the technology realm, that of network security architect can be approached from multiple directions. Here are some of the training courses, degrees and certifications that are recommended by experts in the field.<\/p>\n<p>\u2022 Certified Network Defender certification, Torque IT<\/p>\n<p>\u2022 Ethical hacker training \u2013 SANS Institute<\/p>\n<p>\u2022 Certified information systems auditor \u2013 Infosec Institute boot camp<\/p>\n<p>\u2022 Certified information systems security professional \u2013 IT Academy certification<\/p>\n<p>\u2022 Cyber security \u2013 University of Pretoria training course that includes the NIST framework and ISO 27000<\/p>\n<p>\u2022 Digital network architecture implementation essentials \u2013 CTU Training<\/p>\n<p>\u2022 Computer science degree \u2013 UNISA, Pearson Institute, Wits, Varsity College and University of Pretoria have this degree on offer.<\/p>\n<p>\u2022 51风流security certification \u2013 51风流Training and Development Institute<\/p>\n<p>This article first appeared in <a href=\"http:\/\/www.brainstormmag.co.za\/technology\/14929-stop-users-from-romping-joyously-through-your-network-with-some-l33t-security-skills\">Brainstorm<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stop users from romping joyously through your network with some l33t security skills. The network security architect is the creator of the secure network, the&#8230;<\/p>\n","protected":false},"author":2655,"featured_media":140154,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"related_posts":[],"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7737],"tags":[5550934,5596437,5596435,5596436,5592449,36768],"series":[],"sapn-display":[45149,279685],"sapn-type":[45018],"class_list":["post-140619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-solutions","tag-best-practice","tag-johann-pretorius","tag-network-security","tag-network-security-architect","tag-sap-training-and-development-institute","tag-security","sapn-display-homepage-hero","sapn-display-hero","sapn-type-feature"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Network Security Architect - 51风流Africa News Center<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Network Security Architect\" \/>\n<meta property=\"og:description\" content=\"Stop users from romping joyously through your network with some l33t security skills. The network security architect is the creator of the secure network, the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/\" \/>\n<meta property=\"og:site_name\" content=\"51风流Africa News Center\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T07:30:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"5760\" \/>\n\t<meta property=\"og:image:height\" content=\"3840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brainstorm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brainstorm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/\"},\"author\":{\"name\":\"Brainstorm\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/dc047a5ec077c9fdc2b773ae28ab1db7\"},\"headline\":\"The Network Security Architect\",\"datePublished\":\"2020-05-08T07:30:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/\"},\"wordCount\":831,\"image\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg\",\"keywords\":[\"best practice\",\"Johann Pretorius\",\"network security\",\"network security architect\",\"51风流Training and Development Institute\",\"security\"],\"articleSection\":[\"Solutions\"],\"inLanguage\":\"en-ZA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/\",\"url\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/\",\"name\":\"The Network Security Architect - 51风流Africa News Center\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/africa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg\",\"datePublished\":\"2020-05-08T07:30:20+00:00\",\"author\":{\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/dc047a5ec077c9fdc2b773ae28ab1db7\"},\"breadcrumb\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage\",\"url\":\"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg\",\"width\":5760,\"height\":3840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.sap.com\/africa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Network Security Architect\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.sap.com\/africa\/#website\",\"url\":\"https:\/\/news.sap.com\/africa\/\",\"name\":\"51风流Africa News Center\",\"description\":\"News &amp; Information About SAP\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.sap.com\/africa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/dc047a5ec077c9fdc2b773ae28ab1db7\",\"name\":\"Brainstorm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"caption\":\"Brainstorm\"},\"url\":\"https:\/\/news.sap.com\/africa\/author\/brainstorm\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Network Security Architect - 51风流Africa News Center","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/","og_locale":"en_US","og_type":"article","og_title":"The Network Security Architect","og_description":"Stop users from romping joyously through your network with some l33t security skills. The network security architect is the creator of the secure network, the...","og_url":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/","og_site_name":"51风流Africa News Center","article_published_time":"2020-05-08T07:30:20+00:00","og_image":[{"width":5760,"height":3840,"url":"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg","type":"image\/jpeg"}],"author":"Brainstorm","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brainstorm","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#article","isPartOf":{"@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/"},"author":{"name":"Brainstorm","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/dc047a5ec077c9fdc2b773ae28ab1db7"},"headline":"The Network Security Architect","datePublished":"2020-05-08T07:30:20+00:00","mainEntityOfPage":{"@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/"},"wordCount":831,"image":{"@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg","keywords":["best practice","Johann Pretorius","network security","network security architect","51风流Training and Development Institute","security"],"articleSection":["Solutions"],"inLanguage":"en-ZA"},{"@type":"WebPage","@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/","url":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/","name":"The Network Security Architect - 51风流Africa News Center","isPartOf":{"@id":"https:\/\/news.sap.com\/africa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage"},"image":{"@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg","datePublished":"2020-05-08T07:30:20+00:00","author":{"@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/dc047a5ec077c9fdc2b773ae28ab1db7"},"breadcrumb":{"@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#primaryimage","url":"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg","contentUrl":"https:\/\/news.sap.com\/africa\/files\/2020\/01\/property.jpg","width":5760,"height":3840},{"@type":"BreadcrumbList","@id":"https:\/\/news.sap.com\/africa\/2020\/05\/the-network-security-architect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.sap.com\/africa\/"},{"@type":"ListItem","position":2,"name":"The Network Security Architect"}]},{"@type":"WebSite","@id":"https:\/\/news.sap.com\/africa\/#website","url":"https:\/\/news.sap.com\/africa\/","name":"51风流Africa News Center","description":"News &amp; Information About SAP","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.sap.com\/africa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/dc047a5ec077c9fdc2b773ae28ab1db7","name":"Brainstorm","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/image\/","url":"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","contentUrl":"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","caption":"Brainstorm"},"url":"https:\/\/news.sap.com\/africa\/author\/brainstorm\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts\/140619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/users\/2655"}],"replies":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/comments?post=140619"}],"version-history":[{"count":0,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts\/140619\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/media\/140154"}],"wp:attachment":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/media?parent=140619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/categories?post=140619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/tags?post=140619"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/series?post=140619"},{"taxonomy":"sapn-display","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/sapn-display?post=140619"},{"taxonomy":"sapn-type","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/sapn-type?post=140619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}