70 likes | 83 Views
Learn how to secure your network and protect corporate intellectual property from physical and unintentional access by implementing a visitor, customer, and competitor access system. Explore ways to use non-company laptops on the corporate network for internet and internal application use while ensuring wireless access security. Discover the principle of least privilege, the importance of patching and anti-virus requirements, and strategies to prevent the introduction of malware into your network. Find out how to block valid users and streamline support staff's understanding of access permissions, all without the need for network redesign.
E N D
A Secure Network for All Team Excel
Requirements Business • Add visitor, customer, and competitor access • Use non-company laptops onto corporate network for internet and internal application use • Visitor access to internet, VPN • Wireless access Security • Protect corporate IP • Principle of least privilege • Patch and anti-virus required • Wireless access to internal network prohibited
Risks Physical access to multiple networks Protection of Intellectual Property Introduction of Malware Unintentional access to corporate data and applications Blocking of valid users Difficult for support staff to understand who can access what Are you at risk? Anyone with a requirement to protect corporate intellectual property or privacy data: Government Healthcare Research Engineering Many more
Summary • How do you prevent disclosure to those with physical access? • How do you grant access to some while limiting access to others? • How can you do it without re-designing your network? • How can you meet the business requirements without giving away the corporate secrets? Solution: Week 10