PWC
“ Once hackers breach outer layers of protection and get inside the organization they try to move laterally ”
– Don O ’ Neil , Director – CIO Advisory
BYOD , however the corporation might only want to allow those devices access to low risk areas like e-mail , a time clock system or an intranet . The organization ’ s critical infrastructure is blocked at the point of entry to the network from the individual or device being even able to detect its presence . Take the education sector . Institutions hold huge volumes of research data and may have privileged access to some government networks . Yet millions of students and researchers rely on easy access to publications and material relevant to their area of study . This is where NAC and segmentation really cuts down the risk . An individual may be granted full access to a research lab when on their home campus , but that access can be restricted or denied depending on the device they have , when they are traveling or if they are visiting a high-risk country .
Too many organizations don ’ t know how their individual business units work , O ’ Neil concludes , nor how their technology is deployed , what their networks look like from end to end or which devices have access
244 May 2017