SlideShare a Scribd company logo
February 2016 1
February 2016 2
Introduction
Defining the network perimeter is as complex as ever. It’s safe to say that mobility has changed the
architecture and design of the network. As organizations increase the use of mobile technologies to
remain competitive and to enhance employee productivity, the network needs to handle a surge in a
variety of traffic in a secure way.
The network infrastructure that an organization has in place today typically does not meet their mobility
needs. The expertise in understanding mobility challenges and providing the appropriate solutions is
something that few organizations do right. The intent of this whitepaper is to help you align your
network to support your mobile initiatives.
Market Drivers
Mobility is a unique task given that requires security at all levels. The market for mobility has changed
the requirements for a network. Enterprises of all sizes are dealing with these changes, as some are
starting from scratch while others are moving from a line of business-focused to an enterprise-focused
strategy. Regardless of where you are, the mobility landscape is pushing organizations to upgrade their
network to ensure its mobile ready.
 Mobility management includes everything from applications, devices, data, and so one.
Whether there is an established vendor or new vendor, there are many approaches to managing
mobility. With so many approaches due diligence needs to be taken to assess which approach
supports your needs. However, we see lifecycle issues that make a mobile strategy a moving
target.
 Network Traffic has increased and will continue to increase due to your mobility. Cellular service
providers are doing what they can to keep up with the demand. WLAN vendors are also working
hard to ensure the latest technology supports mobile initiatives. A reliable connection is key to
mobile-first enterprise.
 Network Security in a mobile environment that manages both insider and outsider threats has
become a challenge. The threat vector has changed and become more sophisticated. If an
organization doesn’t know how valuable their data is or who their users are, it then becomes an
uphill battle to secure the network.
February 2016 3
Difficulties in securing the network perimeter
1. Tunneling
Tunneling has been used for years to provide remote users access to corporate resources. Prior
to enterprise mobility, the organizations typically used SSL or IPSec VPNs. Now with the broader
adoption of mobile platforms new tunneling solutions are beginning to emerge, such as Per-App
Container/Device/User VPN and enterprise mobility management (EMM) tunnel. Investments
have already been made in previous technology, which leads to questioning of which solution is
right for us.
 SSL VPN –corporate access using a web browser.
 IPSec – corporate access that requires a client application on the device.
 Per-App/Container/Device/User – corporate access based on specific application,
container, device or user.
 EMM Tunnel – corporate access without deploying a VPN.
2. Access to the enterprise
Access to the enterprise is being given to a growing number of users. They have access at any
time and from anywhere. Some organizations even go down the path of giving users access to
everything and then lock it down at a later date. With mobility changing rapidly organizations
use this approach to handle the unknowns. The problem is that date never comes, and the
attackers have open access to steal anything they want.
Besides users access, application and device controls need to be put in place to control access.
The standard authentication, authorization, accounting (AAA) framework needs to be used to
ensure the network isn’t putting users at risk.
3. Wireless security
Cellular and WLAN play an important role in securing the network perimeter. Typically with
cellular the risk is transferred to the mobile service provider. As an organization, you have more
control over the WLAN security that is in place.
The WLAN needs to be viewed from both an internal and external perspective. Internally an
organization needs to understand their applications, devices, and users that are on the
traversing their networks. The issue is that typically organizations haven’t aligned those three
areas together to generate the right WLAN policy.
External WLANS is where users put their organizations at risk, without knowing it. The ability
access the internet via a hotspot, hotel, convention center, and so forth can expose a security
domain that organizations don’t control. Sometimes WLAN coverage is better than cellular
coverage in a certain area. The typical scenario is for your users to access a WLAN and complete
a task. However the how do you know if a user is using a rouge Access Point (AP) to access
corporate resources? Now organizations are left trying to frame a wireless security problem that
is broad and complex to control.
About us
Infrastructure Solutions International is a mobility and wireless solutions provider. With technical staff experienced in cloud,
networking, mobility, security, and wireless we have the expertise to solve your problems.
Infrastructure Solutions International
www.infra-si.com
info@infra-si.com
Aligning the network infrastructure to support mobility
Understanding that the network in mobile enterprise is a large system, that consists of multiple
components that move in an out of and organization's mobile security domain. There is a need to break
the system down into its components or subsystems. Within each component, evaluate what you need
to control. The way to think about that is “How can we prevent a data breach”. Then next do a gap
analysis what you have in place now. This will show you where need to make investments.
The goal at the end of the day is focused on managing risks by aligning the network to your mobility
initiatives. Defining the perimeter in terms of Users -> Devices ->Applications -> Data, puts into context
how a business can structure the network to support enterprise mobility.
In order to secure the mobile perimeter evaluate these five areas of your network.
1. Network Segmentation – A layered approach requires classifying the networks. Then you need
to ensure traffic is blocked to applications and data that haven’t been associated with the
enterprise mobility domain.
2. Connectivity – Understand the various network connection options that a user has. Then
determine how you can control the connections. Some options are to control connections with
access time schedules, managing persistent connections, and so forth.
3. Firewall - If your firewall is using legacy capabilities of source/destination IP address and ports,
it time for a technology refresh. The features in a next-generation firewall (NGFW) allows
organizations to get granular with network traffic by adding user access controls, packet
inspection, network application/ID control, intrusion detection system/intrusion detection
systems (IDS/IPS), traffic inspection and more to legacy firewall capabilities.
4. Network Access Control (NAC) – The NAC give an organization the ability to make network
decisions based on device visibility. The ability to align the device application posture to your
network access control.
5. Tunneling – within a mobile enterprise resources are available anytime and anywhere. There are
options when it comes to allowing the access. Understanding your data will determine which
approach is best for the business.
Conclusion
Mobility has changed how organizations secure the network perimeter. More than ever a layered
approach is needed to ensure all mobility risks are managed appropriately. Ideally having end-to-end
access controls in place that align to user’s roles and responsibilities will help manage the mobility risks.
If an organization can effectively protect corporate data, they are able to quickly audit their security
posture and adapt quickly to mobile changes. As technology continues to move towards
anytime/anywhere access organizations need to ensure the network is up to the challenge. The value in
the network is being able to analyze that information traversing it. If it's secure, then an organization
can maneuver quickly to realize new opportunities that support their mobile initiatives.

