TOGETHER, WE
RESPOND
FASTER
CYBERSEC 2019
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
Post on/ | 2019/01/29 10:Tuesday
As the emerging of BYOD, mobility and IoT, the perimeter of enterprise network is vanishing. Network security is no longer a castle that can be secured by the moat, that is, a firewall. Can you imagine that in today’s network with billions of devices connecting to it, just an e-cigarette can bring malware to your enterprise network?
In the modern environment, there is no way to know who are using what devices with which apps installed on them and when are they connecting to the network, you need a new approach to protect your network. Aruba 360 Secure Fabric provides a security framework that gives both security and network teams an integrated and comprehensive solution to gain full visibility and control of the network. No matter in a wired or wireless network, it provides appropriate access to employees, visitors, outsourcers, partners or BYODs based on context and use cases.
Aruba IntroSpect integrates AI-based machine learning, pinpoint visualizations and instant forensic insight into a single solution. Malicious, compromised or negligent users, systems and devices are found and remediated before damaging the operations and reputation of the organization.
On the other hand, legacy networks may not be created with mobility, IoT access or security in mind. By implementing Aruba Dynamic Segmentation, role-based policy decisions and access rights are made based on the device type, application used, and even the location of the user or device. The network will be segmented automatically based on device profiles and diverts traffic from selected devices to the controller for further inspection and policy enforcement. Therefore, it simplifies IT operations and improves security by dynamically applying unified policies and enforcing advanced services anywhere in the network. This ensures that appropriate access and security policies are seamlessly distributed, automatically applied, and independently enforced for all wireless and wired users and devices.