INTELLIGENT BRANDS // Mobile Technology
Adaptive Trust - A
new defence for
secure enterprise
mobility
M
obile BYOD, cloud and the
Internet of Things are
changing enterprise defence
plans to guard against points of
attack inside the network perimeter.
These new ways of connecting to
secure resources have changed the
way traditional threat radars work –
protecting threats from the outside,
writes Michael Netterberg, Solution
Architect, Networking at Aruba, a
Hewlett Packard Enterprise company.
An HR director, a salesperson visiting
with your engineering team, and
70
INTELLIGENTCIO
a network administrator walk into
office at 9am. Each is carrying a
coffee in one hand, a smart phone
in their pocket and a laptop over the
shoulder. Within minutes of entering
the building, they all log in to the Wi-Fi
network and blend into the mobile
workforce.
These tech-savvy, and Wi-Fi loving
users expect to connect and work
from anywhere on any device – and
they want connectivity without
extraneous layers of security that slow
them down. It’s this workforce and
expectations that are turning security
inside out.
What’s happening faster than anyone
imagined is the dilution of the fixed
perimeter that surrounds the enterprise.
Before workforces went mobile, IT
invested tons of time and resources
into building a crack-free perimeter
that prevented outside threats from
coming into the enterprise. They
locked down the network with gateway
firewalls, intrusion prevention systems,
anti-spam, URL filtering and other
security solutions to close off possible
entry points. But in our more mobile-
centric world, the biggest threats now
come from inside the network.
Infected laptops and smart phones
walk right through the front door and
connect directly to the network without
IT’s knowledge. When you count the
attacks initiated from those unsecured
user devices, the loss of sensitive data
on mobile devices and risky end user
behaviour, they add up to more than
90% of enterprise security breaches.
www.intelligentcio.com