Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures. Corporate networks that once only had to support the connectivity of desk-bound workstations and a small number of laptops must now cope with thousands of laptops, tablets and phones along with a rapidly growing population of IIoT/M2M devices. VPNs are an integral part of any mobile device and IIoT security strategy. To manage all of these VPNs easily and efficiently without compromising end-user security requires the IT department to embrace a variety of strategies.
Just a few days ago, news began circulating on the internet of a strange problem with Cisco routers which was easy to identify as it caused complete failure. Shortly afterwards, Cisco issued a warning for specific products which may still be functioning normally but could fail after approximately 18 months of operation without warning. Meanwhile, a list of affected devices has now been published online. But that’s far from the full story.
In recent years, the way we work has transformed. The rise of ever more powerful mobile devices has freed us from our desks. Our Internet-enabled smartphones and tablets allow us to remain constantly connected even while we are on the move. Sensing a business opportunity, carriers have responded by providing Wi-Fi hotspots for our convenience in public spaces everywhere – from coffee shops, restaurants, shopping malls, hotels and exhibition halls to trains, airports and even airplanes. Tempting as it may be to use them to reduce any idle time, public Wi-Fi hot spots are not without risks. There are over 100,000 unsecured public Wi-Fi hotspots around the world. Furthermore, employees often fail to follow best practices. It only takes one mistake for sensitive company data to be jeopardized. However, by deploying VPNs and following some simple guidelines it is possible for organizations to overcome these risks and ensure all employees are equipped to secure their mobile client connections.
The RSA Conference (RSAC) is always a major highlight in the IT security professional calendar and this year’s show was no exception. In this blog, NCP engineering reviews some of the standout enterprise machine-to-machine (M2M), mobile client and cloud security trends to emerge from RSAC 2017. The show is also a win-win for NCP. Our strong track record with US technology partners means that NCP is well-known to US-base customers and prospects. At the same time, our experience in fulfilling Industrial Internet of Things (IIoT) or Industry 4.0 projects in Germany means we had a great deal of knowledge and insight to share with prospects in this security segment, one that is in its early stages in the United States.