Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    Networks Offer Best Security for BYOD, Consumerization of IT: Cisco

    Written by

    Fahmida Y. Rashid
    Published March 2, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Information security professionals are faced with two difficult questions when trying to secure the network. They can either lock down the network, or €œfree up€ the technology, according to Cisco’s newly appointed head of security.

      The bring-your-own-device (BYOD) trend and the consumerization of IT pose significant challenges to the enterprise. While many security professionals want to lock down the network and prevent employees from using non-approved devices to access data or applications, it is not always possible, Christopher Young, the head of security at Cisco, said during his Feb. 29 keynote speech at the RSA Conference. Organizations are increasingly worried about the prospect of a cyber-attack compromising their data, and allowing employees to use any device for work purposes expands the potential risk.

      €œWe’re torn between these two extremes,€ Young said.

      Locking down the enterprise infrastructure doesn’t guarantee security any more than opening it into a free-for-all, as employees have no qualms about breaking the rules when it is not convenient to follow them. Security is often too cumbersome and complicated for the average user who winds up going to €œgreat lengths to bypass security in order to do their jobs,€ Young said. In a recent survey, 70 percent of employees admitted to breaking company policy, Young said.

      This tendency was in evidence even among the technically savvy and security-conscious audience at the RSA Conference. The conference organizers deployed a secure wireless network that used digital certificates to authenticate devices onto the network. People lined up at the wireless help desk for assistance in getting online connectivity on their smartphones, tablets and laptops. And there were even more people not bothering with the secure network and trying to connect to one of the free wireless hotspots, said Val Rahmani, CEO of Damballa.

      Administrators are also constantly second-guessing themselves. In the struggle to come up with the right decision, security professionals compromise their own efforts, Young said.

      €œWe have to have both. We need to have our cake and eat it, too,€ Young said.

      The way to have €œboth€ is by unlocking the power of the network, according to Young. The network is uniquely equipped to deliver security in a way very few technologies can, he said. The network is what collects the data about what users are doing, what data is being accessed and what the systems are transmitting. The network sees all the users, devices, applications and systems, as well as the interactions between the components, Young said. All this is available in real time, he said.

      €œThis is why the firewall is still important,€ as are virtual private networks and secure wireless networks, Young said.

      It is not possible to expect administrators to physically manage every kind of device every day. As a dizzying array of mobile devices floods into the network, administrators will need to rely on the network for information about what device is connected, where it is connecting from and what it is doing, according to Young.

      €œThe network allows you to lock it down and free it all up,€ he said.

      Cisco estimates that by 2016, there will be 8 billion smartphone devices globally, and desktops will be delivered on the network to whatever device the user is using at the time, Young said.

      Rahmani said there should be less worry about the exact device that is being used. At the heart, every device is essentially just an IP address, so the important thing is to make the network secure, she said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.