FINAL WORD
C
onsequently, IT departments are
turning to policy management
platforms that give them visibility
into who and what is connecting to their
networks, with ways to measure and
predict. They seek security management
that is both adaptive to how people
now work and is easily customised. And
they want a management interface that
accommodates wireless and remote
users, as well as emerging technologies
and services like cloud computing and the
Internet of Things (IoT).
This is much more than ticking off boxes
on a spec sheet – CISOs, CSOs and
security professionals are demanding a
fully integrated, multi-vendor approach
for security management. Consequently,
today’s management platforms have
to deliver a number of critical features
including authentication, authorization,
and accounting (AAA) services, which
control access to networks and servers,
automated workflows for BYOD and guest
access, as well as providing audit and bill-
back information, which are essential.
The platform must also be agile and
sophisticated enough to embrace new
levels of enforcement mechanisms
for security in a mobile world. Today’s
security platforms must embrace
authentication and enforcement models
for wired networking; public wireless
connectivity; and users who tunnel in via
IP-based virtual private networks (VPNs)
to be effective.
IN PARALLEL, POLICY
MANAGEMENT
PLATFORMS MUST
SUPPORT END-DEVICE
PROFILING THAT
IDENTIFIES DEVICE
TYPES AND RESPECTIVE
ATTRIBUTES THAT
CONNECT TO NETWORKS
www.intelligentcio.com
INTELLIGENTCIO
85