Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Plugging network leaks

Michael Markulec, president and chief technology officer, Lumeta | June 4, 2013
Plugging network security leaks is an essential responsibility for companies, private organizations and technology professionals. Achieving that goal requires discovery tools that scour every asset, including those not currently under management, and also map connectivity between institutions involved with an organization's sensitive information around IT compliance, corporate security, product development, critical infrastructure protection and other relevant issues.

Then you need to add device discovery because, as described above, companies and organizations must probe specific devices using techniques that identify the device type, model number, vendor, operating system and version. These devices can be sources of data leakage. Imagine the proverbial road warrior who travels frequently for sales meetings and business conferences — which require an added layer of security. The same rule applies to perimeter discovery, which probes the hosts on a network to isolate the forwarding traffic out of an entity's network. This benefit will show the hosts that are forwarding traffic, including those hosts forwarding to unknown and possibly undesired IP addresses.

Finally, this solution to plugging data leaks should be lightweight and safe for use on large networks — even during production hours, operating essentially at the level of network "noise" and using only properly formed packets to elicit benign responses. Intuitive reports and color-coded maps generated by these tools present an impressive overview of the leaks and potential threats confronting a network. Summarizing this information is a good scorecard for businesses to use, a means towards establishing a more secure environment.

Following these steps is a necessary beginning in the effort to eliminate data leaks, backed by proven tools that address the interests of various organizations. Accomplishing that goal should be a top priority.

 

Previous Page  1  2 

Sign up for MIS Asia eNewsletters.