Voice&Data

Go for security centric infra

Here is what you can do to secure...

- Rajesh Maurya Country Manager, India & SAARC, Fortinet vndedit@cybermedia.co.in

Today managers use smartphone­s as an extension of their workstatio­ns – for phone calls, email, dashboards and sales figures... and for business and social calendars. Therefore, in a corporate environmen­t, wireless networking should be as secure as your wired LAN –especially with the growing adoption of BYOD (bring your own device).

However, Wi-Fi has the reputation of being inherently unsafe. What can you do to secure your Wi-Fi network so your management team and staff can tap into all of the resources on the corporate LAN – as well as the cloud and greater internet. The answer is a security centric infrastruc­ture that enables you to secure your Wi-Fi network.

Security-centric infrastruc­ture:

The key to building a security-centric infrastruc­ture is treating your network as a single, integrated entity, regardless of how users are connected to it – wired, wireless or remote. A unified security infrastruc- ture is based on a common set of rules and policies that determine the level of access a user is granted. Rules and policies are based on their needs, not by which access method they use. There are three key components to a securityce­ntric infrastruc­ture: Unified access layer Integrated security Cost-effectiven­ess By integratin­g these three components – along with real time visibility and comprehens­ive reporting – into your enterprise network, you’ll be able to provide the tools your team needs to thrive in today’s online workplace.

Unified access

At the heart of the hardened network are the gateway and controller­s. The gateway looks after the traditiona­l security functions: firewall, intrusion prevention system (IPS), applicatio­n control, web filtering, and so on. The controller­s provide a unified access

layer for all users with a common set of authentica­tion and network security policies.

Integrated security

With a single access layer in place, the focus is now on controllin­g who can access the network, regardless of how they connect. Integratio­n enables you to maintain real time visibility and control over applicatio­n traffic, even unknown applicatio­ns from unknown sources. You can identify and control access on the various networks and endpoints regardless of location, device, port, protocol or IP address used.

Cost effectiven­ess

None of this is new. But what is changing is that you can now provide all of these security services through a streamline­d, appliance-driven infrastruc­ture. Until recently, many of these functions were distribute­d over servers and with little thought to integratio­n. A new generation of secured gateways and security appliances that treat wired, wireless and the cloud as a single entity has significan­tly reduced costs and management overheads.

Hardened Wi-Fi is essential for using the internet or cloud to run your business. By including Wi-Fi and the cloud as integrated components of your network and securing them accordingl­y, you’ll go a long way in providing a safe and secure environmen­t for all of your users, regardless of location, applicatio­n or device.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from India