Menu
INSIGHT: Top 5 new strategies to improve network security

INSIGHT: Top 5 new strategies to improve network security

According to WatchGuard, the most effective organisations are often the most informed about their industry, markets and internal workings.

The most effective organisations are often the most informed about their industry, markets and internal workings.

The more they know their competitors, proactively approach new demands and better manage their people, the better they can fine tune their business approach and deliver exceptional outputs.

Without this intelligence and strong leadership, a business can often lose well established market footholds and experience significantly reduced productivity.

These concepts apply directly to the management of network security within an organisation. The more you know about your networks and activity, the more you can manage and drive them to new levels of success, efficiency and protection from unknown or unexpected costs.

It’s interesting to see how many IT administrators actually have a full understanding of everything that is going on within their networks and systems.

Most of the time, basic and ineffective reporting and logging tools are relied on to troubleshoot or take a deeper look into network activity.

These administrators are often left without a real-time or historic view of their systems as significant events are buried deep within complex and time consuming logs. Options are limited for these administrators to get fast access to actionable data with the functionality to take quick and direct action.

On the other hand, having a network visibility focus using the right tools, IT administrators are able to clearly identify activities and insights that they never would have previously realised, allowing for significantly improved defences and organisational productivity.

Want to improve your policies? Read these five strategies to learn how:

Knowing your employees helps you guide them:

Modern security controls authenticate users and identify network applications based on network traffic. When you combine these capabilities with good visibility tools, you’ll have a whole new perspective about what occurs on your network.

You will see what tools and applications your users rely on, who uses the most bandwidth, what types of files they download, and much more. All this insight will help you craft your business network policies.

If you see one application eating more bandwidth than a more critical application? No problem, add a quality of service policy to prioritise what’s important to your business, or block the other application entirely.

Or perhaps you might notice one user might be using a more risky application (like Bittorrent). Now that you know, you can find out why, and decide to restrict it if necessary.

Understand your network’s normal patterns:

Every organisation’s network traffic is slightly different, based on the business and its activities. That’s why there’s no template for “proper” network traffic.

The only way you’ll be able to detect anomalous, possibly dangerous activity on your network is to have an understanding of what “normal” looks like. And the only way a human will easily recognise normal is by seeing network traffic interpreted visually.

By monitoring visualisation tools regularly, you’ll start to understand your network’s baseline. Once you do, you’ll be able to notice “spikes” of irregular network activity that might clue you into some new or different event.

These events may not be bad, but identifying and researching them will provide you more insight into your network… and depending on the results, may also suggest new policies you can add to avoid those incidents in the future.

Know your network’s common targets:

Many security professionals have controls like antivirus, intrusion prevention, and deep packet inspection, which can recognise and block network attacks and malware. However, most just turn them on, and don’t pay much attention to the results.

If IPS blocks an attack, then you don’t have to worry about it, so why pay attention, right? Well, smart visibility tools can help you learn a lot from attack patterns; even for attacks that fail.

For instance, have you looked into which server receives the most network attacks? Which users tend to be associated with blocked malware? Or what types of attacks foes most commonly try against you?

Good visibility tools can highlight these trends for you, and once you know the answers to those questions you can adjust your policies to more carefully secure and restrict certain users, or harden the defences of targeted servers.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags watchguardsecurity

Featured

Slideshows

Reseller News launches inaugural Hall of Fame lunch

Reseller News launches inaugural Hall of Fame lunch

Reseller News welcomed 2015 and 2016 inductees - Darryl Swann, Dave Rosenberg, Gary Bigwood, Keith Watson, Mike Hill and Scott Green - to the inaugural Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed how the channel can collectively work together to benefit New Zealand, the Kiwi skills shortage and the future of the industry. Photos by Maria Stefina.

Reseller News launches inaugural Hall of Fame lunch
Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Show Comments