SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
The dramatic influx of IoT and other network-connected devices
requires a radical new approach to management and security.
White Paper
International Data Corp. forecasts that approximately 80
billion devices will be connected to the internet by 2020,
up from 11 billion today. This flood of internet of things
(IoT) is expected to transform the corporate IT land-
scape at an unprecedented scope and scale, potentially
crippling legacy IT infrastructure management systems.
Security concerns—the top issue voiced by IoT devel-
opers according to a 2016 IEEE survey—could dampen
IoT’s potential. IT organizations must rethink their
approach to securing the network perimeter, pushing
intelligence to the edge of the network with a focus on
managing devices at a much higher level of granulari-
ty—without imposing access controls that penalize
the business.
Defining the problem
The days of exercising strict control over which devices
attach to the corporate network are over. The influx
of IoT devices—not to mention the bring-your-own-
device (BYOD) phenomenon—has dramatized the
many benefits of flexible network access. Customers,
suppliers, and partners increasingly expect to tie into
corporate networks, whether through access points,
APIs, or microservices. As a result, enterprise networks
must be flexible enough to accommodate occasionally
connected devices while also being robust enough to
quickly detect and block malicious activity.
Endpoint devices that lack the latest software and firm-
ware updates and security patches are one of the most
pervasive security risks in today’s networks. Endpoint
management systems can now automate many software
update procedures, but today’s systems are largely un-
prepared for the barrage of new devices that don’t con-
form to legacy standard definitions of PCs and servers.
Even with automation, large-scale software and
firmware updates are extremely difficult to coordi-
nate. Lack of knowledge about the latest security
updates, combined with overwhelming workloads
and shorthanded administrative staff, can result in
mayhem, with many patches and security upgrades
being applied haphazardly or not at all.
The problem is about to get worse too. Makers of
IoT devices like sensors, cameras, and thermostats
all have their own approaches to distributing and
applying updates.
Bankruptcies and acquisitions may leave some
devices marooned with no updates at all, while older
devices may go unsupported simply because main-
tenance isn’t worth the effort. This issue is important
enough that the Federal Trade Commission has urged
device makers to take these issues into account when
designing products and subscription plans.
PRESENTED BY
Staying Ahead of the
IoT Security Curve
With Reimaged
Network Access Control
Wanted: A new breed of
network access control
Network access control (NAC) systems protect net-
work perimeters by restricting the availability of net-
work resources to endpoint devices that comply with
defined policies. Most NACs do a good job of main-
taining an asset inventory, authenticating devices, and
keeping anti-virus and anti-malware software up to
date. However, most are incapable of managing the
more complex network environments of the future.
Traditional NAC solutions are complex, slow, costly,
and limited in the range of devices they support.
They can manage end-user productivity devices
like PCs and wireless access points, but they aren’t
designed to accommodate the new breed of IP-con-
nected sensors, cameras, and controllers.
Next-generation solutions need to combine technol-
ogy information with business context to understand
where vulnerabilities may exist. This demands not only
a more comprehensive view of the devices them-
selves, but also better understanding of risk indicators.
Here are some of the advanced features that the
next generation of NAC will need:
• Comprehensive visibility into all devices on
the network, including contextual information
about function, connectivity, application
dependencies, EOL/EOS status, and vendor
viability and commitment
• Integration with the bigger context of how
devices are used
• Integration with authentication and identity
management platforms to extend controls
to individual devices
• Automatic update capabilities
• A constantly updated master database of
vulnerabilities and the status of patches and
fixes for all devices
• Policy-based node group management that
permits microsegmentation so that devices
and users can be organized dynamically
• Tracking and monitoring of network-attached
and network-enabled devices from installation
through decommissioning
• Remote blocking and isolation
• Full reporting with drill-down capabilities
A cloud-based approach
Today’s network environments evolve too rapidly
for on-premises NAC solutions to keep pace, which
is why future solutions are cloud-bound. They allow
for constant refreshes with the latest information about
patches, upgrades, threats, and vulnerabilities. They
deliver superior functionality, security, and availability
to on-premises approaches. They also shift costs from
capital to operating budgets, enabling IT organizations
to forecast more accurately and free up capital re-
serves. Updates can be delivered immediately without
the need for installation, and the solution is inherently
protected against obsolescence.
Get started
A recent survey reveals that more than half of indus-
trial IoT leaders believe IoT will have a major impact
on their industry within three years, but barely 2%
have a clear vision for adoption or large-scale imple-
mentation. The same study finds that executives see
significant benefits from IoT in product and service
differentiation and customer engagement.
This suggests that early movers have an opportu-
nity for long-term competitive advantage through
IoT-driven innovation. Those organizations that put
the infrastructure in place today to capture that value
will be the winners. It all starts with the network.
The Genians Difference
Genians reimagines network access control by using device platform intelligence to monitor the entire lifecycle of all
devices connected to the network to ensure the highest levels of security and IT operational efficiency.
Device platform intelligence incorporates technology information with business context to expand visibility holistically
and ascertain any vulnerabilities accurately. Genian NAC powered by this intelligence can detect platform information
precisely about most connected devices without the need for an agent and present actionable information through
personalized dashboards.
The Genian NAC performs ongoing compliance checks efficiently to ensure that all connected devices are continually
identified and authorized, given policy-based access control, and constantly referenced against vendor/manufacturer
information to determine any need for updates, patches, or retirement. The solution can be delivered via cloud or on
premises at a fraction of the cost of a traditional NAC.
For more information, visit genians.com/editions.

