BYOD challenge remains despite progress: Palo Alto Networks

BYOD challenge remains despite progress: Palo Alto Networks

Network security vendor expects device management to get more complicated with “Bring Your Own Everything”

BYOD may have been around for a few years, but Palo Alto Networks expects the growing pains to linger a little longer.

A/NZ systems engineering manager, Gavin Coulthard, said the changing ICT landscape means a lot of organisations will remain challenged vy the management of BYOD devices.

“The task of managing corporate data and mitigating security risks on personal machines is catching up with those who have tackled the issue from a purely device management perspective,” he said.

Smartphone and tablets initially caused headaches for businesses, though since then a growing number of online enable devices have showed up.

Coulthard points out devices such as multi-function printers, televisions, wireless extenders are using a Linux or Android based operating system that is likely to be un-patched from a security perspective.

“Embedded devices are now being targeted as they offer an easier compromise point for attackers looking for command and control targets within organisations,” he said.

Everything gets connected

Consumers and businesses are increasingly seeing the value of the Internet, and as a result more devices will become online enabled over time.

This Bring Your Own Everything approach is expected to supersede BYOD, in turn creating added complexity for businesses.

Coulthard expects issues to crop up around the erosion of the end-to-end control provided by the traditional desktop environment.

“Business will increasingly need to adopt a ‘zero-trust’ architecture and segment their users from their servers and key data as the concept of a trusted client becomes less relevant in a BYOD environment,” he said.

Modern attack methods also mean IP and port-based firewalling is no longer relevant as a method to ensure legitimate traffic flows within the datacentre.

“The implementation of application-based firewalling can assist in ensuring that the application flows between services on the network are consistent with business rules and requirements,” he said.

Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at @patrick_budmar.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags BYODpalo alto networksmobilityinternet of everything



Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments