RSA 2012: Cisco Stresses Network Security To Tackle BYOD Challenge

Cisco’s newly appointed head of security used a keynote speech to highlight the modern dilemma facing many security professionals – whether to lock down the network, or “free up” the technology – in an effort to secure the network.

The Bring Your Own Device (BYOD) trend and the consumerisation of IT pose significant challenges to the enterprise.

Lockdown Or Open?

While many security professionals want to lock down the network and prevent employees from using non-approved devices to access data or applications, it is not always possible, Christopher Young, the head of security at Cisco, said during his 29 February keynote speech at the RSA Conference.

Organisations are increasingly worried about the prospect of a cyber-attack compromising their data, and allowing employees to use any device for work purposes expands the potential risk.

“We’re torn between these two extremes,” Young said.

Locking down the enterprise infrastructure doesn’t guarantee security any more than opening it into a free-for-all, as employees have no qualms about breaking the rules when it is not convenient to follow them. Security is often too cumbersome and  complicated for the average user who wind up going to “great lengths to bypass security in order to do their jobs,” Young said. In a recent survey, 70 percent of employees admitted to breaking company policy, Young said.

This tendency was in evidence even among the technically savvy and security conscious audience at the RSA Conference.

The conference organisers deployed a secure wireless network that used digital certificates to authenticate devices onto the network. People lined up at the wireless help-desk for assistance in getting online connectivity on their smartphones, tablets and laptops. And there were even more people not bothering with the secure network and trying to connect to one of the free wireless hotspots, said Val Rahmani, CEO of Damballa.

Administrators are also constantly second-guessing themselves. In the struggle to come up with the right decision, security professionals compromise their own efforts, Young said.

“We have to have both. We need to have our cake, and eat it, too,” Young said.

The way to have “both” is by unlocking the power of the network, according to Young. The network is uniquely equipped to delivery security in a way very few technologies can, he said. The network is what collects the data about what users are doing, what data is being accessed, and what the systems are transmitting. The network sees all the users, devices, applications and systems, as well as the interactions between the components, Young said. All this is available in real-time, he said.

Vital Firewalls

“This is why the firewall is still important,” as are virtual private networks and secure wireless networks, Young said.

It is not possible to expect administrators to physically manage every kind of device every day. As a dizzying array of mobile devices flood into the network, administrators will need to rely on the network for information about what device is connected, where it is connecting from, and what it is doing, according to Young.

“The network allows you to lock it down and free it all up,” he said.

Cisco estimates that by 2016, there will be eight billion smartphone devices globally, and desktops will be delivered on the network to whatever device the user is using at the time, Young said.

Rahmani said there should be less worrying about the exact device that is being used. At the heart, every device is essentially just an IP address, so the important thing is to make the network secure, she said.

How well do you know Internet security? Try our quiz and find out!

Fahmida Y Rashid eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.

Recent Posts

LastPass Separates From Parent After Security Incidents

New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…

1 hour ago

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

5 hours ago

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

7 hours ago

TikTok Viewed As Chinese Influence Tool By Most Americans – Poll

Most people in the United States view TikTok as a Chinese influence tool a poll…

21 hours ago

Ofcom Confirms OnlyFans Investigation Over Age Verification

UK regulator confirms it is investigating whether OnlyFans is doing enough to prevent children accessing…

22 hours ago