Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

The Adaptive Trust Defence to Network Security

Justin Chiah, Director and General Manager, South East Asia and Taiwan at Aruba, a Hewlett-Packard Enterprise Company | June 27, 2016
With this tectonic shift from fixed, static wired networks to open, dynamic environments where mobility rules, IT managers are now faced with all new challenges when safeguarding the security of company data and IT systems.

This vendor-written piece has been edited by Executive Networks Media to eliminate product promotion, but readers should note it will likely favour the submitter's approach.

The array of connected devices and applications today has put information retrieval in the palm of our hands, blurring the lines between the workplace and social life. This desire to stay connected to everything anywhere, and at all times, is driving the demand for the all-wireless workplace. And this trend is set to continue - Gartner forecasted that 6.4 billion connected 'things' (or devices) will be in use worldwide in 2016 alone.

While businesses must embrace the inherent productivity and creativity that this trend brings, they also need to ensure that company assets do not suffer as a result. Companies need to be mindful that securing this information needs to extend beyond their own equipment to consider how their use of mobile and social technology might create issues for their organisation and potentially introduce new facets of digital risk.

With this tectonic shift from fixed, static wired networks to open, dynamic environments where mobility rules, IT managers are now faced with all new challenges when safeguarding the security of company data and IT systems.

#GenMobile shows indifference to data security

Today's new and rising mobile generation, what we call #GenMobile, live in a world where they rely on their mobile devices for every aspect of their personal and work related communication. Yet, this generation of mobile users often show indifference to the importance of security procedures and measures.

In a recent study conducted by Aruba Networks, a Hewlett Packet Enterprise company, it was revealed that as many as six out of 10 respondents are happy to let others regularly use their work and personal smartphones, and nearly a third of workers admit to having lost data due to the misuse of a mobile device.

With these figures, it is not surprising that network security is getting increasingly difficult, with room for improvement in the way businesses prepare for the high-risk, security-indifferent mind-set for the #GenMobile workforce.

Can't beat 'em? Get one step ahead of 'em

Organisations now require a new network security strategy. If IT is going to protect the enterprise network and its resources, it must adapt to the way #GenMobile works - starting from inside the perimeter.

To do this, IT must take advantage of known, contextual data that it can leverage and trust - a person's role inside an organisation, the devices and apps they use, and their location - to create policies that fortify network security and adapt to mobility needs.                          

Organisations should strive to build a secure and operational framework for all workers, rather than stifle them. By adopting the following five-step checklist, organisations can ensure their IT teams are prepared for the risks that #GenMobile workers bring.

 

1  2  Next Page 

Sign up for CIO Asia eNewsletters.