Top Banner
NETWORK SECURITY What You Need to Know about Network Security DESIGNED BY… Robert S, B.E
20

Network security

Feb 09, 2017

Download

Technology

Robert S.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network security

NETWORK SECURITY

What You Need to Know about Network Security

DESIGNED BY…Robert S, B.E

Page 2: Network security

INSIDE…What Is Network Security?

How Businesses Use Security Technologies

Getting Started with Network Security

Top 5 Questions to Ask Your Partner

Page 3: Network security

WHAT IS NETWORK SECURITY?

Network security technologies protect your network against the theft and misuse of confidential business information and guards against malicious attacks from Internet-borne viruses and worms. 

How security worksProtects against internal and external network attacks. Ensures privacy of all communications, at any place at any timeControls access to information by accurately identifying users and their systems.Makes you more reliable.

Page 4: Network security

CONT…

Threats can originate both inside and outside the four walls of your business. An effective security system monitors all network activity, flags aberrant behaviour and makes the appropriate response.

Protects against internal and external network attacks. 

Ensures privacy of all communications,at any place at any time

Employees can access the network from home or on the road with the assurance their communications remain private and protected.

Page 5: Network security

CONT…

Businesses can set their own rules around data access. Denial or approval can be granted based on user identities, job function or other business-specific criteria.

Controls access to information byaccurately identifying users and their systems.

Makes you more reliable.

Since security technologies let your system prevent known attacks and adapt to new threats, employees, customers and business partners can be confident their information remains secure.

Page 6: Network security

HOW BUSINESSES USE SECURITY TECHNOLOGIESNetwork security has become a requirement for businesses, especially those that rely on the Internet. Your customers, vendors and business partners probably expect you to protect any information they share with you.While network security has almost become a prerequisite to running a business, it also pays off in multiple ways. Here are some of the benefits businesses gain from a secured network:

Customer trustMobilityImproved productivityReduced costs

Page 7: Network security

CONT…

Privacy is assuredCollaboration is encouraged

Customer trust

A strong security stance assures customers that sensitive information, such as credit card numbers or confidential business details, will not be accessed and exploited. Your business partners will feel more confident sharing data such as sales forecasts or pre-release product plans. In addition, the same technologies that keep intruders out can give your partners secure access to information on your network, helping you collaborate and work together more effectively.

Page 8: Network security

CONT…

Secure access on the roadPromotes productivity while out of the office

Mobility

Strong network security lets your employees safely access your network from the road or from home without introducing viruses or other threats. Secure, convenient network access means that employees can use critical information when they need it, making them more productive when they're away from their desks.

Page 9: Network security

CONT…

Less time wasted on spamBetter employee morale and collaboration

Improved productivity

An effective network security program can boost productivity across your organization. Employees spend less time on non-productive tasks such as sifting through spam or dealing with viruses. Your network and your Internet connection remain safe, ensuring you and your employees have regular access to the Internet and e-mail.

Page 10: Network security

CONT…

Service disruption is avoidedAdvanced services safely evolve

Reduced costs

Network downtime is costly to all types of businesses. By ensuring your network and your Internet connection are safely up and running, you can be sure that customers can reach you when they need you. Effective security allows your business to add new services and applications without disrupting the performance of your network. Taking a proactive approach to safeguarding your data ensures your business remains up and running when it needs to be.

Page 11: Network security

GETTING STARTED WITH NETWORK SECURITYMatching the needs of your business with the right security technologies is the first step to launching a network security project.Use the following list of considerations to get you started:

Your current security levelYour assetsInformation transferPlans for growthRisk assessmentEase of use

Page 12: Network security

CONT…

Does it offer firewalls, a virtual private network, intrusion prevention, virus protection, a secured wireless network, anomaly detection, and identity management and compliance validation?

Do these features communicate with one another?

Take an inventory of the security features your network already has. This list will help identify gaps in your current protection methods.

Your current security level

Page 13: Network security

CONT…

Within your particular business, what assets are the most critical to your success?

Is protecting your internal information most important, your customer’s information or both?

How much are these assets worth?

Where do these assets reside within you system?

Make a "laundry list" of your assets to determine how many levels, or layers, of protection your system needs.

Your assets

Page 14: Network security

CONT…

Do your employees need quick access to internal information in order to do their jobs?

Do you share data outside the four walls of your business?

How do you control who has access to this information?

Do you provide varying levels of access to different network users?

Assess how information is shared inside and outside of your company.

Information transfer

Page 15: Network security

CONT…

Is your company planning on adding advanced features to your system? How adaptable and flexible will your system need to be? Your security solution should be able to accommodate increased network traffic or advanced applications without disrupting service.

Plans for growth

Page 16: Network security

CONT…

How regulated is your business environment?

What are the risks of non-compliance?

How much downtime can your business tolerate before financial or reputation losses accrue?

Determine if the consequences of a security breach extend beyond lost productivity or an interruption in service.

Risk assessment

Page 17: Network security

CONT…

The best security technology will do you no good if it can't easily be installed or used. Make sure you have the resources to manage the system you install.

Ease of use

Page 18: Network security

TOP 5 QUESTIONS TO ASK YOUR PARTNER

A channel partner is an important ally in choosing and using network security. A knowledgeable partner who can assess your current level of protection and guide you to the right solution will help you develop a safe and flexible network.Do you specialize in working with small and medium-sized businesses (SMBs)?What type of service and support do you offer after the sale?How will this new solution integrate with my existing IT environment?How will this solution help me save money and control my costs? What do we need to do to prepare?

Page 19: Network security

REFERENCEShttp://www.cisco.com/c/en_sg/solutions/small-business/products/security-small-business-main-page/security-primer.html#1

DESIGNED BY…Robert S, B.E

Page 20: Network security

THANK YOU