Most of today’s networks is protected from Internet attacks, considered to be the greatest security risk. An overwhelming majority of attacks at corporate networks is lead from inside the corporation – from the local network. Corporate local networks are expanding, and it is often difficult to perform retroactive mapping of all active ports; standard Ethernet hubs are added by employees to increase the number of ports locally. At the same time, more and more users access the network wirelessly, both from company and private laptops, in addition to various mobile devices. It is almost impossible to find out who connected from what location, to what application and what data were transferred. We do not know the exact address plan, and we keep reserving addresses that are unused for a long time. In case of an attack, we are virtually defenseless, unable to identify the attacker.
Rigorous network access control technology can eliminate majority of security risks, and in addition it can optimize network operating expenses by the ability to make inventory of resources being used. Access control based on 802.1x allows for users’ authentication and dynamic user assignment to corresponding VLANs, and also to local or global locations, as the need may be. By network state monitoring we can identify a suspect user that can be deactivated remotely or transferred to a quarantine VLAN.
Using network monitoring by means of behavioral analysis method we can also identify unknown attacks based on deviations from normal behavior. In case of a larger-scale attack, we can switch the network into an emergency state with all the users disconnected, while the critical applications keep running. We use the same method to solve access of company Wi-Fi devices or private user devices (BYOD).
blue, the colour of rivers, represents the flow of data communications - Green, the indicator of starboard on ships will help with navigation and improve the quality of communications