How new access control technologies can address insider threats

By
Follow google news
Page 3 of 3  |  Single page
How new access control technologies can address insider threats
The toughest access control challenges are rogue IT security administrators — but even in this extreme case, carefully designed access controls help contain the problem. Access controls linked to network security management solutions can signal out-of-bounds behavior based on identity or role rather than easily spoofed network address. And access logs and reports, analyzed and organized by an automated security response management solution, help document the source of the anomalous or rogue behavior.

Ensure efficient, productive management

Properly implemented, automation and collaboration with security solutions improve almost every aspect of access control. They accelerate management responsiveness, and root out even sophisticated insider threats that evade traditional solutions. They reinforce consistency with a comprehensive view of policy implementation across the entire organization from a single console. They help avoid "access inflation" and workarounds by making consistent security portable from one security solution or network leg to another. And they help scale policy and control across the entire organization, incorporating the information and behavior of all its security products.

Finally, automated access control increases the productivity and control of administrative staff. By decreasing the time spent by administrative staff on access controls enables them to focus their talents on addressing core and strategic networking issues. From a strategic perspective, trusted networks that support reliable communications of critical information among employees and partners throughout the enterprise are a key link in raising productivity while saving costs.

Conclusions

Business and network evolution has increased the number and severity of network, application, and data risks from errors and attacks made by authorized insiders, including outsourcers. Traditional access controls and point products can leave gaps in coverage, and raise risks of "access inflation" and precarious workarounds when network and access management grows too complex. A solution-oriented, granular, policy-based approach, assigning identities and roles for access control and interoperating with existing network and security infrastructure, carefully and cost-effectively implemented and efficiently managed, provides the most effective, consistent defense against a growing array of insider risks and outsourcing threats.

Rich Campagna is senior product line manager of access solutions at Juniper Networks

Add iTnews as your trusted source

Previous Page 1 2 3 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Australia's critical infrastructure security laws "toothless"

Australia's critical infrastructure security laws "toothless"

"CanisterWorm" supply chain malware attacks npm

"CanisterWorm" supply chain malware attacks npm

Gov proposes disclosure delay for most serious cyberattacks

Gov proposes disclosure delay for most serious cyberattacks

US regulator bans imports of new foreign-made routers

US regulator bans imports of new foreign-made routers

Log In

  |  Forgot your password?