Intelligent CIO Middle East Issue 55 | Page 51

s remain on-premise ere – particularly ment, healthcare – still require access ional networks. This hoice but to rely on way from remote ork with an end-to- N is a tool to an an entire unctions like nce checks and a ‘catch-all’ ty – ultimately, a into the heart of h, without adequate potentially s creating potentially at it is enabling. twork visibility nvironments? ining full visibility ey be permanent or BYOD, IT or OT is a strong foundation for any cybersecurity practice. Research from Forescout last year showed that 85% of IT teams agree a lack of full visibility is a significant point of weakness in any security infrastructure and, on average, any organisation that then goes on to achieve comprehensive network visibility will find 30% more devices than they were expecting. Full visibility allows for all these devices to be consolidated under one management system and cybersecurity policies to be applied unilaterally or on a case-by-case basis. For instance, different permissions can be granted to a laptop compared to a fixed lab computer and non-compliant devices that attempt to gain access can be instantly quarantined to prevent the risk of lateral movement. This allows for vulnerabilities to be located and dealt with before they can spread across the network. Segmentation of connected devices across the network also allows www.intelligentcio.com