Enterprise connectivity is exploding, driven by globalisation, convergence, virtualisation and social computing. As corporate perimeters dissolve, the security focus switches towards application and data-level security solutions. The question to ask is what are the longer-term implications for network security? Will it become redundant or could it grow more powerful? Only one thing seems certain: It will be different from today.
Following are 10 questions to ask yourself when determining your own future security architecture.
1. Can you harden your critical legacy applications to operate across hostile open networks?
2. Should you aim to secure your wireless networks?
3. What is the most appropriate strategy for encrypting enterprise and third-party communications?
4. Does your use of encryption present a potential entry point for malware or inappropriate content?
5. How can you best enforce the "acceptable-use" policy?
6. What is the best strategy for enterprise identity management?
7. How do you plan to control third-party users?
8. Should you block or simply alert on suspected intrusions?
9. Should intrusion-prevention systems be sited on hosts or in networks?
10. Should anti-malware defences be incorporated into clients or networks?
Who needs network security? Why don't we just build encryption and anti-malware protection into end-points and simply enjoy open networks? From a security perspective that's always best and it's in line with the Jericho Forum vision. But in the real world it's not so simple. At the very least we need protective measures in networks to guarantee availability and performance. Beyond that there is huge potential to deliver value through security features in networks.
In fact there has always been more to network security than users realise. Fallback, monitoring and filtering are ever-present but invisible to endpoints. Many application owners believe their systems operate on top of a pure IP infrastructure, but nothing could be further from the truth - enterprise networks are heavily structured.
Today's network products boast an impressive and growing array of single-point security solutions, ranging from simple authentication mechanisms to full-blown identity management.
Taking advantage of network-based security features is difficult in that geography and topology are major factors. They dictate ownership boundaries and legal jurisdictions and it's hard to establish a set of choke points from which all network traffic can be monitored or controlled.
Management domains don't map neatly onto the precise scope of application systems and legacy equipment presents local incompatibilities. Nevertheless, gateway devices are a convenient point for securing central databases. And complete network coverage is not always essential for value to be derived from security analysis because useful intelligence can be derived from samples of traffic.
There are also distinct advantages in locating security measures inside networks. You gain a richer picture of user behaviour, enabling individual user activities to be assessed in the context of a broader community. In fact, visibility of events and understanding of context are the keys to effective security and risk management.