Home Mobile Cisco: Do you trust the endpoints connecting to your network?

Cisco: Do you trust the endpoints connecting to your network?

0
Cisco: Do you trust the endpoints connecting to your network?
0

Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy?

We already verify user access to the network. In fact, access to the corporate network is the critical juncture in which you need flexibility for your employees to connect while still enforce effective security control on your network. We are all familiar with the username and password method of authentication. While this is still is an effective way to authenticate the user, this does nothing to verify the integrity of the user’s endpoint (whether that’s a PC or mobile device) when connected to the network.

Security experts estimate one-third of all endpoints that connect to the corporate network are insecure. When the average employee is using multiple devices at work, this creates multiple chances for an insecure endpoint to access sensitive information, or an infected one to spread malware. Vigilance on what is on your network is just as important as who is on the network.

This is why posture is so important. But what is posture? Posture is the compliant state of an endpoint. Companies establish criteria on how an endpoint is supposed to be configured to allow it access to the corporate network. Posture can include:

Read the entire article here, Do you trust the endpoints connecting to your network?

Via the fine folks at Cisco Systems.

tags:
Categories:
Cisco

Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected.

Tell us what you think... Leave a comment below:

Be the First to Comment!

avatar

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Downloads

      Latest Videos

        AWS re:invent 2017 Video: Monitoring and Troubleshooting in a Serverless World

        How do you monitor and troubleshoot an application made up of many ephemeral, stateless functions? How do you debug a distributed application in production? In this talk, we walk you through best practices, tools, and conventions using common troubleshooting scenarios. We’ll discuss how you can use AWS services to address these scenarios, such as using […]

        Views All IT News on DABCC.com
        Views All IT Videos on DABCC.com
        Register Today for Disrupt End User Computing Forum 2018

        Visit Our Sponsors

        Close