Six things to watch when choosing your network security.
The massive growth of the Internet has exposed corporate networks not only to the potentially ruinous consequences of hacking, but also to fraud, theft and even simple mischief. And the greatest danger can come from disgruntled employees within your organisation. Here are six key issues to be addressed when choosing your network security.
Find out where your security solution verifies users' identities. It should do so outside the secure network, ideally at the network's point-of-entry. If not, you're leaving your network's front door open to any user who wishes to visit, welcome or not.
Ensure your solution is compatible with your existing Internet access links as well as any upgrades planned for the near future.
Credit card-sized tokens are a reliable way of getting users' identities.
But make sure you own the tokens and the user records that go with them.
Do you need an ID token for every user? If not, make sure the solution can handle multiple authentication methods, from simple user name and password to token and even methods such as fingerprint or iris scan.
Set different access rights to your network resources for users, giving unlimited access to directors or IT managers, for example, but less to others.
Make sure you can find who has dialled in and the resources applications and data that they have accessed. You should be able to get full audit trails, real-time usage, activity reports and billing.
If you have a question you would like one of our experts to address, write to: SME, 174 Hammersmith Road, London W6 7JP
Derek McDermott is managing director of Informer Systems 01527 576310.