A secure network is your first line in protectionBy Steve Coakley,
High-profile attacks remind us that a secure network is your first line in protection
Maintaining a secure network is top-of-mind for the boards of multinational organisations. End-users are remote, connectivity is ubiquitous and your intellectual property can be in someone else’s cloud – connected via the Internet.
Simply put, the purpose of network security is to protect your organisation from unauthorised access to corporate information and its misuse. Networks are vulnerable because they facilitate remote access.
You may be part of a high-risk industry or more simply seeking to avail of public networks with data traffic demands increasing exponentially. Either way you’ll be considering how secure your network is.
MPLS as the bedrock of a secure network
Global multinationals continue to trust MPLS as a secure, managed infrastructure that serves as the backbone for their entire operation. As a bedrock solution organisations are now demanding an MPLS network that is appropriately ISO certified, incorporates switching and routing technology that is hardened in accordance with rigorous technical security standards and whose physical security protocols are applied consistently, globally.
Secure network ‘rule of three’
As in most things, a rule of three can be applied to network security:
- Protect: Ensure that all the components are well-guarded with adequate authentication and authorisation policies.
- Inspect: Constantly monitor network activity and safeguards.
- Detect: Assess the vulnerabilities of network security policies by having them attacked by a trusted entity. If the assessor detects that the safeguards can be breached, it is time to implement more stringent techniques.
Secure network and cloud adoption
In a recent survey 58% of respondents told us that cloud services are driving the most profound change within large organisations. However, security was flagged as the primary challenge for cloud adoption.
When your network spans on-premise, private and public cloud, simply ensuring an accurate view of your security risks is a considerable endeavour. As you extend your network into this environment, your data becomes more distributed and the attack surfaces increase.
But the benefits of a move to third party clouds for ease-of-access and reduced total cost of ownership are clear. So, how can you ensure that the transit of data to the cloud is confidential, and that your data will be readily available?
Securing the Cloud of clouds
BT’s Cloud of clouds technology strategy offers a solution to these problems as our customers can now access the cloud over our secure network directly to third parties. None of your data need touch the internet – unless you want it to. Because of this we can offer optimal levels of confidentiality, integration and availability. We allow customers the flexibility to decide which data they want to send over the internet and which needs the security and availability offered by our MPLS network.
And as we carry a vast amount of the world’s internet traffic, we have a ringside view on the threats to your traffic and will likely have dealt with the issue you’re facing.
So, whether your network provider is leading research into future security technologies like ‘Quantum Key Distribution’ or they enforce, as standard, strict operational security controls on their global MPLS core; you are right to demand the best-protected network solutions for your traffic.