Social Network For Security Executives: Help Make Right Cyber Security Decisions
This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.
The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect the data and offer ability to stay connected. A reliable BYOD policy is required to help and safeguard our network. BYOD is to develop a policy that defines exactly what sensitive company information needs to be protected and which employees should have access to this information, and then to educate all employees on this policy. We experience that safety of our network depends on knowledge of our employee on cyber security.
Below are a few fundamentals covered :
1. Virtual Desktop Infrastructure & Containerization
It is way to address Virtual Hybrid Desktop issues by placing native applications inside a safe zone on a device. A virtual machine manager abstracts the container from the client hardware, boosting performance and reducing server strain by allowing client - side execution, while still improving security by isolating the container from certain functions, such as wireless network connections, USB ports or device cameras. Some virtual containers contain an entire operating system and productivity application suite, while others are purpose-built, single-function virtual devices that provide services like compliance monitoring or highly secure applications.
2. Chipset Level Security Technologies
These allow MDM to reach underneath a managed device's operating system, performing remote wipes and pre-boot virus scans, regardless of the device status. By providing access below the operating system, this technology allows administrators to correct problems by loading software patches and virus definitions, removing the need for third-party software tokens or hardware - based authentication devices. Anti-Theft technology from some reliable vendor extends security features such as remote, operating system independent device locking and unlocking to processors.
3. Network Access Control Technology
This allows employees to use their personal devices on the network while providing the security and access control required by the enterprise. The approach combines granular access policies, automated enforcement, and complete visibility into every device and user on the network. Leverage software and hardware solutions to lock down and manage devices while simultaneously securing the data itself. Wireless networks have to be built for secure BYOD access and the way to do that is incorporating NAC for mobile devices.
4. Data loss prevention
Deploying these engines enables administrators to keep track of data traffic and immediately block suspicious users or activity. DLP tools can apply a use policy for information as it is created, whether it is a file, email or application. This means that data in rest, in use or in transit can be logged, reported tagged and encrypted at any stage, ensuring the prevention of unauthorized activity. As more firms allow employees the freedom to access the corporate database from a personal device, DLP technologies will be imperative to maintain secure data management.
( Learn More : Top Security Researchers are coming together for workshops and sessions on Cloud Security, Cyber Forensics, IR, SOC, Appsec & more at SACON (Security Architecture Conference). Registrations open here )