Are we still compromising security for network access? We believe our networks are the fabric that connects users and devices to applications and information.
We build, upgrade and expand our unified (wired and wireless) networks based on resilient, but simplified (bye, bye STP) topologies, and add intelligence to identify and accelerate real-time and mission critical applications. However, when it comes to adding security we play the age-old tug-of-war game. Security is enabled at the cost of access or the inverse where security is compromised to provide access. In a recent AdvizeX security presentation that reviewed the “data-centric security model” (DCSM) some of the reasoning became clear.
The DCSM model discussed in-depth security at every layer of the OSI model. It is a comprehensive approach that spans multiple departments and potentially different business units. Thus, security is not typically applied across all layers for functional or political reasons. Recent history also illustrates the industry failure of adopting and implementing 802.1X or network access control (NAC) security.
Adaptive security solves these problems by enabling role-based access at the access layer for the devices we use and for the devices we use to run our businesses. It accomplishes “secure network access” by policy enforcement, but without the crippling dependencies of 802.1X. The user’s active directory credentials, the device type, its OS level, the health of the device, and location within the network determine the current access level. If any of those factors are altered and no longer meet the defined policy, then access is automatically restricted or denied.
There are no compromises, no manual intervention and it provides the reporting / remediation tools required for proactive support. This allows us to build a single network, one SSID, and use policy to identify and control access for employees, partners, contractors, customers and visitors, while classifying and controlling the internet of things (IoT) devices. Adaptive security is software based, heterogeneous and overlays on top of your existing wired and wireless network.
One simplified, highly resilient network with adaptive security. No Compromise. AdvizeX is a leader in helping our customers securely connect users and devices to their applications and information. Talk to us. We can help.
Look for additional AdvizeX blogs on these type of topics for additional information. ▪