Intelligent CIO Middle East Issue 09 | Page 83

FINAL WORD C onsequently, IT departments are turning to policy management platforms that give them visibility into who and what is connecting to their networks, with ways to measure and predict. They seek security management that is both adaptive to how people now work and is easily customised. And they want a management interface that accommodates wireless and remote users, as well as emerging technologies and services like cloud computing and the Internet of Things (IoT). This is much more than ticking off boxes on a spec sheet – CISOs, CSOs and security professionals are demanding a fully integrated, multi-vendor approach for security management. Consequently, today’s management platforms have to deliver a number of critical features including authentication, authorization, and accounting (AAA) services, which control access to networks and servers, automated workflows for BYOD and guest access, as well as providing audit and bill- back information, which are essential. The platform must also be agile and sophisticated enough to embrace new levels of enforcement mechanisms for security in a mobile world. Today’s security platforms must embrace authentication and enforcement models for wired networking; public wireless connectivity; and users who tunnel in via IP-based virtual private networks (VPNs) to be effective. IN PARALLEL, POLICY MANAGEMENT PLATFORMS MUST SUPPORT END-DEVICE PROFILING THAT IDENTIFIES DEVICE TYPES AND RESPECTIVE ATTRIBUTES THAT CONNECT TO NETWORKS www.intelligentcio.com INTELLIGENTCIO 85