Skip to main content

Knocking-off NAC, just not yet!


Happiest days of Networking? Desktop wired to a face plate, wired back to the switches and you must be physically present to access the local or corporate network resources. Then came the flexibility of laptops. You can carry it wherever you want. Presentation at a customer place, no issues. Design your presentation, off-you go, attach to the projector at the conference room and deliver a presentation. But back to the office network, you need that magic RJ-45 Ethernet cable to get hooked to the corporate network. One file server, and one print server, and somewhat advanced networks you used to have mail servers.
Then came the wireless networks. Laptops needed a PCMCIA card to make your connection wirelessly. Yet, some control with the network administrators. Introduction of built-in wireless devices, introduction of smart phones, tablets and umpteen other devices resulted in complete loss of control and administrators now with sophisticated designations as ‘Security Administrators’ started feeling the heat.
Network Admission or Access Control (NAC) is all about right people accessing right resources in compliance to the corporate security policies. No more and no less.
You want your employees to be connected 24×7? Mail clients on mobile, fancy mails tags such as ‘Sent from Outlook for Android or Sent from iPhone’? Now you are talking about what to control. How would you restrict an employee downloading a corporate email attachment to the phone and then sending it back to his or her personal email address?
Access to Corporate resources through mobile apps, Web based applications, Time and attendance, Sales and CRM from anywhere, anytime from any device, you are talking about a wide spectrum to monitor and control.
NAC is not the newest of technologies in the block. It has been there for at least two decades. Now why this renewed focus? Wireless infrastructure allowed employees, contractors and guests to access Corporate network. However, you want to restrict Guests to only access Internet and not the Intranet. You may want to allow contractors to Extranet, but not to access your internal file servers. Employees need to access certain resources, but only when they are in certain locations. Access to corporate applications from an Internet Café means a complete clean-up of session after your complete your work or risk of losing corporate data to outsiders. Organization’s decision to BYOD (Bring Your Own Device) may spell doom to CSOs and may mockingly become Bring Your Own Death (BYOD).
Protecting sensitive data, improved productivity, flexibility in BYOD, ease of deployment and ease of management are the factors a CSO to consider before deciding on a NAC solution.
Simple questions to ask yourselves before picking-up a NAC solution:
Can it provide complete visibility? Do I get detailed reporting for compliance? Can it offer context-aware policies based on user role, time, location and the kind of device he or she is accessing the corporate resource from? How much overhead it brings to the administration and management. Can the process of onboarding a user, enrolment and logging be completely automated to bring seamless experience to the users? How can I integrate with existing MDM (Mobile Device Management) solutions?
Now, we can call its NAC 2.0. A rejuvenated NAC. Or NAC reborn! Whatever you may choose to call, don’t knock-off NAC from your IT security budget. Not just yet!
~M.K. Mohan

Comments

Popular posts from this blog

New Stock Market Fraud Alert!

  Let me share the latest stock market fraud going around the country. The terms you will be hearing are: Institutional Trading Block Deals AI Algorithms, and Confirmed IPO allocations Modus Operandi You will be searching for some Stock Market resources on the Social Media Websites Advertisement lures you with 10x to 30x returns Invitation comes to join a WhatsApp or Telegram Group You will find several people posting their trade screenshots Each one of these screenshots shows 30%-50% gains An 'expert' will help you with formalities to open an account You have to invest anything from 1 - 10 lakhs (1 million) You will deposit the money into various bank accounts (why?) as advised by the expert You will get an advice to ' buy ' a stock when they say You will get an advice to ' sell ' a stock when they say You can't sell a stock whenever you want. The sell button is disabled. First few days, you will be getting 20-30% returns You are then pushed by the a...

KYX

  KYX is the Key to Your Organisation’s Cybersecurity. TIP 1. KNOW YOUR CUSTOMERS (KYC) Understanding your customers’ business is key to building your organisation’s cybersecurity. Key considerations include: how they transact with you, whether online or offline, how you store their data and financial transactions, and if they share their PII (Personally Identifiable Information). TIP 2. KNOW YOUR BUSINESS (KYB) If you are a legacy organisation transitioning to digital processes, it is important to understand how you conducted business before computerisation and how you operate now. Have you fully embraced digital technologies, or are you just starting your journey? Do you have a website that serves as the primary point of interaction with your customers? If so, do they share their data with you online, and if they do, how do you handle it? Is the communication channel between you and your customers fully secured? Finally, are you required to meet regulatory compliance? These are ...

Are you FAST enough for SAST & DAST?

Banking and Financial Sector companies have come a long way from the conventional banking system to modern means of providing various services to the customers at their finger trips. Long days of wait for cheque clearances, long queues at tellers and the rate of which each transaction used to occur is long gone. Now you have Internet Banking System, Mobile Banking System, and Interactive Video Customer Services. Opening of bank accounts through tablets right from the customer’s home, online transactions through NEFT (National Electronic Fund Transfer), RTGS (Real Time Gross Settlement), IMPS (Immediate Payment Service), payment wallets and several such new features have modernized and simplified banking activities. Technology brings fantastic benefits. However, the IT teams of these financial sector organizations who are into modernization face tremendous challenges. On the customer front, they need to ensure intuitive, colourful and easy to use customer interfaces that ensure t...