Intelligent Tech Channels Issue 17 - Page 27

FUTURE TECHNOLOGY
receive a decision from the centre of the network ,” stresses AlHaj-Issa .
For solution vendors now , the centre of attention has shifted to the edge of the network . Decision making is moving from the centre of the network to the edge of the network and the emphasis is on making the network smarter on the edge , through analytics and compute processing . “ This is the change from just
focusing on mobility and access points ,” adds AlHaj-Issa .
Devices deployed on the edge of the network are typically not meant to be smart , not intelligent and have a limited scope of operations . Pressure , temperature , movement , light sensors , access card readers , RFID tags , surveillance cameras , are typical of those connected to the edge of the network .
These devices are elevated to the level of being intelligent by building their network behavior patterns . Depending on the severity of deviation from the normal pattern of behavior for these sensors , the right level of network isolation and security remediation can be activated .
“ We are not expecting these devices to have a lot of intelligence . We are adding this intelligence by collecting , monitoring
For channel partners , at present there is no certification titled as SDWAN , and channel partners need to certify themselves on the individual specialisations . These include Wireless LAN , Campus Switching , Location Services and Clear Pass Security . with only help desk roles . The lack of visibility by IT in branch environments is of utmost concern . IoT devices get connected without ITs knowledge .
Users find ways to bypass security controls where distance between corporate and the branches is usually a factor . It is hard to easily unplug a device with behavior that has changed for the worse .
Aruba wireless and wired solutions support role-based access security that allows for dynamic segmentation of devices and traffic . The branch gateway then includes a built-in stateful firewall that protects the branch from internal threats using deep packet inspection DPI , and Aruba Central can be used to enforce web and content filtering rules . For dynamic device profiling , granting real-time access privileges and granular policy enforcement , with the ability to quarantine a device without physical interaction , Aruba ClearPass offers enterprise scalability for any type of environment .
To deliver the same experience to users in the branch as those in corporate , leveraging context about each user , connected device , and the types of applications that are being used allows IT to easily enforce access , bandwidth and security policies based on roles and other contextual data . This unique contextual-awareness can help enforce WAN policies within the Branch Gateway , like ensuring a specific group of users that utilise Skype for Business have a higher priority than others . Policies can also be enforced within the gateway for inbound traffic and intra-branch traffic .
The gateway is also capable of monitoring the health of WAN links , which allows for seamless failover from one link to another . These capabilities are possible due to Aruba ’ s ability to offer wired , wireless , WAN and security context and enforcement across the entire branch network .
As more and more applications and solutions move to the cloud , a robust partner program offers customers the ability to leverage third-party defenses that sit in the cloud . Instead of sending all traffic to the datacentre , real-time threat correlation , inline content inspection and other cloud firewall controls make it easy to protect today ’ s mobile perimeter .
27
FUTURE TECHNOLOGY receive a decision from the centre of the network,” stresses AlHaj-Issa. For solution vendors now, the centre of attention has shifted to the edge of the network. Decision making is moving from the centre of the network to the edge of the network and the emphasis is on making the network smarter on the edge, through analytics and compute processing. “This is the change from just focusing on mobility and access points,” adds AlHaj-Issa. Devices deployed on the edge of the network are typically not meant to be smart, not intelligent and have a limited scope of operations. Pressure, temperature, movement, light sensors, access card readers, RFID tags, surveillance cameras, are typical of those connected to the edge of the network. For channel partners, at present there is no certification titled as SDWAN, and channel partners need to certify themselves on the individual specialisations. These include Wireless LAN, Campus Switching, Location Services and Clear Pass Security. These devices are elevated to the level of being intelligent by building their network behavior patterns. Depending on the severity of deviation from the normal pattern of behavior for these sensors, the right level of network isolation and security remediation can be activated. “We are not expecting these devices to have a lot of intelligence. We are adding this intelligence by collecting, monitoring with only help desk roles. The lack of visibility by IT in branch environments is of utmost concern. IoT devices get connected without ITs knowledge. Users find ways to bypass security controls where distance between corporate and the branches is usually a factor. It is hard to easily unplug a device with behavior that has changed for the worse. Aruba wireless and wired solutions support role-based access security that allows for dynamic segmentation of devices and traffic. The branch gateway then includes a built-in stateful firewall that protects the branch from internal threats using deep packet inspection DPI, and Aruba Central can be used to enforce web and content filtering rules. For dynamic device profiling, granting real-time access privileges and granular policy enforcement, with the ability to quarantine a device without physical interaction, Aruba ClearPass offers enterprise scalability for any type of environment. To deliver the same experience to users in the branch as those in corporate, leveraging context about each user, connected device, and the types of applicati 2FB&R&VpW6VBw2BFV6ǒVf&6R66W72&GvGFB6V7W&GƖ6W2&6VB&W2BFW"6FWGVFFF2VVP6FWGVv&VW726VVf&6RtƖ6W2vFFR'&6vFWvƖRV7W&r7V6f2w&WbW6W'2F@WFƗ6R6Rf"'W6W72fRvW"&&GFFW'2Ɩ6W266&RVf&6VBvFFRvFWvf"&V@G&ff2BG&'&6G&ff2FRvFWv266&RbF&rFRVF`tƖ2v6w2f"6VW72ffW"g&RƖ氧FFW"FW6R6&ƗFW2&R76&RGVRF'V&( 0&ƗGFffW"v&VBv&VW72tB6V7W&G6FWB@Vf&6VVB7&72FRVF&R'&6WGv&2&RB&RƖ6F2B6WF2fRFFP6VB&'W7B'FW"&w&ffW'27W7FW'2FR&ƗGFWfW&vRF&B'GFVfV6W2FB6BFR6VB7FVB`6VFrG&ff2FFRFF6VG&R&VFRF&VB6'&VFƖR6FVB7V7FBFW"6VBf&Wv6G&2PBV7F&FV7BFF( 2&RW&WFW"#p