Forrester Research predicts by the year 2020 there will be 70 devices for every person on earth.1
That’s a difficult number to fathom! As the Internet of Things (IoT) grows, it will pose a challenge for CISOs unlike any other. Bradford Networks offers the best solution to mitigate the security risk introduced by the IoT – a reference to commonly used unmanaged devices such as printers, thermostats and Digital Video Recorders (DVR) that require IP connectivity but at the same time are incapable of hosting third-party software agents. The Company’s patented Network Sentry platform enables cyber security teams to continuously assess the risk of every new and existing device on the network, and automatically adjusts network access control for vulnerable devices that can be targeted by cyber criminals to gain entry into corporate networks. The advent of IoT will most definitely lead to rapid proliferation of unmanaged devices on a network elevating the importance of preventing these devices from enabling a backdoor into a network.
With a growing mobile workforce and a vast proliferation of unmanaged devices, CISOs will demand solutions that can evolve from full management of the device to continually assessing its trustworthiness. In spite of that, adoption of IoT will magnify the attack surface and create additional opportunities for cyber criminals. The increase in vulnerable devices and the ongoing erosion of the corporate network perimeter will additionally force the security teams to continually assess the risk of every device before, during, and after a network connection has been established.
Bradford Networks has a track record for delivering unique visibility and control over every wired and wireless connection on a network. Its Network Sentry platform, at its core, is a policy engine that controls network access for dynamic networks. Historically, the initial driver for the solution was a pre-connect decision to ensure every device was compliant (trusted) before network access was granted. This device posture check minimized the risk of vulnerable devices proliferating malware and subsequently enabling unauthorized access. At the time, the security industry was focused on prevention and Network Access Control ensured all devices were sufficiently protected.
The same core capabilities offered by Bradford Networks as a pre-connect control are being leveraged after devices have established a network connection – a post-connect scenario. As a post-connect control, Bradford Networks has extended its core functionality to automatically “contain” any connected device that has been identified as risky, vulnerable or compromised. To sharpen the post-connect policies, integration with technologies such as Advanced Threat Detection, Next-Generation Firewalls, Vulnerability Management, Cloud Application Control and Threat Intelligence are leveraged to make more granular containment decisions for each device.
Core to the company’s strategy is the Live Inventory of Network Connections (LINC). This contextual information is leveraged to enable the real-time policy decisions for granting (pre-connect) and restricting (post-connect) network access based on device, user and network connection related information. The result is a more intelligent risk assessment on all devices minimizing unauthorized access, suspect users, and vulnerable applications. Armed with this highly scalable policy-based control fabric to continuously monitor and assess the risk of every connect device, Bradford Networks helps to minimize the risk associated with adoption of IoT.