Advertisment

Fortinet outlines 3 key strategies to secure enterprises

author-image
Soma Tah
New Update
Clipboard

Fortinet at its annual Security Conference for Indian CIOs in Moscow has emphasized that the best way to secure complicated networked environments was simplicity and recommended the  three important strategies for securing evolving environments.

Advertisment

Joe Sarno, Vice President, International Emerging, MEA, Eastern Europe, India & SAARC, Fortinet said: “Data centers are evolving along with customer demands for fast and secure cloud infrastructure and services. The growth of IoT devices and traffic represents both an opportunity and a threat to today’s digital businesses. Having a comprehensive security strategy, including a single pane-of-glass view of security management and policy across IoT to Cloud, is essential in establishing a consistent security posture for an organization.”

Here are the 3 key strategies that can help organizations protect their businesses:

Segmentation – Networks need to be intelligently segmented into functional security zones. End to end segmentation, from IoT to the cloud, and across physical and virtual environments, provides deep visibility into traffic that moves laterally across the distributed network, limits the spread of malware, and allows for the identification and quarantining of infected devices.

Advertisment

Collaborative intelligence – Local and global threat intelligence needs to be shared between security devices, and a coordinated response between devices needs to be orchestrated centrally.

Universal policy – A centralized security policy engine that determines trust levels between network segments, collects real time threat information, establishes a unified security policy, and distributes appropriate orchestrated policy enforcement.

Fortinet security experts also highlighted that the region is tipped to be at the forefront of IoT growth, with market researcher IDC estimating that Asia-Pacific’s industries will connect 8.6 billion things by 2019,

As IoT devices are subjected to a wide variety of attacks including targeted code injection, physical alteration of firmware, man-in-the-middle attacks, remote control of devices to alter or disable their functionality, spoofing, or simply hiding of malware in the volume of IoT data, they are becoming a security nightmare for CIOs.

“It’s clear that isolated security devices don’t solve today’s cyber security challenges, and companies need something different. They want integrated security, from IoT to the cloud, with actionable analytics across their multi-vendor networking and security solutions, all delivered through a single pane of glass view,” said Sarno.

cloud cybersecurity iot