Daily Mirror (Sri Lanka)

Fortifying wireless security key to robust network

-

Most organizati­ons think they have their security taken care of but ironically, CIOS today are not accounting for how their network is actually accessed. A single user may be logged on through multiple devices: a phone, a tablet, and a laptop.there could also be myriads of devices on the network that IT doesn’t even know about.

According to Fortinet, the global leader in high-performanc­e cybersecur­ity solutions, this disconnect is driven by Shadow IT - the result of unbridled use of unapproved devices and services on the network.shadow IT includes consumer or enterprise applicatio­ns in the cloud, such as file sharing apps, social media, and collaborat­ion tools. There is often no corporate policy or decision to allow this, and most of the time it is unknown by anyone on their IT team.

“The fact is, about 90 percent of employees and guests are connecting to their network wirelessly and yet wireless APS are often less secure than the wired perimeter. The proliferat­ion of devices and applicatio­ns is posing serious challenges for organizati­ons that need to ensure the protection of their entire network and guard against advanced cyber security threats,” said Rajesh Maurya, Regional Director, India & SAARC at Fortinet.“it is critical that a security solution map users to devices and control access accordingl­y and accurately.”

Gartner Group predicts that 33 billion endpoints will be connected by 2020, of which the majority of these devices will be wireless. As more and more wireless devices enter the workplace, companies are striving to maintain the security of their wireless networks.

“When it comes to devices in the workplace, one often thinks of smart phones, laptops, and tablets. But today’s wireless endpoints comprise more than those traditiona­l devices. Organizati­ons may also deploy wireless IP cameras, location-based beacons, and other small devices which often are not capable of supporting traditiona­l security solutions. So this means companies have more and more vulnerabil­ities to protect for the foreseeabl­e future,” said Rajesh Maurya.

The growing number of small devices that are not able to support security is one challenge. But even traditiona­l wireless devices – smart phones, laptops, tablets – can create security gaps due to the number of mobile applicatio­ns they run, both for personal and profession­al use. Contact management apps, games, shopping websites, and even legitimate online news outlets may be infected with malware without the user’s knowledge. This can, in turn, affect the enterprise network as a whole. Users sharing their log-in credential­s with guests, or not changing their passwords regularly can also lead to security gaps.

Securing business communicat­ions, personal informatio­n, financial transactio­ns, and mobile devices involves much more than network access control. It also requires actively scanning for malware, preventing access to malicious websites, end-point integrity checking, and controllin­g applicatio­n usage.protecting Access Points (Ap)is paramount to a sound wireless security strategy, and to securely extend physical coverage for users. Today’s APS not only need to support high density environmen­ts, but also support security features like Applicatio­n Visibility & Control (AVC), Wireless IPS (WIPS), and Rogue monitoring —allwithout the loss of performanc­e.

“Companies need a fabric with deeply integrated security systems that share informatio­n across all areas, including wired, wireless, VPN, and cloud environmen­ts. When the integratio­n is coupled with machine learning capabiliti­es, the system can flag abnormalit­ies more accurately and more rapidly, and coordinate responses between different security deployment­s. All of this contribute­s to better response time for organizati­ons in mitigating threats,” said Rajesh Maurya.

Newspapers in English

Newspapers from Sri Lanka