The Concerns over Network Security, BYOD, and the Cloud

By Juliana Kenny July 26, 2012

The issues in network security today are different than they were just two years ago with the growth of the bring-your-own-device (BYOD) trend that expands the enterprise’s concern with managing the flux of mobile data across its network. In a debate at NetEvents Americas in Miami, FL this week, experts on network security gathered to ruminate over this topic, and hash out what businesses need to do to secure their networks.

Jill Knesek, head of Global Security for British Telecom, (the network operator for the Olympics in London this year) offered up the notion that businesses need to understand what their risk appetites are instead of thinking that they can squash all possibilities of invasions or intrusions. Wayne Rash, editor in chief for FierceMobileIT, asked the panel and audience if any of them really believed that you can secure a network. Her answer was, “No. In the business environment I work in, we accept that. You have to understand what your risk appetite is.”

Is there a way to go about managing risk even though no network is impenetrable? Vik Davar, VP of Corporate Development for ClickSecurity, suggested that modern security threats can be assuaged with security analytics: “Intrusions happen, they will continue to happen, but if you have a real-time security analytics solution,” you will be on the preventative side of the equation.

The BYOD element of this problem is only now being considered by the enterprise as a significant hindrance in the progression of the mobile workforce and moving towards the cloud. Ram Appalaraju, VP of Technology and Product Marketing for Enterasys Networks, brought up the concept that every one of us is “a walking set of IP addresses.” He, himself, exposes his company to risk with the use of his devices. We all do. Every time we transfer documentation across mobile spectrums, we compromise the security of the company associated with that material. But Appalarju mentioned that “this is accepted in today’s enterprise. Fast detection and self-remediation are two ways we can address this.”

When Rash brought in Jurrie van den Breekel, director of Product Marketing for Spirent Communications, he raise an equally-as-important question: To what extent does a cloud environment protect you?

The answer seems to be: Not as much as we would all like to think. Van den Breekel said, “People who have individual machines cannot filter out repeated attacks,” which becomes important when we’re talking about organizations such as Amazon with millions of users all on different devices. He went on, “From a risk perspective, when you deploy your services in the cloud, you think you’re protected.”

Clearly, that is not the case. Rash added that as soon as a denial-of-service attack starts, the cloud provider “drops you like a hot potato.”

The good part about outsourcing part of your infrastructure is that you can also outsource the liability, according to Knesek. Of course, this brings a whole other concern into play, as Knesek stated, “There is a risk to the business when it comes down to the human element. A lot of it boils down to hiring good people.”

As Knesek pointed out, a device will never replace a human. While this seemingly reverses the current trends in robotics, to Knesek’s previous point, Rash concluded that it’s really not the technology that creates these attacks. It is important to remember that “people are always the threat in the end.”




Edited by Brooke Neuman

TechZone360 Managing Editor

SHARE THIS ARTICLE
Related Articles

Consumer Privacy in the Digital Era: Three Trends to Watch

By: Special Guest    1/18/2018

Digital advertising has exploded in recent years, with the latest eMarketer data forecasting $83 billion in revenue this year and continued growth on …

Read More

CES 2018: Terabit Fiber - Closer Than We Think

By: Doug Mohney    1/17/2018

One of the biggest challenges for 5G and last mile 10 Gig deployments is not raw data speeds, but middle mile and core networks. The wireless industry…

Read More

10 Benefits of Drone-Based Asset Inspections

By: Frank Segarra    1/15/2018

Although a new and emerging technology, (which is still evolving), in early 2018, most companies are not aware of the possible benefits they can achie…

Read More

VR Could Change Entertainment Forever

By: Special Guest    1/11/2018

VR could change everything from how we play video games to how we interact with our friends and family. VR has the power to change how we consume all …

Read More

Making Connections - The Value of Data Correlation

By: Special Guest    1/5/2018

The app economy is upon us, and businesses of all stripes are moving to address it. In this age of digital transformation, businesses rely on applicat…

Read More