FUTURE TECHNOLOGY
receive a decision from the centre of the network ,” stresses AlHaj-Issa .
For solution vendors now , the centre of attention has shifted to the edge of the network . Decision making is moving from the centre of the network to the edge of the network and the emphasis is on making the network smarter on the edge , through analytics and compute processing . “ This is the change from just
focusing on mobility and access points ,” adds AlHaj-Issa .
Devices deployed on the edge of the network are typically not meant to be smart , not intelligent and have a limited scope of operations . Pressure , temperature , movement , light sensors , access card readers , RFID tags , surveillance cameras , are typical of those connected to the edge of the network .
These devices are elevated to the level of being intelligent by building their network behavior patterns . Depending on the severity of deviation from the normal pattern of behavior for these sensors , the right level of network isolation and security remediation can be activated .
“ We are not expecting these devices to have a lot of intelligence . We are adding this intelligence by collecting , monitoring
For channel partners , at present there is no certification titled as SDWAN , and channel partners need to certify themselves on the individual specialisations . These include Wireless LAN , Campus Switching , Location Services and Clear Pass Security . with only help desk roles . The lack of visibility by IT in branch environments is of utmost concern . IoT devices get connected without ITs knowledge .
Users find ways to bypass security controls where distance between corporate and the branches is usually a factor . It is hard to easily unplug a device with behavior that has changed for the worse .
Aruba wireless and wired solutions support role-based access security that allows for dynamic segmentation of devices and traffic . The branch gateway then includes a built-in stateful firewall that protects the branch from internal threats using deep packet inspection DPI , and Aruba Central can be used to enforce web and content filtering rules . For dynamic device profiling , granting real-time access privileges and granular policy enforcement , with the ability to quarantine a device without physical interaction , Aruba ClearPass offers enterprise scalability for any type of environment .
To deliver the same experience to users in the branch as those in corporate , leveraging context about each user , connected device , and the types of applications that are being used allows IT to easily enforce access , bandwidth and security policies based on roles and other contextual data . This unique contextual-awareness can help enforce WAN policies within the Branch Gateway , like ensuring a specific group of users that utilise Skype for Business have a higher priority than others . Policies can also be enforced within the gateway for inbound traffic and intra-branch traffic .
The gateway is also capable of monitoring the health of WAN links , which allows for seamless failover from one link to another . These capabilities are possible due to Aruba ’ s ability to offer wired , wireless , WAN and security context and enforcement across the entire branch network .
As more and more applications and solutions move to the cloud , a robust partner program offers customers the ability to leverage third-party defenses that sit in the cloud . Instead of sending all traffic to the datacentre , real-time threat correlation , inline content inspection and other cloud firewall controls make it easy to protect today ’ s mobile perimeter .
27
FUTURE TECHNOLOGY
receive a decision from the centre of the
network,” stresses AlHaj-Issa.
For solution vendors now, the centre
of attention has shifted to the edge of
the network. Decision making is moving
from the centre of the network to the
edge of the network and the emphasis is
on making the network smarter on the
edge, through analytics and compute
processing. “This is the change from just
focusing on mobility and access points,”
adds AlHaj-Issa.
Devices deployed on the edge of
the network are typically not meant
to be smart, not intelligent and have a
limited scope of operations. Pressure,
temperature, movement, light sensors,
access card readers, RFID tags,
surveillance cameras, are typical of those
connected to the edge of the network.
For channel partners, at present there is no certification titled as SDWAN,
and channel partners need to certify themselves on the individual
specialisations. These include Wireless LAN, Campus Switching, Location
Services and Clear Pass Security.
These devices are elevated to the level of
being intelligent by building their network
behavior patterns. Depending on the
severity of deviation from the normal
pattern of behavior for these sensors,
the right level of network isolation and
security remediation can be activated.
“We are not expecting these devices to
have a lot of intelligence. We are adding
this intelligence by collecting, monitoring
with only help desk roles. The lack of visibility by IT in branch
environments is of utmost concern. IoT devices get connected
without ITs knowledge.
Users find ways to bypass security controls where distance
between corporate and the branches is usually a factor. It is
hard to easily unplug a device with behavior that has changed
for the worse.
Aruba wireless and wired solutions support role-based
access security that allows for dynamic segmentation of devices
and traffic. The branch gateway then includes a built-in stateful
firewall that protects the branch from internal threats using
deep packet inspection DPI, and Aruba Central can be used
to enforce web and content filtering rules. For dynamic device
profiling, granting real-time access privileges and granular
policy enforcement, with the ability to quarantine a device
without physical interaction, Aruba ClearPass offers enterprise
scalability for any type of environment.
To deliver the same experience to users in the branch
as those in corporate, leveraging context about each user,
connected device, and the types of applicati ��2F�B&R&V��p�W6VB���w2�BF�V6�ǒV�f�&6R66W72�&�Gv�GF��B6V7W&�G���Ɩ6�W2&6VB��&��W2�B�F�W"6��FW�GV�FF�F��2V�VP�6��FW�GV��v&V�W726��V�V�f�&6Rt��Ɩ6�W2v�F���F�R'&�6�vFWv��Ɩ�RV�7W&��r7V6�f�2w&�W�bW6W'2F�@�WF�Ɨ6R6��Rf�"'W6��W72�fR��v�W"&��&�G�F���F�W'2��Ɩ6�W26��6�&RV�f�&6VBv�F���F�RvFWv�f�"��&�V�@�G&ff�2�B��G&�'&�6�G&ff�2�F�RvFWv��2�6�6&�R�b���F�&��rF�R�V�F��`�t�Ɩ�2�v��6����w2f�"6V��W72f���fW"g&����RƖ氧F���F�W"�F�W6R6&�ƗF�W2&R�76�&�RGVRF�'V&( �0�&�ƗG�F��ffW"v�&VB�v�&V�W72�t��B6V7W&�G�6��FW�B�@�V�f�&6V�V�B7&�72F�RV�F�&R'&�6��WGv�&��2��&R�B��&RƖ6F���2�B6��WF���2��fRF�F�P�6��VB�&�'W7B'F�W"&�w&��ffW'27W7F��W'2F�R&�ƗG�F��WfW&vRF��&B�'G�FVfV�6W2F�B6�B��F�R6��VB���7FVB�`�6V�F��r��G&ff�2F�F�RFF6V�G&R�&V��F��RF�&VB6�'&V�F�������Ɩ�R6��FV�B��7V7F����B�F�W"6��VBf�&Wv��6��G&��2��P��BV7�F�&�FV7BF�F�( �2��&��RW&��WFW"�#p