USA systems and the network , so there ’ s no disruption at the time of implementation , though specific inherent vulnerabilities may have to be addressed . “ Many organizations don ’ t think about securing their networks from insider threats , or securing them from lateral movement once an outsider gets access through an edge connection . That ’ s a key point – stopping that lateral movement so if you are breached from the outside they can ’ t continue to exploit that breach , and leave hidden payloads behind . It ’ s equally important to stop the internal threats from employees , contractors and their workers from accessing systems they are not supposed to access .”
Technology that never sleeps At the heart of PwC ’ s solutions are two technologies : 802.1X authentication to determine who and what can access the network , and next generation firewalls and micro-segmentation capable virtual switches to segment the network , preventing lateral movement and unauthorized application traffic . 802.1X is a highly effective network access control protocol if it is properly aligned with the business ’ s operations : as a consulting firm that has grown on consulting work based
“ It ’ s equally important to stop the
on its understanding of every aspect of its clients ’ business , from finance to HR and data management for
internal threats from employees , contractors
and their workers from accessing systems they are not supposed to access ”
– Don O ’ Neil , Director – CIO Advisory www . pwc . com 241