request assessment form
Please fill the form below and we will contact you soon.
Secure the Branch, and the Business
- Shawn Austin
- September 5, 2018
- 0 Comments
Interconnected applications and growing demands on the network by employees, third parties and devices leads to fragmentation of the attack surface—and greater exposure. One of the leading contributors is the enterprise branch.
The branch office has different business flows that exposes it to risk, including:
- Internal Flows: Relates to needs employees have on the network
- Third-Party Flows: Connections to external companies like vendors and service providers
- Customer Flows: Includes network services like guest internet and website portals
These flows are all subject to attack and need different security capabilities to protect them. To start designing a secure branch architecture, it’s essential to see what areas of the network the flows connect to. Based on each PIN, you can defend against common threats by designing an architecture that ensures each line of business has the appropriate controls.
Mapping the business flows with corresponding security capabilities can be reused with many different designs. And while the risks are being secured in the same way, this approach can be tailored to your specific needs for optimal end-to-end security.
Cisco Meraki has been providing network infrastructure and security services to enterprises since 2003. When it comes to deploying the Cisco Meraki cloud infrastructure, trust CipherEx’s large-enterprise implementation experience. Contact us at (888) 774-9244 to discuss your requirements.