UPDATED 07:40 EDT / NOVEMBER 30 2016

EMERGING TECH

Policy-defined security protects networks from the Internet of Things | #HPEDiscover

Networks are going mobile. The old system of terminals and servers is fading away to make room for smartphones, tablets and wireless devices of all kinds. This is great for users, but remains a security nightmare for IT administrators. Any of those devices could be compromised and ready to launch an attack against the network. The only solution is to police how devices behave on the network. Policy-defined security is one way of doing just that.

To learn more about policy-defined security, Dave Vellante (@dvellante) and Paul Gillin (@pgillin), co-hosts of theCUBE, from the SiliconANGLE Media team, visited the HPE Discover EU conference in London. There, they talked with Vinay Anand, VP and GM of ClearPass Security at Aruba, a Hewlett Packard Enterprise company.

Security through visibility

The first topic of discussion was the ClearPass system itself. Anand described it as a network policy administration platform, explaining that it can discover every device on the network, making them visible to security. From there, a defined policy covers where the device is supposed to connect and how it behaves.

The other side of the equation is enforcement. Anand mentioned that when a device misbehaves, the policy-defined platform recognizes the device has changed and can take appropriate action. The system can quarantine the offender, kick it off the network or respond in some other way.

Protection for the perimeter and the network

Preventing attackers from connecting to the system is a start, but not enough. Anand felt that perimeter security is not a lost cause, since it does stop the vast majority of attacks. Still, some will get through. He explained that the system needs other capabilities, such as breach detection. ClearPass is one of those other capabilities, giving admins the ability to step in when something misbehaves.

Analytics is also part of the solution. Anand related how once a system is compromised, attackers leave code to watch and gather data. If a company is tracking every byte of data, they can see a pattern of behavior that is not normal. Once detected, something can be done about it.

Watch the complete video interview below, and be sure to check out more of SiliconANGLE and theCUBE’s coverage of HPE Discover EU. (*Disclosure: HPE and other companies sponsor some HPE Discover EU segments on SiliconANGLE Media’s theCUBE. Neither HPE nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Photo by SiliconANGLE

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.