Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

BLOG: Information security at the top of your agenda

Phey Teck Moh | April 12, 2012
Organisations should take a layered approach to bring security management in wireless networks closer to that established in wired networks.

Monitor for security and compliance

A critical layer of wireless LAN security involves monitoring of the network to identify rogue WLANs, detect intruders and impending threats as well as enforce WLAN security policies. The monitoring must be scaled to fit the specific needs of an organisation without compromising on cost-effectiveness and centralised management or taxing personnel resources.

Security experts advocate 24x7 monitoring of the network airwaves by providing a complete overview of the wireless airspace, identifying rogue devices and disabling them immediately; detecting intruders and impending threats; enforcing WLAN security policies as well as powering forensic analysis via incident reports.

External mandates on compliance

Regulatory compliance adoption is another aspect of wireless management that organisations need to proactively embrace, helping users minimise cost and vulnerability from legal action and damage claims due to customer data breaches. In fact, customer confidence in an organisation is linked to whether personal information and data are strictly protected. For retailers, compliance mandate would mean adoption of Payment Card Industry (PCI) Data Security Standards (DSS). For the healthcare providers, it would be the Health Insurance Portability and Accountability Act (HIPAA) compliance and securing PHI (Patient Health Information). Similarly, many corporations will be subjected to compliance standards such as Sarbanes Oxley (SOX) and Gramm-Leach-Bliley Act (GLBA).

Companies like Motorola Solutions provide a complete enterprise wireless security and compliance solution such as the AirDefense Services Platform that not only mitigate risk and assure compliance, improve operations with proactive advanced troubleshooting and analysis but also deliver an effective infrastructure management tool to maximise efficiency with centralised management. 

CIOs and corporate decision makers must view wireless as a key business enabler and a competitive advantage, take the appropriate measures and request the right level of investment, to arrive at an optimised wireless security solution for the organisation.

[1] http://www.justice.gov/usao/nj/Press/files/pdffiles/2010/dojgonzalez0326rel.pdf

Phey Teck Moh is corporate vice president, Asia Pacific, Motorola Solutions.

 

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.