Simplicity, The Key To Secure Complex Networked Environments
As IoT devices are subjected to a wide variety of attacks including targeted code injection, physical alteration of firmware, man-in-the-middle attacks, remote control of devices to alter or disable their functionality, spoofing, or simply hiding of malware in the volume of IoT data, they are becoming a security nightmare for CIOs. Network security solution vendor Fortinet emphasized that the best way to secure complicated networked environments was simplicity. The end point security vendor said that implementation of Segmentation, Universal Policy and Collaborative Intelligence are the three important strategies for securing evolving environments such as connected device ecosystem.
Fortinet, recently conducted its annual Security Conference for Indian CIOs in Moscow, Russia. Presenting at the conference, Joe Sarno, Vice President, International Emerging, MEA, Eastern Europe, India & SAARC, Fortinetsaid, “Data centers are evolving along with customer demands for fast and secure cloud infrastructure and services. The growth of IoT devices and traffic represents both an opportunity and a threat to today’s digital businesses. Having a comprehensive security strategy, including a single pane-of-glass view of security management and policy across IoT to Cloud, is essential in establishing a consistent security posture for an organization.”
“It’s clear that isolated security devices don’t solve today’s cybersecurity challenges, and companies need something different. They want integrated security, from IoT to the cloud, with actionable analytics across their multi-vendor networking and security solutions, all delivered through a single pane of glass view,” said Sarno.
Fortinet security experts also highlighted that the region is tipped to be at the forefront of IoT growth, with market researcher IDC estimating that Asia-Pacific’s industries will connect 8.6 billion things by 2019.
Fortinet, has outlined 3 key strategies to help organizations in India protect their businesses:
1. Segmentation – Networks need to be intelligently segmented into functional security zones. End to end segmentation, from IoT to the cloud, and across physical and virtual environments, provides deep visibility into traffic that moves laterally across the distributed network, limits the spread of malware, and allows for the identification and quarantining of infected devices.
2. Collaborative intelligence – Local and global threat intelligence needs to be shared between security devices, and a coordinated response between devices needs to be orchestrated centrally.
3. Universal policy – A centralized security policy engine that determines trust levels between network segments, collects real time threat information, establishes a unified security policy, and distributes appropriate orchestrated policy enforcement.
Fortinet has introduced its new Security Fabric architecture that is designed to integrate security technologies for the endpoint, access layer, network, applications, data center, content, and cloud into a single collaborative security solution that can be orchestrated through a single management interface.
“As a leading multi system operator in India, we need to deploy a security strategy that can see and govern vast volumes of data traversing an entire borderless network. The forum was a good platform to learn about a security fabric that weaves together security hardware, software, and communication protocols with a single architecture to deliver seamless, comprehensive threat protection from IoT to the cloud”, said Venkata Rao Guruprasad, CTO, GTPL Broadband Pvt. Ltd., one of the participant in the event.
- Lack Of Trained Staff, Security Hinder FinTech Growth
- What’s Driving The Shift To Cryptocurrency Mining Malware?
- Why Enterprises Need To Automate Security Systems
- Ransomware Against IoT, Mobile On The Rise: SonicWall
- Employee Training: A Security Priority For Financial CISOs
- How To Become Cisco CCNA Security 210-260 Certified
- Women In Cybersecurity Face Harsh Reality: Study
- Decoding The Security Factor In IoT
- How Companies Can Disrupt Ransomware Attacks
- Weekly Rewind: Top 10 Stories On CXO Today (Oct 16-20)