According to the 2016 Ponemon Cost of Data Breach study, malicious insiders continue to represent the most prevalent, costly and effective attack vector, while 76% of businesses remain unprotected from these insider threats.1 At the same time, the exponential growth of IoT, corporate and BYOD devices has further reduced visibility, yet security resources have not been increased accordingly.

Businesses today embrace the idea of anywhere, anytime connectivity, but have largely ignored the need for secure network access control (NAC). Many employ a laid-back NAC “connect now, secure later” philosophy. Others simply choose the same vendor for security that they use for network infrastructure. Both of these approaches give the illusion of security—even compliance—but in reality, leave extensive security gaps.

Visibility is a critical issue for under-resourced Operations and Security teams. Gartner research shows that each employee uses an average of three mobile devices, 2 and now, internet-connected things must also be considered. Factor in corporate guests, contractors and temporary employees, and the number of wired and wireless devices connecting to the network grows even higher. Without accurate data for all of these connected things, security gaps will appear and be exploited. Visibility is the first step toward closing that gap.

Control of devices is vital for enterprise security. Ensuring that only authorized and/or authenticated devices connect to your wired or wireless network significantly reduces your risk and releases resources.

Response. Your existing security tools—including security information and event management systems (SIEMs), firewalls and antivirus solutions—provide disparate actionable event data. Too many security tools provide too many possible security remedies. When threat data is unified, you can take simple, nuanced actions to suspend or disconnect malicious devices at the network layer and thereby limit loss—without the need for additional processes or resources.

Enforce wired and wireless policy
• Define what devices can and cannot do, and what infrastructure, applications and data they can access
• Close the gap between encrypted wireless and open-wired ports
• Strengthen BYOD security while simplifying application and
device authentication

Streamline network security management
• Unify threat and potential breach response with leading security vendors, all from a single management console
• Re-enforce your perimeter and know and control what connects inside the business
• Automate attack responses and unify threat actions with over 100 third-party security and infrastructure vendors

DTM Systems has been supporting organisations in British Columbia on technology design and execution for more than 35 years. With unmatched technical expertise across a broad portfolio of IT solutions, DTM is a partner that you can trust to deliver.