The explosion of wireless networks today really means there is no more network perimeter. IT must contend with a world where mobile devices can become their own network, nearby unapproved networks are bleeding over corporate networks, and IoT devices are always on and connecting. Today’s legacy security solutions are blind to the connections taking place off the approved network.
THE SHADOW NETWORK
The sheer number of wireless networks around us can be overwhelming from a security perspective. But it only really matters when an unapproved or rogue network connects with a corporate or managed device. We call this a Shadow Network – where corporate information and devices are engaged with a rogue or unapproved network. These are the instances that IT needs to be notified about. And more than notified, IT needs to track the ongoing connectivity activity of all devices in their environment over time; including those that are “on” or “off” the corporate network.
THE IOT BLIND SPOT
Businesses are blind when mobile and IoT devices connect with non-corporate wireless networks. They can’t see what activity is going on, what data is being transmitted or received, or what networks with which that device may be bridging. IT not only needs to see what devices are connecting to, but must also stop that connection immediately, if it’s malicious. Similarly, IT needs to be able to disconnect corporate devices from rogue or shadow networks, and unmanaged devices from their own networks. With new IoT and wireless devices always looking to connect, this second ability is critical to protecting the enterprise.
SEE AND PROTECT
Failing to detect these connections in real-time increases the risk of malicious activity going undetected. The Mirai attack in October 2016 was more than a DDoS attack. It showcased how IoT devices could be accessed and leveraged without detection. We cannot afford those kind of blindspots with the prevalence of mobile and IoT devices in the workplace today.