Security
Efficient and effective protection of the company network to prevent malware has become a widely discussed topic. Given the complexity of screening for interference from the outside world, it is even more crucial to uphold stringent security requirements. Additionally, managing access to the wired network is essential. As network outlets cannot be monitored at all times, maintaining effective protection is of utmost importance.
Identity management
Identity management, also known as user account management, is a tool used to control access to the network and other devices and applications. It enables the management of what users have access to and when. By using a centralized user database, the process of setting new rules for each application is simplified and avoids repetitive tasks. The same convenience applies when an employee leaves the job, as their access can be promptly revoked.
The centralized database also provides a comprehensive summary of all assigned permissions, making it easier to gather materials for regular audits.
Protocol 802.1X
Protocol 802.1X utilizes identity management mechanisms to secure access to both wired and wireless networks. The connection point, such as a switch for the wired network or an access point for the wireless network, blocks any data exchange until the client's authorization, which typically involves providing a username and password.
Protocol 802.1X is a well recognized standard for network security. Its implementation is highly recommended for middle to large scale company networks.
Monitoring
The network must be continuously monitored in order to verify whether the company’s network fulfills the defined performance and security criteria. Advanced monitoring systems usually include:
- central administration of the entire wireless network
- detection of anomalies and reports on them
- threat elimination
The administrator of the wireless network has the most advanced tools to rapidly identify potential threats of attacks and other intrusions into the network. It is capable of troubleshooting the wireless infrastructure (disconnected devices etc.). Advanced systems add a function to react quickly by a counterattack, eliminating the threats beforehand.
Continuous monitoring should be a priority in order to ensure the best functioning and security of the company network. This service is usually delivered by outsourcing.