ILTA White Papers

Risky Business

Issue link: http://read.uberflip.com/i/45522

Contents of this Issue

Navigation

Page 47 of 73

DEVELOPING STRONG NETWORK SECURITY WITH A SERVICES-INTEGRATOR APPROACH We filter through many gateways in our vendor's private cloud by putting a PAC file in the machine's Web browser, which the user then filters through the closest gateway. This is generally preset when the user is in the office, as we always hit the closest gateway to our data center and will failover to the next closest one if the closest one goes down. Now we also have the ability to protect our laptop users when they are outside our offices. In that case, the geolocation feature kicks in, and the user browses through the closest node. Whether at home or traveling, the user will always hit the closest gateway available and proper security policies will be applied. The only time we get involved is when a website is blocked and someone needs access for business reasons. Our team is still responsible for managing: • Antivirus and malware • Securing network gear, server and workstation patching • Some areas of physical security, HDD and media encryption • Mobile device management Most of these areas are candidates for outsourcing as well, and we will be looking into that next year. We have determined that we are much more effective by working with trusted MSPs and security SaaS vendors than if we did it all in-house, mainly because proper staffing to achieve the same goals would be costly and out of reach, and they help us keep up with the ever-changing and developing threat landscape while reacting to real attacks in a much faster and effective way. In addition, I can concentrate on the development of policies and procedures, incident iltanet.org/write One of ILTA's most valued resources is our volunteer authors and we are grateful to them for sharing the information and experience they've acquired. response, as well as the other operational areas for which my team is responsible. BRINGING YOUR FIRM INTO BATTLE Armed with the knowledge of recent data-loss statistics and how Nexsen Pruet has developed a strong network security program, you can begin to plan your business case and strategy for battling security breaches. There's no one- size-fits-all plan for every firm, so prepare, weigh your options and stop the intrusions before they stop you. ILTA www.iltanet.org Risky Business 49

Articles in this issue

Links on this page

Archives of this issue

view archives of ILTA White Papers - Risky Business