This page contains a Flash digital edition of a book.
how to guide: secure remote access


allows the IT department to manage which external devices are allowed to connect, and to what. Access control systems that allow


for more sophisticated policy control can be used to grant different degrees of access to devices based on how much trust the organisation can place on them. For example, devices that have


been issued by the organisation can be granted full access to applications, while devices that come from elsewhere but which nevertheless have the appropriate log-in credentials can be granted access to web applications only. When combined with a web application firewall, the security risk posed by unauthorised access to web applications can be limited. This functionality is one of the


components that organisations offering ‘bring your own device’ policies – in which employees can use their own PCs, laptops and smartphones to access work systems – can make use of.


Securing smart devices Remote access from employee-owned smartphones or tablets is an emerging security concern for many organisations. Secure access control systems can be used in combination with supplementary tools that inspect iOS- or Android-based devices in order to discriminate as to which devices


8 WWW.INFORMATION-AGE.COM


are allowed access. For example, a rule could be set up that


blocks any device that has been installed with an unknown app. This could prevent someone who has stolen an employee’s smartphone from running one of the growing number of hacking tools that are now available for the devices, or prevent the risk of an employee having unwittingly installed a malicious application. Certain smartphones can also be scanned


to see if they contain malware, but not any of Apple’s iOS-based devices, as the operating system is a closed environment. This is the flipside of the fact that because Apple holds such a tight rein over the iOS environment, there is a lower risk of malware infection.


WWW.F5.COM


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20