Saturday, August 9, 2014

Security and the "Private Network" - Lock the doors and change the keys

The Internet is not a nice neighborhood, and has not been for quite some time. Data leaks, misuse of corporate technical assets, corporate espionage, phishing and crypto level malware - the list of threats is growing quarter to quarter.
In addition to the liability (SOXHIPAA,Digital Privacy/security Acts - state and federal) the trend towards big data analytics brings a data silo issue to virtually every business. In short, no business is safe, it is time to lock the doors and review access lists.
Understanding who is looking at what, whether or not they made a change, and what the data looked like before the edit - the metrics of governance reporting - represents a whole new playing field for SMB and Enterprise IT/Ops stakeholders.
A recent report by the GOA outlines the future of bandwidth costs. Wired and wireless carriers are considering strategies for data usage and new pricing models. The Feds are in the middle of “Net Neutrality” arguments, hoping to level the playing field, odds are we are headed towards a caste system .. with regards to data usage and access. This is not a US problem only, we North Americans are getting the short end of the data/cost stick, but access is available - if it is in the budget.
Companies ranging in size from SMB to Enterprise should consider a “private network” as a leading security strategy. MPLS networks (as an example) provide a single point of entry to the greater web and allow for a high degree of packet management within the corporate LAN/WAN. Incorporating voice, data and video needs across locations and distributing users across a “private cloud” drastically increases security and lowers downtime.
Forts and castles are famous for guarded gates and single points of entry. The closed loop network, allowing for two factor authentication at EVERY point of entry, provides the same level of "guarded gate" as castles of old. A closed loop network with single points of egress for QOS/COS colored traffic to the greater web, once an expensive solution, is gaining traction as costs drop.
Within the framework of “costs” the argument can be made that companies can not afford to NOT migrate to a closed loop network. Locking down client lists, corporate planning and strategy files, let alone credit card information (client info) - a net reduction in breach risk - and governance.
As an integration professional I have found discussing private network strategies with my client base uncovers new avenues for lowering costs and increasing the value of existing IT initiatives. A real Win/Win
The bandwidth providers - wired and wireless - are scrambling to monetize their products in new ways. Steering your IT plan towards solutions that provide drastically increased security and reporting will help quantify true usage, and the correlating costs aka TCO.