One popular initiative has seen many local councils consolidate their operations by co-locating their staff. NHS, education, council employees and others are all congregating together in one central location in an effort to reduce property costs. While on the surface this seems a practical solution, for the IT team it’s a logistical nightmare.
Imagine if you will, each department existing in its own locale. Part of the infrastructure would typically include a physical IT network. Just like a building has walls protecting the contents inside, the network too would have barriers, or gateways, to prevent external access.
As organisations come together, under one roof, so too do the networks on which they function and this is where the complexity begins.
Sticking with the physical building analogy, if you give someone a key to the front door, without a thought to the security within the building, then that person is free to roam all the floors, corridors, offices and potentially rifle through the unlocked drawers and filing cabinets within. Similarly, a physical network is made up of several layers and it’s reliant on someone physically locking all the areas, or compartments, to prevent unauthorised access.
It is imperative that a company controls which individual has access to which services, applications and information and from where. They also need to ensure that each individual is actually who they claim to be. While this sounds pretty straight forward, it can be very complex to manage without the right tools.
Before I continue its worth clarifying that inadequate data protection will get you into a whole heap of trouble. If you’re in any doubt a quick internet search of ‘public sector data breaches’ will bring up a long list of organisations that stand testament to the size of the problem, and the penalties they’ve incurred as a result.
Instead of building separate physical or rigidly constructed networks for each organisation, one method that is gaining popularity is to create one network, and to control access to the services and data it houses at the point of entry.
Networkless connectivity removes the dependency on how the network is physically constructed and is instead dependent on an individual’s role within the organisation. Using access control technology, such as Cryptzone’s AppGate Security Server, the services and information each individual is granted access to will be determined at the point that they attempt to connect to the network. Returning again to the building analogy, it is akin to each person having their own unique key to the building that, when they unlock the front door, automatically opens all the doors within the building that they can legitimately enter, but also seals all the doors that they should not.
Access can be further controlled by what type of device is being used to connect and where people authenticate themselves. For example, if a user connects to the network from a PC within the organisation’s premises then they can access all files and information needed to perform their duties. However, if they connect from a laptop from home, they may be restricted to just calendar information or basic applications. Taking it a step further, access can be further controlled by the day of the week and/or time of day that the person is accessing the network to determine what they can do and see.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.