Blogs

Improve Network Access Control with Aruba Clearpass

Wireless devices are a mainstay of modern business—employees, visitors and customers alike expect reliable, instant network access. Allowing access for all can increase satisfaction for end users but it can also open your network to increased security attacks and breaches. With data driving today’s business decisions, companies need to ensure that their network security and network access control solutions are up to par.

Aruba ClearPass is setting the pace for policy management and network access control in wired and wireless networking.

Access should be simple, ClearPass provides organizations with the ability to manage access levels, secure rogue devices and monitor your network so end users get what they want while increasing your network security. In fact, Aruba ClearPass and Aruba Introspect combined to win 4 awards from Cyber Defense Magazine in 2019 including:

  • Hot Company Network Access Control (NAC) InfoSec Award for 2019
  • Market Leader Bring Your Own Device (BYOD) InfoSec Award for 2019
  • Best Product User Behavior Analytics InfoSec Award for 2019
  • Leading Edge Insider Threat Detection InfoSec Award for 2019

How exactly does Aruba ClearPass can help keep your network secure, take a look:

Identify all Devices. You should be able to identify new devices as they join and reconnect to your network.  With so many devices to manage its important to know what type of devices are on your network as well as trend usage over time. ClearPass allows visibility into device type, number, connection details and even operating systems. Remember the boundaries of your domain are extended beyond your four walls so you need to understand what is happening on your network and any threats or potential threats out there.

Enforce Policies. Let’s face it, many employees know your policies, understand why they are in place and still ignore them anyway! Aruba ClearPass can allow you to enforce policies and provide individualized user and device access on many different levels.

Protect resources. Real-time threat remediation that applies to third-party systems provides the ultimate layer of protection against threats and suspicious activity. Aruba ClearPass can detect the treat, change device permissions, and block traffic to prevent unauthorized access to data all while you are sleeping!

Detect threats early on. One of the biggest downfalls in network security is not seeing the issue coming, and only being able to react to a problem rather than prevent it. This is especially disconcerting to organizations as threats from within the organization are present more than you may realize. Aruba ClearPass provides User and Entity Behavior Analysis to spot small changes in behavior over time that could indicate internal threats.

What to Do If You Have a Breach

Despite your efforts to control access, track assets and create security protocols on your network, breaches can and do happen. Knowing what to do if you suspect or actually have a problem can make the difference between a minor inconvenience and a disaster that interrupts your ability to do business. The following steps will help you recover after a breach or incident; the faster you recover, the sooner you can resume business.

Stop the breach: Isolate any devices or systems that have been identified as part of the breach. If the hacker has used an email or account to access your systems, close them down to prevent further damage. The faster you restrict access to your systems, the less damage a hacker can do.

Examine the damage: You’ll need to determine the extent of the damage and which systems are suspect and which are confirmed secure. When you know what has actually been accessed, you will be better equipped to deal with it.

Restore your systems: Once the threat has been addressed, you can restore your systems so you can continue providing care. If you have a DRaaS or BaaS system in place, your provider will be able to help you recover quickly, if not try to work with your in-house team to get back up and running as fast as possible. If you realize you are in over your head, engage with an IT Solutions Company like Comport to help remedy security issues and implement data protection plans for the future.

Perform an audit: Determine how the system was accessed, your response to stopping the breach and the affect it had on your business. Once you know the answers to the questions, you can make better decisions on how to move forward.

Learn from your mistakes: After the initial shock has passed and your system is back on track, work with your IT team and an it solutions company if needed to establish a plan to prevent further issues. This will lower your risk of further attack and give you peace of mind. For example, If your attacker got in via your email or by exploiting a poorly chosen password, retrain employees to better protect your network. If the attacker used a lost or stolen device, you may need to address inventory tracking etc.…

The best way to prevent a data breach is to be prepared. Organizations like Comport can help you create a data protection plan that encompasses security, wireless access, backup, disaster recovery and more. Today’s cyber threats are creeping in crevasses you never imagined were there, stay vigilant and prepared!

Talk to the experts at Comport today!

Stay Connected

Sign up to get notified when we post a new blog!

Extend the capabilities of your IT team with Comport’s technology services and solutions.

Contact an expert