Simplicity, The Key To Secure Complex Networked Environments
As IoT devices are subjected to a wide variety of attacks including targeted code injection, physical alteration of firmware, man-in-the-middle attacks, remote control of devices to alter or disable their functionality, spoofing, or simply hiding of malware in the volume of IoT data, they are becoming a security nightmare for CIOs. Network security solution vendor Fortinet emphasized that the best way to secure complicated networked environments was simplicity. The end point security vendor said that implementation of Segmentation, Universal Policy and Collaborative Intelligence are the three important strategies for securing evolving environments such as connected device ecosystem.
Fortinet, recently conducted its annual Security Conference for Indian CIOs in Moscow, Russia. Presenting at the conference, Joe Sarno, Vice President, International Emerging, MEA, Eastern Europe, India & SAARC, Fortinetsaid, “Data centers are evolving along with customer demands for fast and secure cloud infrastructure and services. The growth of IoT devices and traffic represents both an opportunity and a threat to today’s digital businesses. Having a comprehensive security strategy, including a single pane-of-glass view of security management and policy across IoT to Cloud, is essential in establishing a consistent security posture for an organization.”
“It’s clear that isolated security devices don’t solve today’s cybersecurity challenges, and companies need something different. They want integrated security, from IoT to the cloud, with actionable analytics across their multi-vendor networking and security solutions, all delivered through a single pane of glass view,” said Sarno.
Fortinet security experts also highlighted that the region is tipped to be at the forefront of IoT growth, with market researcher IDC estimating that Asia-Pacific’s industries will connect 8.6 billion things by 2019.
Fortinet, has outlined 3 key strategies to help organizations in India protect their businesses:
1. Segmentation – Networks need to be intelligently segmented into functional security zones. End to end segmentation, from IoT to the cloud, and across physical and virtual environments, provides deep visibility into traffic that moves laterally across the distributed network, limits the spread of malware, and allows for the identification and quarantining of infected devices.
2. Collaborative intelligence – Local and global threat intelligence needs to be shared between security devices, and a coordinated response between devices needs to be orchestrated centrally.
3. Universal policy – A centralized security policy engine that determines trust levels between network segments, collects real time threat information, establishes a unified security policy, and distributes appropriate orchestrated policy enforcement.
Fortinet has introduced its new Security Fabric architecture that is designed to integrate security technologies for the endpoint, access layer, network, applications, data center, content, and cloud into a single collaborative security solution that can be orchestrated through a single management interface.
“As a leading multi system operator in India, we need to deploy a security strategy that can see and govern vast volumes of data traversing an entire borderless network. The forum was a good platform to learn about a security fabric that weaves together security hardware, software, and communication protocols with a single architecture to deliver seamless, comprehensive threat protection from IoT to the cloud”, said Venkata Rao Guruprasad, CTO, GTPL Broadband Pvt. Ltd., one of the participant in the event.
- 70% Indian Firms To Deploy AI By 2020: Intel
- Why Cloud Adopters Need Visibility Into Their Network
- Cyber Security Jobs At Premium As India Goes Digital
- Trends In Information Management: An India Perspective
- Cyber Security Predictions For 2018
- How CIOs Can Ensure A Seat At The Strategy Table
- CIO's Five-Point RPA Planning Success Formula
- SpiderOak CEO Warns Of 10 Cybersecurity Threats For 2018
- Uber Data Breach: Accountability, Corporate Ethics In Question
- Customer-Facing Web, Mobile Apps Pose Highest Security Risk: Study