More Related Content

What's hot

How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
Abaram Network Solutions
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
Hyker Security
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
Ivanti
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identity Defined Security Alliance
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
Booz Allen Hamilton
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
Ivanti
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
Courtland Smith
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architecture
Motty Ben Atia
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Identive
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
Mubashir Ali
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
Ivanti
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
Ericsson
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
Ivanti
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
Netmagic Solutions Pvt. Ltd.
 

What's hot (20)

How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architecture
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 

Viewers also liked

Taro in Russian
Taro in RussianTaro in Russian
Taro in Russian
Romanius
 
Windpower Brochure
Windpower BrochureWindpower Brochure
Windpower BrochureDan Gumsley
 
Sudipta Banerjee_LinkedIn June 2016
Sudipta Banerjee_LinkedIn June 2016Sudipta Banerjee_LinkedIn June 2016
Sudipta Banerjee_LinkedIn June 2016Sudipta Banerjee
 
Framing the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobilityFraming the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobility
infra-si
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
infra-si
 
Framing the conversation - EMM
Framing the conversation - EMMFraming the conversation - EMM
Framing the conversation - EMM
infra-si
 
Unity in diversity
Unity in diversityUnity in diversity
Unity in diversity
Shweta Bhatia
 
Samsung galaxy ace_plus-th
Samsung galaxy ace_plus-thSamsung galaxy ace_plus-th
Samsung galaxy ace_plus-th
uesak
 
Ux presentation
Ux presentationUx presentation
Ux presentation
Hari Prasad
 

Viewers also liked (11)

