American Security Today's 2016 CHAMPIONS EDITION Digital Magazine AST 2016 CHAMPIONS EDITION | Page 56

Volume 9
The best practice is to combine a mobile device management system with enterprise-grade threat protection embedded on the device .
If agencies can manage devices from a far , limiting what information can be downloaded or sent from the device , combined with a robust threat protection system , security will be increased . That ’ s not to forget about other endpoints as well . While the new borderless networks don ’ t have hard borders like the old days , there are still exit and entry points that can serve as the first line of defense .
Champions Edition
Always Encrypted Encryption has proven time and again to be one of the best methods to protect data . Even if the data is stolen , thieves lack the ability to decode the encryption .
Agencies need to think about encrypting data at every step of the process . Email and other data transmission tools should be encrypted , so when traffic is being moved on a network it remains protected .
Agencies also need to think about protecting data at rest . While agencies typically focus on data that is in transit or in active use , data stored inside data centers is still at risk .
By thinking about encryption everywhere , agencies can ensure that data always has that layer of protection .
( No matter where your users are , and no matter what devices they ’ re running , confidently manage all of your endpoints with Symantec ’ s new Unified Endpoint Protection Cloud Service . Courtesy of Symantec and YouTube )
Protect the Cloud and the Network Cloud computing provides agencies with a world of storage and computing power , but also with additional security concerns . Agencies need to ensure that their cloud is protected at all times . The first step is to look at protecting the network and what traffic goes in and out of the cloud . With continuous monitoring solutions and advanced analytics , agency technologists can look for abnormal use .
Borderless networks are not to be feared . While they create a larger area that agencies need to protect , they are the result of technology growth that enhances employee productivity .
As government technology continues to take workers outside of the office , this area will only grow . With the right technology and policies , though , agencies can keep data secure no matter where it lies . Finding these abnormalities will help detect intruders . The same tools and techniques should be used in the cloud as well .
Look for web security services that can leverage global databases of threats and malware . In cybersecurity , knowledge is power .
( High Value , Low Friction End-to-End Security for Hosting Providers
56