Lock it down!

By on
Lock it down!
Page 2 of 2  |  Single page
Resellers are starting to understand that they can make a reasonable margin selling wired networks, according to Firewall’s Verykios. “They’re starting to pitch it as their first preference when they do a diagnosis of their customer’s [network],” he says.

Users too are starting to understand that users can take a “network edge device” with them and be more efficient. “You’re always on with that kind of capacity and you’ve got good bandwidth,” he says.

It’s easy for the reseller or system integrator to prove that a wireless network is more secure than a wired network, he says.

“We see a lot of wireless sales going into wired networks to protect the edge from rogue intruders. [The user] needs some form of wireless security to protect the network from some form of unathorised wireless access.”

Resellers and integrators are making money identifying the holes in a customer’s network and charging for it. “Sometimes they charge them as part of an audit or they do a vulnerability test,” he says.

By doing this, the reseller has a logical reason to recommend a customer “tweak” their current security policy, Verykios says.

Firewall is training its resellers to ensure their customer’s security policies are more “contemporary”, he says.

Finding and attacking an organisation’s security holes is something that Rob McAdam, CEO of security consultancy Pure Hacking and his team do for a living. The company, which is independent of any manufacturer, charges a customer to hack their wireless network.

“We go in and they say “we’ve just installed wireless and we want someone with no background knowledge to do an assessment.’”

“If they want to, they will get us to exploit them,” he says.

Many organisations, McAdam says, have done their best to secure their networks but Pure Hacking often finds “there is a misconfiguration somewhere.

“We come in with a fresh pair of eyes – that’s where you find a lot of problems. A lot of the tools have security built into them and quite often it’s the human error component. That’s why they bring us in,” he says.

“The concept of trying to sell a product into the environment is not there at all with pure hacking. I’ve focussed purely on services,” he says.

Whether or not a wireless network is secure comes down purely to the skill level of the people configuring it. “The wired and wireless networks do have security built into them but it’s going to come down to the individuals that set them up,” he says.

“It’s like going to the gym – you can’t go once and say ‘I’m fit for life.’ You have to keep going to the gym and it’s the same with security. It never ends,” he says.

Channel players that are making a “bunch of money” according to Great Bay’s Winter, are actually developing a security policy for an organisation’s wireless network.

These companies are rolling out, implementing and monitoring the security of an organisation’s wireless infrastructure. “It’s all good and well to have a [security] policy written, but making sure it’s updated and adhered to is another key area,” he says.

“If your access points aren’t configured correctly, it will allow someone to gain access to that access point which opens up the network.”

Organisations that specialise in writing security policies and managing these access points are winning. “If you have to configure 100 access points, the chance that you will get one wrong is high.

If they are centrally managed, there’s a smaller risk of failure.

“There are guys out there doing this sort of stuff and because corporations don’t have the skill set, providing a managed service behind a wireless security rollout is a huge opportunity.

“You’re not going to make a whole bunch of money selling an access point but you’re going to [make money] on the security side,” he says.

InTechnology distributes a range of products that secure wireless networks. It recently signed an agreement with US-based Great Bay Software to distribute its “Beacon” end-point security offering which provides administrators with information to manage an authenticated wireless network.

In July, it also started distributing the AirWave Management Platform, a software application that lets users configure, analyse and monitor wireless network infrastructures in real-time.

“Most organisations are putting in place a single security policy for their wireless and wired infrastructure going forward.”

Telarus is one voice and data service provider that has just made the jump into the WLAN market.

The company – which sells into sites with 20 to 1000 seats - provides a site survey service for wireless users that involves assessing the customer’s site and working out a design that’s secure, says Fergus Fitzwater, security analyst at Telarus. Making sure “interference” is reduced is also part of the offering.

After configuring a wireless network, there are many technologies that resellers need to understand to ensure the customer gets the maximum benefit from the network.

Understanding how the radio actually works is important, he says. “[Product specifications] on distributor and vendor websites don’t tell you how the radio works and how they achieve the “bit rate,” he says. “A lot of installations, as a result, don’t get the expected performance,” he says.

Rolling out intrusion detection and prevention infrastructure is also crucial. “You need to [install] something that is going to detect when people are trying to connect and block that connection,” he says. When these products are installed, administrators are alerted when a rogue access point has been setup.

Maurice Famularo, marketing director Australia/New Zealand at networking equipment maker D-Link says that securing the network is also part of the site survey. This survey should determine what other WLANs exist within signal range can cause interference and the risk of other WLAN clients attaching themselves to any unsecured networks.

Resellers and integrators deploying WLAN need to specialist and become “experts” in site surveys to correctly spec products, he says.

Trusted advisor

The growing complexity of IT systems and wireless networks continues to produce confusion as well as the current environment of corporate anxiety, says Phillip Allen, research manager, vertical markets at IDC. Both issues have created an active market for security advice, he says.

“However, the problem is that end-users don’t know who to speak with and no vendors are really focussing on this and the marketplace is still a little confused and uncertain about who is able to best help them.

“In order to unlock the revenue opportunities in a crowded market, resellers will need to identify a clear strategy. Without a clear market positioning strategy, companies will get lost in the crowd and lose business to their competitors,” he says.

Resellers hold the key to helping customers understand wireless security according to Robert Pregnall, Asia-Pacific product manager for end-point security at Symantec.

Why organisations have placed security as an afterthought when deploying wireless devices is a mystery, he says.

“We have had the conventional anti-virus and border protection for all devices. Anti-virus and/or potent security offerings have been available. “Resellers hold the key to helping customers understand – as a trusted advisor,” he says.
Previous Page
1 2 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Log in

Email:
Password:
  |  Forgot your password?