With the increase in attacks on broadband, the traditional method of protection such as firewalls and basic authentication becomes insufficient to protect against unauthorized entry and fraud.
Analysts at Dimension Data reveal that notwithstanding the best of safeguards such as firewalls and authentications in place, as many as 73 per cent of all network devices have at least one known security vulnerability, which is akin to leaving the front door unlocked while securing all windows and hatches. The report also states that many organizations do not have consistent and complete visibility of their technology estates, which is akin to not knowing that some windows exist in the house, to provide protection.
More and more companies now adopt a more secure layered approach to network security as means to overcome such gaping holes in security. This layered approach works on the principle that no single tool serves as effective protection against attacks, and entails having all possible security tools in place, but at different levels or layers. This approach more importantly ensures integration among such individual tools to eliminate gaps that malicious hackers may exploit. The layered approach also provides security to lower level data units, beyond application level security, something that traditional and stand-alone security tools often overlook.
The elements of the layered approach to network security includes traditional tools such as user authentication, access control, firewall, intrusion prevention devices, VPNs, anti-virus, vulnerability scanners, application shields, web and email filtering, access control mechanisms, internal security gateway, host based vulnerability assessments, and more. The different elements work in tandem, through a centralized management to authenticate and log consolidation, and correlate.
A layered approach to network security provides a far effective protection from malicious intrusions and intruders. Want to know more? Contact us today.
Reference: “A report reveals 73 per cent of network devices have a minimum of one security hole.” http://www.itpro.co.uk/633676/three-quarters-of-network-devices-have-common-vulnerability