Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
Today’s network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and exploit vulnerabilities. These vulnerabilities can exist in a broad number of areas, including devices, data, applications, users and locations.
Network security typically consists of three different controls: physical, technical and administrative. Here is a brief description of the different types of network security and how each control works.
- Physical Network Security
Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
- Technical Network Security
Technical security controls protect data that is stored on the network or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.
- Administrative Network Security
Administrative security controls consist of security policies and processes that control user behavior, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure.
- There are some of the different ways you can secure your network
- Network Access Control
To ensure that potential attackers cannot infiltrate your network, comprehensive access control policies need to be in place for both users and devices. Network access control (NAC) can be set at the most granular level. For example, you could grant administrators full access to the network but deny access to specific confidential folders or prevent their personal devices from joining the network.
- Antivirus and Antimalware Software
Antivirus and antimalware software protect an organization from a range of malicious software, including viruses, ransomware, worms and Trojans. The best software not only scans files upon entry to the network but continuously scans and tracks files.
- Firewall Protection
Firewalls, is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. Administrators typically configure a set of defined rules that blocks or permits traffic onto the network.
- Intrusion Prevention System(IPS)
IPS is a device that inspects traffic, detects it, classifies and then proactively stops malicious traffic from attack.
- Intrusion Detection System (IDS)
An intrusion detection system (IDS) is a device or software application that monitors a traffic for malicious activity or policy violations and sends alert on detection.
- Virtual Private Networks
Virtual private networks (VPNs) create a connection to the network from another endpoint or site. For example, users working from home would typically connect to the organization’s network over a VPN. Data between the two points is encrypted and the user would need to authenticate to allow communication between their device and the network.
- Central Firewall Management and Reporting
Central is the ultimate cloud management and reporting ecosystem for your Firewall estate. Whether you are managing a single firewall or hundreds, The Central makes it easy – and free. Take advantage of zero-touch deployment, group firewall management, and flexible reporting tools – all at no extra charge
- Example, The Datacenter is protected by two firewalls
- Back End Firewall
Integrate the Intrusion Prevention System (IPS), control the access from front-end to back-end, and access from Office to back-end. Control the access and anti-intrusion prevention via remote attack and spread attack
- Front End Firewall
Intrusion Prevention System (IPS), VPN gateway for shops, office, users from outside office.
It can expand with the Web Application Firewall features
Anti-virus software to prevent the virus, botnet
- Head Office
Connect to the datacenter via VPN
The access rule and policy on IP Address
Manage and monitor users via central firewall management software
- Branch office
Connect to the datacenter via VPN Site-to-Site IPsec
Using the RED equipment of Sophos to VPN
The license is free
The another option is using the SSL Client-to-Site
- Remote users and Mobile
Access to datacenter via SSL VPN Client-to-Site
- Users protection
Using the Sophos Cloud Endpoint Protection Advanced
Sophos Endpoint and Sophos Firewall will sync and create the security policy. It is called Synchronize Security
With Synchronize Security, if the user’s equipment had virus on their equipment then that user cannot access to datacenter. They need to clean up virus on their equipment
Sophos Central Mobile Security feature, manages and secures iOS, Android, Chrome OS, Windows 10 and MacOS devices.