Published: 26 September 2019
Summary
A wide range of new devices are being connected to enterprise networks, often without official knowledge or authorization. Infrastructure and operations leaders must establish categorization, segmentation and isolation policies to avoid disaster.
Included in Full Research
- Create a Device Certification Process for all Devices Passed by “Every” Device
- Place “All” Devices Into One of Four Risk Categories
- Corporate Devices
- Guest Devices or BYOD
- Trusted or Known IoT Devices
- Untrusted or Unknown Devices
- Architect a Virtual Segmentation Strategy for Segmented or Isolated Requirements Across Multivendor Campus Networks
- Implement Segmentation
- Standards-Based Segmentation for Multivendor Networks Requires Testing and Limited Encryption Options
- Isolation May Be Needed in Addition to Segmentation