Welcome!

Mobile IoT Authors: Elizabeth White, Rostyslav Demush, Liz McMillan, Kevin Benedict, Pat Romanski

Related Topics: @CloudExpo, Java IoT, Mobile IoT, Microservices Expo, Containers Expo Blog, Agile Computing

@CloudExpo: Article

BYOD Security Is a Network Architecture Problem

Do we still need endpoint security in the shadow of more powerful network layer security controls?

The data center (as we knew it) is never going to be the same. Fluid changes are already in motion, brought about largely as a result of ‘paradigm' shifts in computing including....:

  1. Multi-core processing and parallelism
  2. Cloud computing and server virtualization
  3. Bring Your Own Device
  4. Complex Event Processing
  5. Software Defined Networks
  6. Big Data
  7. Analytics and In-Memory Computing

... actually, several other major factors too, but that's a good data-centric 7-pack to start with is it not?

This swollen spring tide of information management elements brings with it empowerment for those that can bring meaningful analytics to bear upon the new data stack and, conversely, security concerns for those who fail to grasp the new triffid-sized nettle that has the growth potential to run rampant.

Colorful analogies aside... what are we talking about here in real terms? Enterprises today are increasingly forced to deal with massive amounts of so-called Big Data as they have to contend with the risk of employees connecting to the network with Bring Your Own Device (BYOD) tablets, smartphones and more.

This has created an inflexion point for large organizations in terms of data center transformation. We have reached a chasm where network security infrastructures will fail to scale and cope with the complexity of compute throughput caused by our seven factors as mentioned above. Put simply, the new under-managed over-clocked network is a security risk.

How Do We Put Our Next Step Forward Without Falling?
"The reality is, if a hacker wants to get into your network, then they will, 100 percent of the time. Match that risk with the new reality of BYOD security concerns and it's a heady concoction," argues Peter Doggart, management executive for security platform company Crossbeam. "Once we accept these basic truisms we can move on. From this point we can start to plan for compromised user containment, mitigation and segregation/quarantine."

It's not all about mitigation argues Doggart. Too much discussion circulates in the security industry focused on mitigation and cure, with comparatively scant lip service being paid to pre-infection prevention instead.

"You can't put anti-virus controls on an iPad; so putting controls at the network layer is the only way to deal with the security risks we stand in front of today. But going deeper, companies need to think about the structural build of their data centers and networks to ensure that they architect them correctly. New security vectors demand a new approach to application and network architecture. As a basic example, servers that process credit card data should be physically and locally segregated from other basic services."

Crossbeam's Doggart is adamant that this problem of implementing network security within more dynamic, virtualized data centers means that network security infrastructure needs to evolve in order to help organizations achieve their vision for the next-generation data center (NGDC). Then (and only then) can we successfully reap the benefits of cloud computing technology for both public and private environments he says.

Where Do We Turn Next?
Contemporary technologies in this space lean towards intelligent "boxed" solutions, i.e., appliances such as Intrusion Prevention Systems (IPS) and Threat Management Systems (TMS). Crossbeam's X-Series ‘network-in-a-box' challenges purpose-built security device products from HP, Oracle, IBM and others, suggesting that there is a defined need to "corral" switches, routers, load balancers, network layer protection mechanisms and application delivery controllers into a unified single solution. Indeed, HP appears to also embrace the ‘unification' label directly, naming its HP 200 Unified Threat Management (UTM) Appliance Series as it does.

Do we still need endpoint security in the shadow of more powerful network layer security controls? Take HP's aforementioned product, which does indeed come with anti-malware controls plus denial-of-service (DoS) attack protection, plus optional services such as anti-virus, anti-spam and URL filtering capabilities. The consensus argues that yes, we mostly still do need user endpoint security at whatever level we can bring it to bear; but it must work in harmony and unison with the wider strategy for this new and more intelligently designed network and data center structure currently under construction.

This is happening. Not everywhere and not at every level. But a network architecture security handbook should be on every CIOs Christmas list this year. Until we get there, wear a hard hat.

•   •   •

This post was first published on the Enterprise CIO Forum.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
I think DevOps is now a rambunctious teenager - it's starting to get a mind of its own, wanting to get its own things but it still needs some adult supervision," explained Thomas Hooker, VP of marketing at CollabNet, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
CloudEXPO | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution. In his session at @ThingsExpo, Akvelon expert and IoT industry leader Sergey Grebnov provided an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...