Security is frequently compromised and difficult to manage with traditional network access
strategies. Since the infrastructure is able only to recognize clients connecting to the network,
there are no safeguards to identify the people operating these clients. And since all decisionmaking
and access enforcement responsibilities reside in the core devices, users are oftentimes
already on the network before the core routing switches are able to identify and approve their
clients’ access rights, if at all. Furthermore, networks are frequently left wide open within a
building or campus, with security gates being relegated to users logging on remotely; few, if
any, safeguards exist at the port level. Consequently, most enterprise networks offer minimal,
inconsistent security checks, clearing the way for malicious traffic to infiltrate the infrastructure.
No comments:
Post a Comment