Inside the Briefcase

Ironclad SaaS Security for Cloud-Forward Enterprises

Ironclad SaaS Security for Cloud-Forward Enterprises

The 2015 Anthem data breach was the result of...

The Key Benefits of Using Social Media for Business

The Key Benefits of Using Social Media for Business

Worldwide, there are more than 2.6 billion social media...

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Register with code GARTITB and save $350 off the...

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

8,434 adults were surveyed to gauge consumer awareness of...

FICO Scales with Oracle Cloud

FICO Scales with Oracle Cloud

Doug Clare, Vice President at FICO, describes how Oracle...

Network Access Controls in the Age of Enterprise Mobility

April 23, 2018 No Comments

Featured article by Jessica Dominguez, Independent Technology Author

mobility 300x222 Network Access Controls in the Age of Enterprise Mobility

Enterprise mobility is an approach to work in which companies allow their team members to work from anywhere using a variety of devices and applications. The term “Enterprise Mobility” typically covers both the mobility of corporate data as well as the mobility of team members. This includes the use of mobile devices, such as smartphones, tablets and laptops for business purposes, from anywhere – in the office, at home and in transit to remote cities or countries, while maintaining access to corporate data, communications and programs. Enterprise mobility is increasingly significant because it gives employees flexibility and choice, which can increase productivity and improve job satisfaction. Moreover, it allows companies to expand to more cities and countries and grow their direct markets while maintaining efficient communications and workflows. NAC Security (Network Access Control Security) is a crucial companion in providing a secure workflow for all of the above scenarios.

As business professionals, we have benefited tremendously from the convenience, agility and freedom of enterprise mobility. From the ability to work in transit, during conferences and conduct online collaborative meetings, with teams all over the world; to being able to launch campaigns, meet deadlines and present from any location; conducting business in this age of mobility allows for the flexibility and timeliness that are so crucial in today’s business.

Faced with the increasing threat of ransomware attacks, which are practically a weekly occurrence now, many organizations are actively engaging in updating their cybersecurity defenses and authentication procedures to avoid the attention of cyber offenders. This includes reviewing current data security strategies to maintain the convenience and productivity enhancements available through enterprise mobility, BYOD (Bring Your Own Device) policies and the use of IoT applications (Internet of Things), while at the same time, keeping corporate data secure and inaccessible to poachers.

Internet-of-Things (IoT) may include the use of smart TV’s, smart refrigerators, printers, VoIP programs, cameras, iWatches, FitBit bracelets, etc; by employees, third party consultants and contractors. Any device that has connectivity and software will ultimately have implications to security, and so, a solution is required that will allow flexibility to safely onboard allowable devices of all types.

Today companies of all sizes are faced with the same security issues and growing compliance requirements. Hackers and data poachers do not discriminate or make adjustments based on company size or organization type. The challenge for many companies is – how do they maintain a level of security and compliance that even large companies struggle to attain but often with limited resources and budgets? The answer for many is to deliver Network Access Control (NAC) in the cloud.

With Cloud Network Security all the security complexities and exorbitant costs are removed, and while network access is moved to the cloud it provides a quick, easy to deploy, user-friendly management interface and a cost-effective NAC solution. Where many cloud-based solutions are focused only on wireless, it is recommended to find a solution based on the understanding that a typical network often includes a few access layers such as wireless, wired and VPN remote access. Why would any enterprise desire a solution that only covers part of the network? Or a specific office location? As business professionals we are expecting more agility and mobility now and in the future and therefore, with cost-effective solutions, no organization needs to be left behind.

 

APPLICATION INTEGRATION, DATA and ANALYTICS , MOBILE, SECURITY, SOCIAL BUSINESS

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner