The NHS, Children’s Services, Housing and Regeneration, Local Government, the Police Force – everywhere you turn there is a generic call to introduce changes that will save money.
One popular initiative has seen many local councils consolidate their operations by co-locating their staff. NHS, education, council employees and others are all congregating together in one central location in an effort to reduce property costs. While on the surface this seems a practical solution, for the IT team it’s a logistical nightmare.
Imagine each department existing in its own locale. Part of the infrastructure would typically include a physical IT network. Just like a building has walls to protect the contents inside, the network too would have barriers, or gateways, to prevent external access.
As organisations come together, under one roof, so do the networks on which they function and this is where the complexity begins.
Sticking with the physical building analogy, if you give someone a key to the front door, without a thought to the security within the building, then that person is free to roam all the floors, corridors, offices and potentially rifle through the unlocked drawers and filing cabinets within. Similarly, a physical network is made up of several layers and it’s reliant on someone physically locking all the areas, or compartments, to prevent unauthorised access.
It’s imperative that a company controls which individual has access to which services, applications and information. They also need to ensure that each individual is actually who they claim to be. While this sounds pretty straight-forward, it can be very complex to manage without the right tools.
Before I continue, it’s worth clarifying that inadequate data protection will get you into a whole heap of trouble. If you’re in any doubt, a quick internet search of “public sector data breaches” will bring up a long list of organisations that stand testament to the size of the problem, and the penalties they’ve incurred as a result.
Instead of building separate physical or rigidly constructed networks for each organisation, one method that is gaining popularity is to create one network, and to control access to the services and data it houses at the point of entry.
Networkless connectivity removes the dependency on how the network is physically constructed and is instead dependent on an individual’s role within the organisation. Using access control technology, such as Cryptzone’s AppGate Security Server, the services and information each individual is granted access to will be determined at the point that they attempt to connect to the network.
Returning again to the building analogy, it is akin to each person having their own unique key to the building that, when they unlock the front door, it automatically opens all the doors within the building that they can legitimately enter, but also seals all the doors that they should not.
Share this story