pointer

Security Series Part 5: Are you Monitoring Your Employees Too?

Network security is everyone’s responsibility.

Many organizations task specific departments with implementing and monitoring security protocols. Much of the time, these efforts are focused on customer interactions, being that any compromising of client data (especially during the sales and service process) makes for terrible publicity and is the quickest way to ruin a customer relationship.

However, with the mobility and frenetic pace of today’s marketplace, it is just as important to develop and implement comprehensive internal security protocols and solutions.

An area of company communications that is especially vulnerable is WLAN. Because it uses radio transmissions, these exchanges are inherently more difficult to secure than wired LANs and are more prone to being intercepted. So, a key for modern businesses is ensuring that all employees are following security protocols to the letter. That’s what makes solutions like WildPackets’ OmniPeek so powerful and appealing.

OmniPeek is a wireless network analyzer and software console that offers an intuitive, easy-to-use graphical interface that allows rapid data analysis and troubleshooting on enterprise networks.  

A few of the key features include:

  • Deep packet inspection
  • Comprehensive 802.11 analysis, including 802.11ac
  • Complete VoIP monitoring and analysis
  • Application performance monitoring

For a quick look at OmniPeek in use, view the video below

With so many tools in one affordable offering, a wireless network analyzer like OmniPeek allows businesses to keep an eye on their security at all times. For that kind of feature richness and peace of mind, many business owners would pay a small fortune. But that’s arguably OmniPeek’s best attribute: you get all of these game-changing features for an affordable price.

Use Comprehensive VoIP Monitoring & Analysis to Improve Performance

With over 10 years of deployment history, VoIP is the primary voice solution for just about every company in existence – large, medium, or small. But even with all that history, recent research from TRAC shows that VoIP is still the number one IT initiative impacting network performance. And, with the growth of 802.11 and Wi-Fi enabled smart phones, the use of voice over Wi-Fi (VoFi) promises to increase the volume of VoIP traffic even more.

However, analysis of VoIP traffic alone is not enough – it should be merely one component of your overall network performance analysis. After all, VoIP is just another type of data impacting your network’s overall performance. The answer: monitor and analyze the network as a whole, including voice and video over IP.

Join us on July 23rd  for a webinar to see how easy WildPackets has made it to capture and analyze voice, video, and data traffic simultaneously. We’ll demonstrate how simultaneous capture and analysis allows you to pinpoint the impact of each data type on your overall network performance.

Security Series Part 4: Five Crucial Strategies for BYOD Security

The upside to the proliferation of smartphones, tablets and laptops is that they allow your employees to access important work-related information from just about anywhere, improving collaboration and productivity in the process. Personal mobile devices can also save your business money because you won’t have to lay out cash for company-specific mobile tools.

The downside to the bring your own device (BYOD) trend, however, is that anywhere, anytime access can create significant security concerns for both you and your customers. Efficient mobile communications are a necessity in today’s global marketplace. At the same time, companies must always be cognizant of what information employees are accessing on-the-go and how they are viewing it.

Fortunately for companies with dispersed workforces there are strategies and solutions that can severely limit BYOD risks. Let’s take a look at five critical ways companies can ensure their BYOD policies are as strong as possible:

  •  Go beyond device security: It’s important to maintain security protocol at the device level. It’s equally important to have visibility into the data traffic from these devices.  Effective Network monitoring tools give engineers a high-level view, along with their associated traffic patterns, of every node on the network at all times.
  •  Run a pilot program: There is no way to fully anticipate the problems you’ll run into when you launch a new protocol. That’s why running a trial program is crucial. Pilots allow your company to encounter and solve actual issues as they crop up, rather than just hypothetical scenarios.
  •  Invest in training: Employees can’t be expected to abide by BYOD policies they don’t fully understand. Nothing will prepare your workforce for the rigors of remote work quite like teaching them exactly how your company would prefer they use their devices, as well as covering what should remain off-limits.
  •  Involve all company departments and stakeholders: Network security affects every department, from billing to HR to customer service. A data breach in any of these divisions can wreak havoc across an entire organize. Employees in these departments need to understand that network security is everybody’s job, not just IT.
  •  Consider all industry requirements: As mobility proliferates, many regulations are continually put in place to keep it a safe space. Ensuring your company is up-to-date on the latest requirements will stave off many future issues. It’s especially vital that companies also understand their own verticals and the regulations—like HIPAA laws for healthcare, for instance—with which they must remain compliant to avoid fines and penalties.

Even when your company is on top of all these issues, it can never hurt to have a helping hand or a second set of eyes. For this reason, companies like WildPackets, who specialize in troubleshooting and wireless network forensics, can bring peace of mind to even the most forward-thinking organizations.

Click here to download WildPackets’ whitepaper on BYOD security for mission critical applications.