Monday, October 25, 2010

Network Perimeter Changing text

Use the network managers simple ring life fence in the use of the resources of the network drives, put superglue in ports and access to the outside world only through the gateway, was one of the focus and effort was placed to stop bad guys or goes to the data.

It was then, but this is now.

At present, it is a continuous need to use the company's data from employees, who are more mobile than ever, from remote offices and branch locations, suppliers and customers. they want to have access to information, and they want it now, but more than that they want to and need to use a form that allows them to use the business better and more profitable.

Now it is flowing into the data center, which was once a tyre data located on the network access requests.

But this does not yet have a complete picture.

Access to the need for not only increased numbers and categories of users, but was equipped with a boom of the various devices used to connect to the network.

Mobile phones today, "smart" and is able to connect wirelessly or via cable; laptops hop on and off the wireless and wired networks become UNIVERSAL SERIAL BUS (USB), and "U", will stand for Ubiquitous and devices is the tip of the iceberg of consumer devices that are capable of connecting to a network in seconds for the mass.

Hard shell with an entry-and-place, which was strongly a checking old network model has delivered the ball way Swiss cheese full of holes and change of all time.

Still this is not a complete picture of the modern network because networks are becoming more and more business information about the nature of the threat environment. is significantly changed since the last year. hackers are not so many teenage children acne questions, but well organized criminals, who know that one credit record selling $ 10 black market and they look at financial records as the treasure trove of data.-Attacks have increased exponentially simply take ylläpitävänä wrong link by email to the human user to accidentally download malicious software onto a network. very recently, a piece of malicious software was distributed micro-blogging site Twitter victims did not need the link has been requested, they simply had to ensure that their mouse pointer over the link the infection!

The concept of the network perimeter is still out of date and this deep affect your network security Focus must now be. safety, in particular the identity of the user, whether, for a given device must be able to connect to the network, and if so, the rights should be granted to a dynamic approach. setting up a firewall at the same time simply and other security solutions gateway concept is still out of date due to the nature of the new surrounding porous.

The need to must be able to manage who and what may be used and how deep access is allowed, but at the same time must be able to effectively manage security policies that are configured on the myriad number of permutations for a given handle this.

This is a new network of the surrounding reality.

0 comments:

Post a Comment

Popular Posts