How new access control technologies can address insider threats

By
Page 3 of 3  |  Single page
How new access control technologies can address insider threats
The toughest access control challenges are rogue IT security administrators — but even in this extreme case, carefully designed access controls help contain the problem. Access controls linked to network security management solutions can signal out-of-bounds behavior based on identity or role rather than easily spoofed network address. And access logs and reports, analyzed and organized by an automated security response management solution, help document the source of the anomalous or rogue behavior.

Ensure efficient, productive management

Properly implemented, automation and collaboration with security solutions improve almost every aspect of access control. They accelerate management responsiveness, and root out even sophisticated insider threats that evade traditional solutions. They reinforce consistency with a comprehensive view of policy implementation across the entire organization from a single console. They help avoid "access inflation" and workarounds by making consistent security portable from one security solution or network leg to another. And they help scale policy and control across the entire organization, incorporating the information and behavior of all its security products.

Finally, automated access control increases the productivity and control of administrative staff. By decreasing the time spent by administrative staff on access controls enables them to focus their talents on addressing core and strategic networking issues. From a strategic perspective, trusted networks that support reliable communications of critical information among employees and partners throughout the enterprise are a key link in raising productivity while saving costs.

Conclusions

Business and network evolution has increased the number and severity of network, application, and data risks from errors and attacks made by authorized insiders, including outsourcers. Traditional access controls and point products can leave gaps in coverage, and raise risks of "access inflation" and precarious workarounds when network and access management grows too complex. A solution-oriented, granular, policy-based approach, assigning identities and roles for access control and interoperating with existing network and security infrastructure, carefully and cost-effectively implemented and efficiently managed, provides the most effective, consistent defense against a growing array of insider risks and outsourcing threats.

Rich Campagna is senior product line manager of access solutions at Juniper Networks
Previous Page 1 2 3 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Log In

  |  Forgot your password?