Network and Perimeter Security: Together Works Best ! -Murli Mohan, Director & GM, Dell Software Group

By: Murli Mohan, Director & General Manager, Dell Software Group

A vast majority of IT professionals agree that mobile devices and wearables present new IT security risks, such as data theft and auto-syncing of corporate data. Even though modern-day technology is meant to simplify our lives, ease-of-use also means these devices are much more vulnerable to cyber-attacks.

A recent Dell Global Security Survey reveals that mobility, cloud computing and the Internet of Things are introducing a slew of new risks, and that there is a rise in accidental and malicious internal breaches. The survey also found that 76 percent of IT leaders polled (93 percent in the U.S.) agreed that battling present-day threats requires companies to protect their entire perimeter – inside and outside the organization – by raising the bar for network and endpoint security.

In the pre-BYOD era, ensuring data security used to be a relatively simple affair. There were clear perimeters within office buildings that could be safeguarded with locks, alarms, and if necessary, searches of belongings. The external endpoints that required protection amounted to briefcases or official paperwork that employees might lose. With the rise of computing and data stored on corporate servers and PCs, firewalls emerged to protect the network, and various methods prevented information from leaving the company premises on diskettes. Today, however, perimeter protection is vastly more complicated, and corporate data is accessible by an array of endpoints – laptops, tablets and smartphones – that represent an ever-changing perimeter with ever-evolving risks of serious data breaches. As a result, protecting data now requires a dual approach to security: traditional “inside” network security to protect data on servers, and “outside” perimeter security to prevent the use of endpoints to circumvent network security.

Air Works, one of the leading providers of Aviation Maintenance, Repair and Overhaul (MRO) services recently deployed such network security solution for their business. Air Works required a highly improved business performance and application that would also improve remote user and employee satisfaction. They needed an efficient security solution for the business that will help them provide auto failover and fallback of primary & secondary connectivity with active-active HA firewalls.

Air Works, then deployed a robust combination of network security to safely connect their 40 plus hangars, line stations, and offices. The solution proved to be a good fit in achieving Air Work’s core technology performance parameter of 350 ms platform that further helped them in bringing its IT portfolio on cloud to provide a delightful experience to users.

While most companies already understand the need for a robust firewall to protect data on corporate file systems, many do not yet know what it takes to protect endpoints and data during transmission. The most effective way is with a highly coordinated, holistic security plan using multiple, integrated tools that can adapt to evolving threats, changing business requirements and specific company risk profiles.

In today’s highly distributed network environment, a corporate firewall simply is not enough. Only by deploying and centralizing the management of firewall, endpoint and data transmission protection can organizations gain the visibility and capabilities needed to protect data, thwart breaches and prevent leaks.


Comments are closed.