Taro in Russian
Taro in RussianTaro in Russian
Taro in Russian
 
Windpower Brochure
Windpower BrochureWindpower Brochure
Windpower Brochure
 
Sudipta Banerjee_LinkedIn June 2016
Sudipta Banerjee_LinkedIn June 2016Sudipta Banerjee_LinkedIn June 2016
Sudipta Banerjee_LinkedIn June 2016
 
Framing the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobilityFraming the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobility
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Framing the conversation - EMM
Framing the conversation - EMMFraming the conversation - EMM
Framing the conversation - EMM
 
Food4 thought
Food4 thoughtFood4 thought
Food4 thought
 
karthik.CV
karthik.CVkarthik.CV
karthik.CV
 
Unity in diversity
Unity in diversityUnity in diversity
Unity in diversity
 
Samsung galaxy ace_plus-th
Samsung galaxy ace_plus-thSamsung galaxy ace_plus-th
Samsung galaxy ace_plus-th
 
Ux presentation
Ux presentationUx presentation
Ux presentation
 

Similar to Securing the network perimeter

Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
rtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
jeffsrosalyn
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
Dana Gardner
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
Andy Kwong
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
LiveAction Next Generation Network Management Software
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
MinnySkyy
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
ADGP, Public Grivences, Bangalore
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516Tony Evans
 
Software-Definted Mobility Overview
Software-Definted Mobility OverviewSoftware-Definted Mobility Overview
Software-Definted Mobility OverviewMichael Palmacci
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
Ahmed Banafa
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 

Similar to Securing the network perimeter (20)

Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516
 
Software-Definted Mobility Overview
Software-Definted Mobility OverviewSoftware-Definted Mobility Overview
Software-Definted Mobility Overview
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Securing the network perimeter