Más contenido relacionado

La actualidad más candente

IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0Susan Wu
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_DeckEtheralabs
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 

La actualidad más candente (18)

ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 

Similar a Is Your Network Ready for the Age of IoT?

151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedCognizant
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxinfosec train
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxInfosectrain3
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
 
Internet of things
Internet of thingsInternet of things
Internet of thingsraj esaki
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 

Similar a Is Your Network Ready for the Age of IoT? (20)

151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA Unleashed
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
The IoT in the 5G era of industry 4.0
The IoT in the 5G era of industry 4.0The IoT in the 5G era of industry 4.0
The IoT in the 5G era of industry 4.0
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 

Más de GENIANS, INC.

What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecGENIANS, INC.
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesGENIANS, INC.
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview GENIANS, INC.
 
BOSNOG NAC stack 2018
BOSNOG NAC stack 2018BOSNOG NAC stack 2018
BOSNOG NAC stack 2018GENIANS, INC.
 
Security Consumerization by Genians
Security Consumerization by GeniansSecurity Consumerization by Genians
Security Consumerization by GeniansGENIANS, INC.
 

Más de GENIANS, INC. (6)

What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
BOSNOG NAC stack 2018
BOSNOG NAC stack 2018BOSNOG NAC stack 2018
BOSNOG NAC stack 2018
 
Security Consumerization by Genians
Security Consumerization by GeniansSecurity Consumerization by Genians
Security Consumerization by Genians
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Is Your Network Ready for the Age of IoT?

