IT security / cybersecurity exploits are almost always installed and used via network connections, making network security a fundamental concern. IT users are often pivotal in IT security / cybersecurity exploits, so their training is very important. Improving network security and user training reduces risk to business and demonstrates to clients and regulators a professional attitude to these responsibilities.
Network security factors
Network edge security
Security software running on devices at the edge of the network, such as anti-virus software running on a desktop computer. There are multiple kinds of network edge security in common use.
Security software running on devices within the network, such as a firewall appliance. Intra-network security is much less common, but increasingly important to control the growing sophistication of modern exploits in more device rich networks.
Advantages of intra-network security
Effective for all network connected devices
Some network connected devices do not or cannot run security software. For example, digital signage and media players, Internet connected TVs and radios, voice-controlled devices, smartwatches, and IoT devices. Their lack of security software means they rely on intra-network security, particularly if their software is not updated often to mitigate security threats.
Extra kinds of IT security check
The chance of intercepting IT security threats is increased with checks that are not possible by people or network edge security, such as threats that operate across multiple network connected devices.
Suspicious traffic can be blocked to and from devices. By design, network edge security must wait for new IT security threats to be identified and to be told how to block them. Traffic filtering can block unknown IT security threats and prevent them spreading within a network.
Devices and groups of devices can be isolated within a network to minimise the risk of an IT security threat spreading.
They only run security software and so are considerably less likely to be compromised than more complex multi-purpose devices, such as user devices.