Skip to content
July 2, 2022
  • About
  • Advertise
  • Contact Us
  • Twitter
  • LinkedIn
  • Facebook
  • RSS
  • Privacy Policy
  • NewsLetter
IT Voice | Online IT Media | IT Magazine

IT Voice | Online IT Media | IT Magazine

IT in Depth

Primary Menu IT Voice | Online IT Media | IT Magazine

IT Voice | Online IT Media | IT Magazine

  • Home
  • All News
  • Business Leaders
  • Interview
  • e-Magazine
  • ICANN
  • Videos & Byte
  • Quiz



  • News

Fortinet Urges Organizations to Review Network Security Stance In Preparation for Internet of Things (IoT) Revolution

6 years ago itvoice

Expect security risks both significant and unplanned in the new era of technology personalization with multiple connected devices 

Fortinet, the global leader in high-performance cyber security solutions, warns that the IoT revolution is poised to bring new challengFortinet-Logoes to network security. Connectivity is no longer limited to high-end technology consumers (watches and drones), but nearly everything – from children’s toys to kitchen appliances and media devices. Purchasers of these new technology-enabled products are far from security experts, or even security aware. Instead, their primary purchasing requirement is ease of use.

Market researcher Gartner predicts that by 2020, humans will each have 26 connected devices that gather, send, and correlate data. Nearly all of the connected devices rely on complimentary software components running on an ever-increasing variety of smart devices. For enterprises, this means the security risks related to this new era of technology personalization are both significant and unplanned. With the advent of IOT, employees will simply sync their personal smart devices, connect to the corporate WiFi network and even remotely connect to the cloud-based services deployed across the corporate network.

In the name of security, vendors today are implementing thousands of unique combinations of software, and implementing dozens of technologies (WiFi, Bluetooth, NFC, zigbee, RFID) on billions of new devices. Unfortunately, the traditional approach of bolting security onto inherently unsecure devices is no longer possible as IoT devices are headless. Headless devices cannot be patched, updated, nor have a client installed on them. Instead, enterprise security professionals need to adopt a vastly different security strategy.

“The emergence of IoT is pushing security from being a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network. The 1980s approach to install an MDM client on smartphones and tablets, which we still do today, just isn’t an option for IOT devices. Secured, trustworthy networking is preferred over networking plus security. To limit the scope and exposure of an exploited device, we need to create even smaller security domains,” said Rajesh Maurya, Regional Director, India & SAARC at Fortinet.

As such, Fortinet advises network security professionals to adopt the following key strategies when bracing for the tsunami of data and devices:

1. Control network access
The vast majority of these new IoT devices are headless, so one needs to weed out high-risk, compromised or unauthorized devices and traffic before letting them enter your network.

2. Assume you will be breached
Most organizations spend the majority of their security dollars on building a better front door. Instead, those resources need to be shifted to actively monitoring your network and identifying anomalous behavior inside your perimeter.

3. Intelligently segment your network
The attacks that do the most damage are the ones that can move freely inside your environment once perimeter security has been bypassed. Secure internal segmentation ensures that a breach is limited to a small area of your network, and that attempts at unauthorized lateral movement can be detected. It also allows you to quickly identify infected devices for quarantine and remediation.

4. The answer to complexity is simplicity
It is important to use tools that scale dynamically, are provisioned easily, and that work together as a cooperative security fabric in order to share threat intelligence from across the company’s distributed environment and coordinate a response to a threat.

“IoT needs economical security inspection services at the actual connection point for every device, as opposed to trying to funnel all traffic through a small number of typically over-burdened systems that are hard to maintain and upgrade given the continued expectation of always-on, always available connectivity,” said Rajesh Maurya.

  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Telegram (Opens in new window)

Related

Tags: fortigate 30e, fortigate 60e, fortigate firewall configuration guide, fortigate firewall training ppt, fortinet authorized training center, fortinet careers, fortinet firewall, fortinet firewall bypass, fortinet firewall configuration, fortinet firewall price, fortinet firewall training, fortinet firewall training pdf, fortinet glassdoor, fortinet login, fortinet router, fortinet singapore, fortinet stock, fortinet training cost, fortinet training free, fortinet training materials, fortinet training uk, fortinet training videos, fortinet vpn client

Continue Reading

Previous ASRock Beebox &DeskMini H110 wins the Digit Zero1 Awards 2016
Next D-Link Unveils High Power PoE Switch for IP Surveillance Solution

Trending Story

  • Technology-led stock broking platform Dhan join hands with fintech- startup AnaStrat
    Technology-led stock broking platform Dhan join hands with fintech- startup AnaStrat
  • Exclusive Interview with Mr. Ashish Jha, Marketing and Communication Manager, Fuji Electric India Pvt. Ltd.
    Exclusive Interview with Mr. Ashish Jha, Marketing and Communication Manager, Fuji Electric India Pvt. Ltd.
  • Vertiv Expands Presence in India with Unveiling of New Global Research & Development Center in Pune
    Vertiv Expands Presence in India with Unveiling of New Global Research & Development Center in Pune
  • MYn is India’s 1st Super App (a unified app) that offers complete privacy, has no ads, does not levy any commission, and has a revenue model that’s not dependent on user information - Nanjunda Prasad Ramesh, Multi-Verse Technologies, Full Interview
    MYn is India’s 1st Super App (a unified app) that offers complete privacy, has no ads, does not levy any commission, and has a revenue model that’s not dependent on user information - Nanjunda Prasad Ramesh, Multi-Verse Technologies, Full Interview
  • DEFY Launches ‘Gravity Z’ TWS Buds with 50-hour Unbeatable Battery Life
    DEFY Launches ‘Gravity Z’ TWS Buds with 50-hour Unbeatable Battery Life

Follow Us

IT Voice Latest Magazine Edition

IT Voice April 2022 Edition IT Voice Cybersecurity and Networking Edition
Viewsonic


You may have missed

  • News

LIAN LI’s 2022 Digital Expo 2.0 Reveals Exciting New Prototypes and Updates

1 day ago Gupta Vikas
  • News

Ashok Soota is conferred with the prestigious CII Quality Ratna Award 2021

1 day ago Gupta Vikas
  • News

Iris Global supplies Dell Desktops worth Rs 8.5 Crore to Ahmedabad Partner for Goa Govt IT project

1 day ago Gupta Vikas
BLACKbox
  • News

Synersoft Technologies launches its brand campaign for Data Loss Prevention on Laptop

1 day ago IT Voice
  • News

8 Common ‘Human Errors’ in cybersecurity and preventive measures Neelesh Kripalani, CTO, Clover Infotech.

1 day ago Gupta Vikas

Upcoming Events

There are no upcoming events at this time.

  • About
  • Advertise
  • Contact Us
  • Twitter
  • LinkedIn
  • Facebook
  • RSS
  • Privacy Policy
  • NewsLetter
Copyright © IT Voice Media Pvt. Ltd. All rights reserved.