Networking

07:42 AM
Connect Directly
RSS
E-Mail
50%
50%

Unlocking WAN Optimization Security

In this second installment of a three-part series on WAN optimization (the first examined visibility), Network Computing looks at the security tools that protect a network so it can deliver data, video, voice, cloud applications and all the other traffic it needs to send on its way.

As networks expand beyond the corporate firewall to mobile devices, companies need to protect sensitive corporate data when it’s viewed and/or stored on smartphones, laptops and tablet computers. Unlike in the wired network world, where you either get the speed that you're supposed to, or some counter or log somewhere points you to what's wrong, in the wireless realm, the variables are almost infinite. It's much more complicated and getting a lot worse.

There is reason to be concerned. A report from antivirus security vendor McAfee from 2011 cited a 76% growth in the amount of malware targeting mobile devices using the Google Android operating system. Google also recently had to acknowledge that a number of the applications available on its Android Market site turned out to be instruments for delivering malware. And one of those malevolent apps could be on an Android phone that an employee uses to access the corporate network.

Device makers and carriers are also called upon to do their part to secure mobile networks. Last year Sprint became the first carrier to join the Mobile Security Council, which seeks to collaborate to protect against mobile network threats and respond to attacks when they occur. Sprint supports many of the functions of Microsoft Active Sync, which is how many mobile devices connect to a WAN.

If companies are going to let mobile devices connect to their WAN or LAN, they need to make sure the devices can be remotely locked and wiped. This feature secures a smartphone so that if it’s lost or stolen and the phone falls into the wrong hands, data on it can be erased and can’t be accessed.

AT&T, Verizon and T-Mobile offer remote wipe services to subscribers, as do OS vendors such as Apple, Android, RIM and Microsoft.

Learn more about Strategy: Monitoring and Measuring Cloud Provider Performance by subscribing to Network Computing Pro Reports (free, registration required).

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Hot Topics
11
Open Source Vs. Open Enough
Bob Laliberte, ESG senior analyst,  7/18/2014
5
Do We Need 25 GbE & 50 GbE?
Jim O'Reilly, Consultant,  7/18/2014
4
Guide: The Open Compute Project and Your Data Center
James M. Connolly, Editor in Chief, The Enterprise Cloud Site,  7/21/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Slideshows
Twitter Feed