Ajay is Chief Security Officer (CSO) with a Delhi-based international talent search organization that employs a number of mobile workers. Traveling for extended periods, these employees access the office intranet facilities using a conventional VPN client. While this provides unsecured access to company information, it makes the system vulnerable to security attacks.
The management has learned from an external source that a public website is featuring the company’s confidential information. Ajay has a mandate to investigate, remediate the incident and report back to management. After day-long data mining and log analysis, Ajay learns that a hacker has exploited an existing vulnerability on the SQL database and accessed confidential company information.
Would it not be easier for Ajay if he had a system in place to detect the attack in progress against critical infrastructure and be able to launch a policy to stop the attack?
The CSA solution on an SQL server is ideal to protect the server from day-zero attacks. For extending secure remote access, the company should look to implement the SSL-VPN and NAC technology. SSL-VPN will allow their employees to access corporate applications remotely while NAC will do a detailed posture check of the devices before granting access to the corporate network. These two, together, will ensure that end-users comply with company policies and provide port security functionality so that no unauthenticated user can access confidential information.
CS-MARS (Event Co-relation, Incident Management)
CSM (Security Configuration, Policy Management)
NAC (Role based admission access control, Device Posture assessment, Port Security)
Self Defending Network
Ajay and his organization benefited tremendously from the deployment of the SDN:
Little wonder that he found it to be the ideal end-to-end collaborative security service since it was integrated into the network itself, and deployed an easy-to-use scalable model suitable to all sizes and types of organizations.
John Chambers, CEO, Cisco presents the keystones of a robust security policy.
Mobile Worker Scenario
Ajay has put in place several measures to ensure that the organisation’s employees derive maximum benefits while the server and systems have foolproof security. Read on to see the end-user challenges that these measures addressed, particularly for Sheila, a mobile worker.Learn More