Devices that have varied capabilities are increasing in number. This would lead to the inevitable deluge of devices connecting through Bluetooth, Wifi, Wimax, Fiber and any other medium that is considered good enough for data to be carried over.
The present set of tools that we use for securing networks are part of the risk management stance of an organization. The complexity of the varied devices is making it much more difficult and the balance between productivity and the technology advantage is lost if the organization does not use the latest in technologies.
We are seeing Contractors and end users who want to use their own devices. They want to connect to "The Networks" and the Infosec practitioner is to provide the needed connectivity to resources at the same time ensuring that the data is protected. The Contractor may work for our competitor, how do we ensure that he has access to systems that he needs access to. This is where the new breed of products would come in. The Role Based Firewalls. These rules are to applied based on the role assigned to the user, may be this system needs to talk to the project management and ERP systems to ensure that the Contractor gets to connect to the right set of services.
Lets check out a example scenario. A contractor connects to the system and he has been assigned into the Contractor group in the Active Directory. This same Contractor is also assigned into few projects where his expertise is required. A set of resources are assigned as being required for the Contractor to deliver his services. Based on this profile, the Application Proxy firewall creates a virtual firewall based on the Contractor settings and assigns him to channel all his traffic through that filter.
Is there a product that does something like this? If not I take credit for conceptualizing such a system.
The present set of tools that we use for securing networks are part of the risk management stance of an organization. The complexity of the varied devices is making it much more difficult and the balance between productivity and the technology advantage is lost if the organization does not use the latest in technologies.
We are seeing Contractors and end users who want to use their own devices. They want to connect to "The Networks" and the Infosec practitioner is to provide the needed connectivity to resources at the same time ensuring that the data is protected. The Contractor may work for our competitor, how do we ensure that he has access to systems that he needs access to. This is where the new breed of products would come in. The Role Based Firewalls. These rules are to applied based on the role assigned to the user, may be this system needs to talk to the project management and ERP systems to ensure that the Contractor gets to connect to the right set of services.
Lets check out a example scenario. A contractor connects to the system and he has been assigned into the Contractor group in the Active Directory. This same Contractor is also assigned into few projects where his expertise is required. A set of resources are assigned as being required for the Contractor to deliver his services. Based on this profile, the Application Proxy firewall creates a virtual firewall based on the Contractor settings and assigns him to channel all his traffic through that filter.
Is there a product that does something like this? If not I take credit for conceptualizing such a system.
Comments