Common Gaps in Network Security Strategies

Jan Hof | March 17, 2016
Conventional security practices are becoming less effective. Security solutions such as antivirus, encryption, data leakage prevention, patch management, and vulnerability assessment assume that all endpoints on the network are well-managed, contain up-to-date and working security agents, and all remain static on the network (not transient).
These are problematic assumptions given today’s reality of Bring Your Own Device (BYOD), the fast growing number of Internet of Things (IoT)-devices, and the mobile computing requirements demanded by your increasingly mobile workforce.
Frost & Sullivan on behalf of Forescout conducted a survey1 and the results were shocking!
The Network Visibility Survey
The survey asked IT and security professionals at 400 large corporations located in the US, UK and Germany questions about security breaches and the efficacy of certain network security tools.
Key findings are:
Please click here to view the complete survey, demonstrating that no network component is truly secure.
If you can’t see it, you can’t control it.
A foundational element of network security is knowing what is on the network, and how each infrastructure device and endpoint is related. The Frost & Sullivan Network Visibility survey shows that organizations lack true visibility to the devices connecting to their networks and the state they are in. BYOD, IoT and other transient devices have changed the game in terms of network exposure. Today’s security best practices should include:
Conclusion
Companies need to see what’s connected to their network, including all managed and unmanaged devices. They need automated tools to help overstretched security teams and also need orchestration to share information between their numerous different security appliances. Forescout can assist with all of these aspects.
References:
Toll-Free (US): 1-866-377-8771
Tel (Intl): +1-408-213-3191
Support: +1-708-237-6591
Headquarters
190 W Tasman Dr.
San Jose, CA, USA 95134