Security challenges for the Enterprise of Things

by Editor
0 comment

Experts at Forescout have outlined five security challenges brought in by today’s ‘out of control’ device numbers on enterprise networks.

Keeping track of the billions of different types of devices connecting IT, operational technology (OT), Internet of Things (IoT) and bring-your-own-device (BYOD) are posing challenges for information security officers. While some are managed and known, many aren’t and there is the added complexity of device users literally being located anywhere in the world.

This creates risk for businesses who don’t have full visibility into all of the devices on their network. Rohan Langdon, regional director for Australia and New Zealand at Forescout, says “Employees, contractors, partners and customers are all connecting to the data centre or the cloud from anywhere – securely or otherwise.

“All of this makes each network environment complicated: a veritable Enterprise of Things (EoT) that requires thoughtful planning and decisive action when it comes to securing devices and the enterprise itself.”

Forescout has identified five key EoT challenges for today’s information security officers and other security and operations leaders to consider:

1. Inventorying and managing the explosion of unmanaged devices

Managed devices with security agents on board, such as corporate-owned PCs, laptops and smartphones, are becoming scarce compared to the billions of agent-less IoT and OT devices joining networks. IT-OT network convergence is taking place at the same time, which is increasing productivity and streamlining network management, but adding risk. Getting a handle on the attack surfaces of today’s heterogeneous networks is harder than ever before.

2. Identifying where risk resides in today’s enterprise environment

The concept of risk analysis is changing and expanding along with the attack surface. A recent Forescout Enterprise of Things analysis determined that IoT devices pose the greatest risk. Not only are they challenging to monitor and control, but they also create vulnerabilities by bridging the gap that used to exist between the cyber and physical realms. IoT devices can be clandestine gateways into networks or primary targets of specialised malware.

3. The vanishing network perimeter

Now that enterprise networks extend to wherever in the world workloads and workers happen to be, there is no such thing as a defensible perimeter around an organisation. Perimeters must surround each connected device and every workload. Security begins at the asset’s edge.

4. Segmentation without business disruption

Until recently, the available network segmentation tools were difficult to deploy and couldn’t cross network domains, resulting in business disruptions and a fragmented environment. The problems only got worse when organisations added new devices and further extended their networks. Today, however, solid segmentation solutions exist. It no longer makes sense to stick with vulnerable flat networks.

5. Dealing with the ‘do more with less’ paradox

It’s difficult to make the case that the SecOps department is an efficient bulwark and provider of cost savings when the organisation’s security and network management uses fragmented, job-specific legacy tools. Even best-laid transformation plans can lead to trouble, namely: sluggish deployments, slow return on investment, steep learning curves and limited satisfaction with chosen solutions.

“Each of these five challenges can be daunting,” says Langdon. “However, each one, if unresolved, can lead to the ultimate challenge: a cyberattack that results in operational problems, stolen data, brand reputation damage, massive fines and public safety issues to name a few. Prevention is the key, which means an effective solution must be capable of 100 percent agent-less device visibility, continuous monitoring and automated threat response.”

Photo by Philipp Katzenberger on Unsplash

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More