ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Wireless security: Protection beyond BYOD

By Contributor
Thu 1 Dec 2016
FYI, this story is more than a year old

100 billion potential vectors for cyber-attacks by the year 2025. You almost feel nostalgic for the days when all you had to worry about was the odd virus or spam.

Today your client’s private information can turn up on the open market within hours after a security breach. Not only is this bad for business, but it can also land your customers in hot water with the Privacy Commissioner. After all, it’s the law that organisations must take reasonable precautions to maintain proper security if they collect and store personal information.

But with the growing reliance on wireless networks, the phenomenal growth of smartphones for business and the proliferation of interconnected IoT (internet of things) devices, the challenges are more diverse than ever.

“Network security is no longer enough,” says Andrew Khan, Fortinet Senior Business Manager at Ingram Micro, New Zealand’s largest distributor of Fortinet’s cyber security solutions. “You have to be thinking pervasive security, a total commitment to the secure network. Each and every node, device, switch, server and user has to be fully protected. And that protection has to be seamless. Any gap or weak spot can and will be exploited. Simply put, security and network operations cannot be seen as separate entities. They are one in the same.”

Wireless networking, especially the integration of IoT devices into operations, has given cyber-criminals too many opportunities to hack into otherwise secure networks. The recent DDoS attack that targeted servers of Dyn, a provider of a managed domain name service (DNS) to dozens of well-known internet firms, graphically demonstrated the increased threat landscape resulting from wireless devices such as baby monitors, CCTVs and garage door openers connected to unprotected networks. You thought BYOD was risky? Grandpa’s pacemaker could be worse!

“To fully protect your client’s operations and ensure their business continuity,” continues Khan, “you have to be able to provide a comprehensive security framework that provides defence-in-depth, granular level transparency, integrated management and, importantly, a focus on wireless protection to secure access into the protected network. Fortinet’s Secure Access Architecture delivers all of these requirements and more.”

Fortinet Secure Access Architecture (SAA) offerings

Fortinet has your client’s wireless deployments covered with three distinct WLAN offerings:

  • An appliance-based wireless solution which combines WLAN control and security
  • A component-based wireless solution encompassing best-of-breed wireless, switching and security solutions
  • A cloud-based wireless solution which embeds security intelligence into cloud-managed access points.

Fortinet’s secure access portfolio is a critical component of their Security Fabric and provides comprehensive security across all three access platforms, whether on-premise or cloud-managed. This makes it easy for clients to mix and match deployment models for different use cases, without giving up critical security protection.

Fortinet SAA: Unified management, superior visibility and unprecedented control

Fortinet’s FortiGate Next Generation Firewalls consolidate the functions of network firewall, IPS, anti-malware, VPN, WAN optimisation, web filtering and application control together with WLAN control in a single platform. For branch office deployments FortiGate is also available with an integrated AP known as FortiWiFi.

With security, connectivity and access control unified through a ‘single pane of glass’ dashboard, enterprises can centrally administer consistent user, device and application policies across wired and wireless networks with ease. FortiGate provides unprecedented visibility and control of applications and enables effortless BYOD onboarding.

“This is what it takes to protect your clients in today’s interconnected world,” concludes Khan. “Too often network security is perceived as an add-on to network operations. It’s not. It is the very foundation of network functionality. Until that message gets through, we’ll see more data breaches, more disruptions and more costly remediation. Your role is to ensure that your clients avoid these preventable events. And you can help them with Fortinet.”

For further information, please contact:

Andrew Khan, Senior Business Manager Email: andrew.khan@ingrammicro.com M: 021 819 793

David Hills, Solutions Architect Email: david.hills@ingrammicro.com M: 021 245 0437

Hugo Hutchinson, Business Development Manager Email: hugo.hutchinson@ingrammicro.com P: 09 414 0261 | M: 021 245 8276

Related stories
Top stories
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
Phishing
Vishing attacks reach all time high - Agari and PhishLabs
"Hybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of total share in volume so far in 2022."
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
Cybersecurity
 Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
Ransomware
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll. 
Story image
Training
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Nozomi Networks
Nozomi Networks, Siemens reveal software integration
Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ software into the Siemens Scalance LPE local processing engine.
Story image
Cybersecurity
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
SaaS
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Surveillance
Motorola Solutions acquires Videotec S.p.A for security portfolio
Motorola Solutions has acquired Italian ruggedised video security company Videotec S.p.A, along with its portfolio of highly versatile cameras.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Cybersecurity
NCSC advisory highlights poor security configurations
The GCSB's National Cyber Security Centre (NCSC) has released a cyber security advisory identifying commonly exploited controls and practices.
Story image
ChildFund
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Microsoft
New Relic enters multi-year partnership with Microsoft Azure
New Relic has announced a strategic partnership with Microsoft to help enterprises accelerate cloud migration and multi-cloud initiatives. 
Story image
Sony
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Surveillance
i-PRO releases smallest AI-based surveillance camera on the market
The new i-PRO mini network camera is now available, with a pocket-sized form factor and full AI analytics functionality.
Story image
Training
Infosec unveils role-guided cybersecurity training roadmaps 
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Employment
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Cybersecurity
BlackBerry offers Kaspersky replacement cybersecurity for the channel
BlackBerry advises that users of Kaspersky software in Australia and New Zealand undertake a rigorous risk analysis of their current security posture.
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
Vodafone
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Artificial Intelligence
SAS announces new products amid cloud portfolio success
Analytics and AI company SAS is deepening its broad industry portfolio with offerings that support life sciences, energy, and martech.
Story image
Ransomware
APAC ranks third-highest region targeted by ransomware
Asia Pacific has ranked the third-highest region globally to be targeted by ransomware, according to cybersecurity firm Group-IB.
Story image
Omnichannel
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Ransomware
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Wireless
Cradlepoint expands its Cellular Intelligence capabilities
Cradlepoint has announced additional Cellular Intelligence capabilities with its NetCloud service.
Story image
GapMaps
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.
Booster
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
Artificial Intelligence
Frost & Sullivan recognises Genesys as leader in new reports
Frost & Sullivan has recognised Genesys as a leader in the cloud contact centre market for its robust cloud and digital capabilities.
Story image
Gaming
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe solid-state drives with the WD_Black SN770 Game Drive.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Lightspeed
Lightspeed launches all-in-one marketing platform in A/NZ
ECommerce provider, Lightspeed has launched a new all-in-one marketing solution, Lightspeed Marketing & Loyalty in Australia and New Zealand.
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Cybersecurity
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
Microsoft
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.