  • 2. February 2016 2 Introduction Defining the network perimeter is as complex as ever. It’s safe to say that mobility has changed the architecture and design of the network. As organizations increase the use of mobile technologies to remain competitive and to enhance employee productivity, the network needs to handle a surge in a variety of traffic in a secure way. The network infrastructure that an organization has in place today typically does not meet their mobility needs. The expertise in understanding mobility challenges and providing the appropriate solutions is something that few organizations do right. The intent of this whitepaper is to help you align your network to support your mobile initiatives. Market Drivers Mobility is a unique task given that requires security at all levels. The market for mobility has changed the requirements for a network. Enterprises of all sizes are dealing with these changes, as some are starting from scratch while others are moving from a line of business-focused to an enterprise-focused strategy. Regardless of where you are, the mobility landscape is pushing organizations to upgrade their network to ensure its mobile ready.  Mobility management includes everything from applications, devices, data, and so one. Whether there is an established vendor or new vendor, there are many approaches to managing mobility. With so many approaches due diligence needs to be taken to assess which approach supports your needs. However, we see lifecycle issues that make a mobile strategy a moving target.  Network Traffic has increased and will continue to increase due to your mobility. Cellular service providers are doing what they can to keep up with the demand. WLAN vendors are also working hard to ensure the latest technology supports mobile initiatives. A reliable connection is key to mobile-first enterprise.  Network Security in a mobile environment that manages both insider and outsider threats has become a challenge. The threat vector has changed and become more sophisticated. If an organization doesn’t know how valuable their data is or who their users are, it then becomes an uphill battle to secure the network.
  • 3. February 2016 3 Difficulties in securing the network perimeter 1. Tunneling Tunneling has been used for years to provide remote users access to corporate resources. Prior to enterprise mobility, the organizations typically used SSL or IPSec VPNs. Now with the broader adoption of mobile platforms new tunneling solutions are beginning to emerge, such as Per-App Container/Device/User VPN and enterprise mobility management (EMM) tunnel. Investments have already been made in previous technology, which leads to questioning of which solution is right for us.  SSL VPN –corporate access using a web browser.  IPSec – corporate access that requires a client application on the device.  Per-App/Container/Device/User – corporate access based on specific application, container, device or user.  EMM Tunnel – corporate access without deploying a VPN. 2. Access to the enterprise Access to the enterprise is being given to a growing number of users. They have access at any time and from anywhere. Some organizations even go down the path of giving users access to everything and then lock it down at a later date. With mobility changing rapidly organizations use this approach to handle the unknowns. The problem is that date never comes, and the attackers have open access to steal anything they want. Besides users access, application and device controls need to be put in place to control access. The standard authentication, authorization, accounting (AAA) framework needs to be used to ensure the network isn’t putting users at risk. 3. Wireless security Cellular and WLAN play an important role in securing the network perimeter. Typically with cellular the risk is transferred to the mobile service provider. As an organization, you have more control over the WLAN security that is in place. The WLAN needs to be viewed from both an internal and external perspective. Internally an organization needs to understand their applications, devices, and users that are on the traversing their networks. The issue is that typically organizations haven’t aligned those three areas together to generate the right WLAN policy. External WLANS is where users put their organizations at risk, without knowing it. The ability access the internet via a hotspot, hotel, convention center, and so forth can expose a security domain that organizations don’t control. Sometimes WLAN coverage is better than cellular coverage in a certain area. The typical scenario is for your users to access a WLAN and complete a task. However the how do you know if a user is using a rouge Access Point (AP) to access corporate resources? Now organizations are left trying to frame a wireless security problem that is broad and complex to control.
  • 4. About us Infrastructure Solutions International is a mobility and wireless solutions provider. With technical staff experienced in cloud, networking, mobility, security, and wireless we have the expertise to solve your problems. Infrastructure Solutions International www.infra-si.com info@infra-si.com Aligning the network infrastructure to support mobility Understanding that the network in mobile enterprise is a large system, that consists of multiple components that move in an out of and organization's mobile security domain. There is a need to break the system down into its components or subsystems. Within each component, evaluate what you need to control. The way to think about that is “How can we prevent a data breach”. Then next do a gap analysis what you have in place now. This will show you where need to make investments. The goal at the end of the day is focused on managing risks by aligning the network to your mobility initiatives. Defining the perimeter in terms of Users -> Devices ->Applications -> Data, puts into context how a business can structure the network to support enterprise mobility. In order to secure the mobile perimeter evaluate these five areas of your network. 1. Network Segmentation – A layered approach requires classifying the networks. Then you need to ensure traffic is blocked to applications and data that haven’t been associated with the enterprise mobility domain. 2. Connectivity – Understand the various network connection options that a user has. Then determine how you can control the connections. Some options are to control connections with access time schedules, managing persistent connections, and so forth. 3. Firewall - If your firewall is using legacy capabilities of source/destination IP address and ports, it time for a technology refresh. The features in a next-generation firewall (NGFW) allows organizations to get granular with network traffic by adding user access controls, packet inspection, network application/ID control, intrusion detection system/intrusion detection systems (IDS/IPS), traffic inspection and more to legacy firewall capabilities. 4. Network Access Control (NAC) – The NAC give an organization the ability to make network decisions based on device visibility. The ability to align the device application posture to your network access control. 5. Tunneling – within a mobile enterprise resources are available anytime and anywhere. There are options when it comes to allowing the access. Understanding your data will determine which approach is best for the business. Conclusion Mobility has changed how organizations secure the network perimeter. More than ever a layered approach is needed to ensure all mobility risks are managed appropriately. Ideally having end-to-end access controls in place that align to user’s roles and responsibilities will help manage the mobility risks. If an organization can effectively protect corporate data, they are able to quickly audit their security posture and adapt quickly to mobile changes. As technology continues to move towards anytime/anywhere access organizations need to ensure the network is up to the challenge. The value in the network is being able to analyze that information traversing it. If it's secure, then an organization can maneuver quickly to realize new opportunities that support their mobile initiatives.