This site is part of the Global Exhibitions Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.


Strategies for Securing the Mobile Enterprise

February 19, 2013 - Article
Continued from page 1

Here's why: It’s next to impossible to put a client on every device that needs access to information on your network. Network security-based policies are necessary to deal with the large number of guests, contractors and customers that will access the network.

And, of course, there is the added complication of employees bringing their own devices to work. This so-called BYOD environment offers potential for greater productivity and cost savings, guaranteeing it's not going away any time soon. In order to secure these devices and associated data, organizations will need to look toward network-based solutions and not just wireless and agent-based solutions that claim to solve the BYOD challenge. Simply put, the network must be the final authority on what information goes to and from devices.

Managed Security Services

Tying a single user to multiple devices, addressing access privileges and device-specific security vulnerabilities is no small task. Many businesses will struggle with the challenge of integrating devices securely into the network and will turn to MSSPs to meet the need.

Security-as-a-service can be hosted in data centers, provided by network service providers in "security-by-the-megabyte" increments or delivered as managed customer premise equipment sized for each location's user, control and Wi-Fi specifications.

For BYOD environments, managed security service providers (MSSPs) combine the security architecture and management expertise into an intelligent inspection point, ensuring  each device meets corporate security policies before gaining access to the network.

Stephan Tallent is director of managed security providers – Americas for Fortinet Inc. He has more has more than 20 years of networking and information security experience, the last 12 spent building managed security service practices. Prior to Fortinet, Tallent supported product development, technical design and sales support operations at Logix and Masergy. He also held sales and marketing roles at ANX and Iomega (EMC), and was co-founder and chief architect of a successful VAR turned MSSP. He is a Certified Information System Security Professional and a Fortinet Certified Network Security Professional.
Twitter: @stephantallent, @fortinet


Hear more from Fortinet's Stephan Tallent in the session, "Securing the Mobile Enterprise," at the Channel Partners Conference & Expo, Feb. 27-March 1, in Las Vegas.

« Previous12Next »
comments powered by Disqus
Related News
The capability comes thanks to a partnership with Alchemy Security.
Proofpoint says Abaca's real-time, in-memory threat scoring technologies complement its big-data
Craig Galbraith
SpectorSoft released results of the Insider Threat Report, a crowd-based research project.
Infoblox says DNS Threat Analytics further enables enterprises and service providers to protect