Eight Trends That Are Changing Network Security - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Eight Trends That Are Changing Network Security-4 Next

Consumerization and the BYOD (bring your own device) movement means consumer devices like iPads, iPhones and Android phones are moving onto the corporate network. To deal with consumerization, your security strategy needs to focus on network security for devices where an endpoint agent may not have been deployed, or may not be functioning properly.

For example, if a user connects with a Mac running malicious code, your network security layer should be able to identify that the device is attempting to retrieve malicious code updates or other suspicious activities — and be able to identify and remediate it. Otherwise you may not find out until you’re already infected, and remediation can only happen after the fact. Consumerization and BYOD increase the importance of alignment between your various security layers.

Technology in the network security space has been through many dramatic changes recently. New mobile operating systems, growing use of personal devices, and Software-as-a-service (SaaS) delivery make securing the network a growing challenge. Enhancements in the network infrastructure that connect devices within or across the network make all these developments possible. We’re seeing ever faster network connections, more remote users, and extensive upgrades to mobile networks. We need to think about security policies and where and how to provide protection. The slideshow features eight trends, identified by Sophos, they think will impact network security and your security strategy.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.