
Richard Norman
Chief Technology Officer, Kerv Connect|Kerv
Have a question?
Get in touchPublished 15/01/25 under:
How Has Security Evolved from the Castle and Moat Days?
The Need for a New Security Approach
The Critical Role of the Network
- Orchestrate and control access to resources in physical office locations.
- Protect remote workers’ communications.
- Provide a secure gateway to data silos and the internet.
- Filter access to web-based applications.
- Control data transfers out of the organisation.
All of this can be managed through a single control plane, making it easier to maintain a holistic security process compared to platform-specific endpoint controls.
Key Focus Areas for Network Security
- On-Demand Resource Allocation: Based on the identity and posture of the user and endpoint, enabling least privilege zero trust network access across LAN (both wired and wireless), remote and digital resource access.
- Access Controls: Implementing controls on North-South (public to private network) and East-West (private to private) network segments, ensuring traffic can only pass if explicitly allowed by a policy.
- Data Encryption: Ensuring robust encryption of all data in transit across any network not verified as secure.
- Data Loss Prevention: Applying DLP or Cloud Access Security Broker processes to control loss of corporate dataacross, SaaS, AI tools & web.
How Connect Can Help
Chat to our Membership team
Want to know more about our solutions in security? Get in touch today.
Contact UsHave a question?
"*" indicates required fields