Page 14 - Cyber Warnings
P. 14







Every one of us can appear quite different to our network depending on the context. For
example, if you are a doctor in an operating room accessing medical records, you must be given
instant, high priority access.


But if you are that same doctor seeking medical data from the Wi-Fi network of a coffee shop
down the street, your access privileges could be assigned a lower priority level.

When trust is weighed and adapted to contextual factors, you have what we call Adaptive Trust.


We have implemented the principles of Adaptive Trust in ClearPass, Aruba’s policy manager
and in ClearPass Exchange, a central policy engine that enables layers of security thanks to its
set of open APIs.

A number of partners, including Palo Alto Networks, MobileIron, Intel and Microsoft are part of
the ClearPass Exchange ecosystem.

How does this approach work? Recently, one of our partners found one of its firewalls detecting
suspicious activity within a network.

The cause: an e-cigarette that had been plugged into a USB port for charging. It turned out the
device, unbeknownst to its owner, contained malware.

When it comes to potential IoT threats, that’s just a hint of what’s over the horizon.

Some experts believe that a massive IoT breach is inevitable. However, using a new ClearPass
capability called OnConnect, you can now secure IoT devices like sensors that, unlike typical
intelligent network devices, do not run 802.1x authentication protocols.

There is a very different perimeter out there. Don’t sit back and wait for the next breach.

Get to know that new perimeter -- and adapt your trust accordingly.



About the Author

Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard
Enterprise company













14 Cyber Warnings E-Magazine December 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   9   10   11   12   13   14   15   16   17   18   19