  • 1. The dramatic influx of IoT and other network-connected devices requires a radical new approach to management and security. White Paper International Data Corp. forecasts that approximately 80 billion devices will be connected to the internet by 2020, up from 11 billion today. This flood of internet of things (IoT) is expected to transform the corporate IT land- scape at an unprecedented scope and scale, potentially crippling legacy IT infrastructure management systems. Security concerns—the top issue voiced by IoT devel- opers according to a 2016 IEEE survey—could dampen IoT’s potential. IT organizations must rethink their approach to securing the network perimeter, pushing intelligence to the edge of the network with a focus on managing devices at a much higher level of granulari- ty—without imposing access controls that penalize the business. Defining the problem The days of exercising strict control over which devices attach to the corporate network are over. The influx of IoT devices—not to mention the bring-your-own- device (BYOD) phenomenon—has dramatized the many benefits of flexible network access. Customers, suppliers, and partners increasingly expect to tie into corporate networks, whether through access points, APIs, or microservices. As a result, enterprise networks must be flexible enough to accommodate occasionally connected devices while also being robust enough to quickly detect and block malicious activity. Endpoint devices that lack the latest software and firm- ware updates and security patches are one of the most pervasive security risks in today’s networks. Endpoint management systems can now automate many software update procedures, but today’s systems are largely un- prepared for the barrage of new devices that don’t con- form to legacy standard definitions of PCs and servers. Even with automation, large-scale software and firmware updates are extremely difficult to coordi- nate. Lack of knowledge about the latest security updates, combined with overwhelming workloads and shorthanded administrative staff, can result in mayhem, with many patches and security upgrades being applied haphazardly or not at all. The problem is about to get worse too. Makers of IoT devices like sensors, cameras, and thermostats all have their own approaches to distributing and applying updates. Bankruptcies and acquisitions may leave some devices marooned with no updates at all, while older devices may go unsupported simply because main- tenance isn’t worth the effort. This issue is important enough that the Federal Trade Commission has urged device makers to take these issues into account when designing products and subscription plans. PRESENTED BY Staying Ahead of the IoT Security Curve With Reimaged Network Access Control
  • 2. Wanted: A new breed of network access control Network access control (NAC) systems protect net- work perimeters by restricting the availability of net- work resources to endpoint devices that comply with defined policies. Most NACs do a good job of main- taining an asset inventory, authenticating devices, and keeping anti-virus and anti-malware software up to date. However, most are incapable of managing the more complex network environments of the future. Traditional NAC solutions are complex, slow, costly, and limited in the range of devices they support. They can manage end-user productivity devices like PCs and wireless access points, but they aren’t designed to accommodate the new breed of IP-con- nected sensors, cameras, and controllers. Next-generation solutions need to combine technol- ogy information with business context to understand where vulnerabilities may exist. This demands not only a more comprehensive view of the devices them- selves, but also better understanding of risk indicators. Here are some of the advanced features that the next generation of NAC will need: • Comprehensive visibility into all devices on the network, including contextual information about function, connectivity, application dependencies, EOL/EOS status, and vendor viability and commitment • Integration with the bigger context of how devices are used • Integration with authentication and identity management platforms to extend controls to individual devices • Automatic update capabilities • A constantly updated master database of vulnerabilities and the status of patches and fixes for all devices • Policy-based node group management that permits microsegmentation so that devices and users can be organized dynamically • Tracking and monitoring of network-attached and network-enabled devices from installation through decommissioning • Remote blocking and isolation • Full reporting with drill-down capabilities A cloud-based approach Today’s network environments evolve too rapidly for on-premises NAC solutions to keep pace, which is why future solutions are cloud-bound. They allow for constant refreshes with the latest information about patches, upgrades, threats, and vulnerabilities. They deliver superior functionality, security, and availability to on-premises approaches. They also shift costs from capital to operating budgets, enabling IT organizations to forecast more accurately and free up capital re- serves. Updates can be delivered immediately without the need for installation, and the solution is inherently protected against obsolescence. Get started A recent survey reveals that more than half of indus- trial IoT leaders believe IoT will have a major impact on their industry within three years, but barely 2% have a clear vision for adoption or large-scale imple- mentation. The same study finds that executives see significant benefits from IoT in product and service differentiation and customer engagement. This suggests that early movers have an opportu- nity for long-term competitive advantage through IoT-driven innovation. Those organizations that put the infrastructure in place today to capture that value will be the winners. It all starts with the network. The Genians Difference Genians reimagines network access control by using device platform intelligence to monitor the entire lifecycle of all devices connected to the network to ensure the highest levels of security and IT operational efficiency. Device platform intelligence incorporates technology information with business context to expand visibility holistically and ascertain any vulnerabilities accurately. Genian NAC powered by this intelligence can detect platform information precisely about most connected devices without the need for an agent and present actionable information through personalized dashboards. The Genian NAC performs ongoing compliance checks efficiently to ensure that all connected devices are continually identified and authorized, given policy-based access control, and constantly referenced against vendor/manufacturer information to determine any need for updates, patches, or retirement. The solution can be delivered via cloud or on premises at a fraction of the cost of a traditional NAC. For more information, visit genians.com/editions.