Openness, transparency, and sharing together provide the key for building the foundation of a safe and secure world

#$%@ happens!

The social and economic impacts emerging as the coronavirus outbreak continues to spread are increasingly evident not only in China but around the world. Last week the Mobile World Congress, which draws some 100,000 people to Barcelona every year, had to be called off after exhibitors began pulling out of the event in droves because of infection concerns. Likewise, Facebook’s annual Global Marketing Summit has also been canceled for the same reason.

Beyond the conference circuit, the outbreak has begun to threaten broader economic growth. In Hong Kong, HSBC announced 35,000 job cuts as it anticipates slower growth ahead. Car manufacturers such as Jaguar Land Rover, Fiat Chrysler, Honda, Nissan, GM, and Renault have announced pending production slowdowns because of supply chain issues in China. And Apple has just announced they expect to miss their sales forecast this quarter due to disruptions in China as well. Most importantly, lives have been disrupted, damaged, even lost. More would be coming but we need effective response and mitigation to move beyond fear, hatred, and blame.

Preventative and detection controls are the most effective response but openness, transparency, and sharing are the key

As cybersecurity practitioners, we know that surveillance, detection, and remediation have to be practiced consistently to keep the threats of a dangerous world at bay and under control. In South Korea, government health authorities have implemented highly innovative measures to limit the spread of the contagion: they have created digital diaries of infected peoples’ movements before contracting the coronavirus and made those records available on the government’s website so that individual Koreans can check whether they might have come into contact with the virus themselves and seek medical attention proactively. Also, related intelligence, protocols, and systems are being shared with other countries rather than kept hidden. The result has been highly effective as the government can now keep track of all infected patients and potentially vulnerable people. South Korea has shown how to mitigate risks by putting the right human processes and technological supports in place.

Not much different in the cyberworld

Similarly, we should know everything that is happening in our networks no matter what and be alerted to any types of vulnerabilities and associated threats before any negative events occur. Also, we need to make all intelligence actionable and shareable. No “politics” or “sales” strings should be attached. Since 2005, Genians has been leading the NAC industry by supporting over 1,600 customers around the world. We are ready to share our proven technology and experiences to support enterprises wanting to move toward greater openness, transparency and sharing by taking advantage of next-gen NAC capabilities.

The lifecycle of each device in your network (from cradle to grave)

Just like the digital tracking diaries established by the Korean government, we should be able to identify and track all aspects of detected devices. What is the device exactly? Where is it being connected, Who is using it? How is it connected to my network? This kind of contextual information is basic. On top of that, we need to know who manufactures the device and when its support or sales will be ended. Most importantly, we need to correlate any vulnerabilities (CVE) by device and manufacturer. All of this should be available in a single pane of glass and has to be shareable. Only then will we literally have clear visibility into our networks.

Control or be controlled

The real challenge begins as we work to manage and control devices that are not compliant or need to be treated differently based on their roles. To detect any non-compliant or even compromised devices in a timely manner, we have to classify them based on business need and monitor the groups in real-time. Security is important but our business productivity is even more critical. We therefore have to enforce policies without disturbing existing operations.

Actionable Intelligence

We all know that there is no such thing as a “silver” bullet to solve all cybersecurity challenges while sustaining our business productively. We need to share our cyber-intelligence with other security or IT solutions to be fully actionable in a timely manner. Since Genians operates at Layer 2, the comprehensive network data it collects is valuable both to customers and other technology vendors alike; we can make this intelligence actionable against threats more effectively by exchanging this intelligence with other vendors’ solutions via open APIs.

How can we achieve this? Learn more:

Together, More Secure. Journey with us.

As with the coronavirus or any other serious biological threat, one has to remain ever-vigilant. But putting the right technology in place to protect your most valuable life and assets from intruders is just as necessary in order to keep your organization safe and open for business. We as Genians always work together with customers, partners, vendors, and communities to sustain our safety from the threats posed by an unpredictable world. And our next-gen NAC solutions can be working as a communication platform to turn things around. So journey with us.

Why NAC? Why Genians?

Evolution of NAC

NAC Architecture Comparision

Best NAC Deployment Plan

NAC 101

Learn the basic concept of Next-Gen NAC to secure all network access from Core to edge network seamlessly. 

Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms