Page 28 - Cyber Warnings
P. 28







Self-registration lets guests create their own log-in credentials, which are delivered via printed
badges, SMS text or email. Credentials can be stored for specific periods of time and set to
expire automatically. Guest traffic on the network should also be configured to run separately
from enterprise traffic. Today's most robust security management platforms allow guest portals
to be customized with options like advertising and local language support. Guest policy
management must also include the ability to set bandwidth limitations on guest sessions to
maintain service-level agreements and robust throughput for all users.

Network access management systems that integrate with next-generation, application-aware
firewalls for additional protection against non-http traffic and content filtering that prevents
access to inappropriate or offensive websites is also recommended.


Regular Checkups of Device Health

Prevention is especially good medicine for the security of enterprises and their datacenters. IT
must have the means to perform endpoint health checks to ensure that laptops are fully
compliant with internal requirements which check for the latest patches and updates before
they're allowed to connect.

In addition to system-wide, per-session NAC protection, enterprises should be able to specify
whether to allow or deny capabilities like peer-to-peer applications or USB storage devices.
Administrator dashboards make it easy to identify non-compliant devices, users, and the
reasons for non-compliance. Access can be denied if storage is not encrypted; this also gives IT
leverage with users to ensure that offending laptops get updated as needed. Endpoints that
aren't in compliance can be automatically remediated or quarantined with today's security
management platforms. These sorts of security functions are no longer just nice to have –
they're essential to today's most competitive businesses. And with the advent of cloud
computing and an explosion of IoT devices, robust security management is essential for
enterprises. End-users – accustomed to high levels of performance, easy access and self-
service – expect the same of business networks.

Security platforms that integrate policy management with authentication, authorization and
accounting will lay the groundwork for more robust computing and IT-fueled productivity. And
they’ll keep networks, devices, data and users safe in the process.

About the Author

Ahmed Rezk, Channel Systems Engineering Manager, Middle-East and Turkey
at Aruba, a Hewlett Packard Enterprise Company.









28 Cyber Warnings E-Magazine – July 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   23   24   25   26   27   28   29   30   31   32   33