10 easy steps to secure your retail network



Similar documents
Types of cyber-attacks. And how to prevent them

Achieve Deeper Network Security

Best Practices for Secure Mobile Access

Achieve Deeper Network Security and Application Control

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Logging and Alerting for the Cloud

Understanding Enterprise Cloud Governance

Ten easy steps to secure your small business

Navigating the NIST Cybersecurity Framework

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management

Proactive Performance Management for Enterprise Databases

How to Deploy Models using Statistica SVB Nodes

Simplify Your Migrations and Upgrades. Part 1: Avoiding risk, downtime and long hours

SharePlex for SQL Server

How To Use Shareplex

Top 10 Most Popular Reports in Enterprise Reporter

Solving the Security Puzzle

Dell One Identity Manager Scalability and Performance

Reverse Proxy Three Myths Busted

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Organized, Hybridized Network Monitoring

Introduction to Version Control in

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Understanding and Configuring Password Manager for Maximum Benefits

formerly Help Desk Authority Quest Free Network Tools User Manual

Security Features in Password Manager

Securing the Small Business Network. Keeping up with the changing threat landscape

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Dell One Identity Cloud Access Manager How to Configure for High Availability

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Spotlight Management Pack for SCOM

Dell InTrust Preparing for Auditing and Monitoring Microsoft IIS

4.0. Offline Folder Wizard. User Guide

Quest vworkspace Virtual Desktop Extensions for Linux

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Payment Card Industry Data Security Standard

Governed Migration using Dell One Identity Manager

Dell InTrust Preparing for Auditing Cisco PIX Firewall

DevOps for the Cloud. Achieving agility throughout the application lifecycle. The business imperative of agility

Dell vworkspace Supports Higher Education s Desktop Virtualization Needs

About Recovery Manager for Active

V1.4. Spambrella Continuity SaaS. August 2

INFORMATION PROTECTED

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code

Dell InTrust Preparing for Auditing Microsoft SQL Server

Quest Collaboration Services How it Works Guide

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell One Identity Cloud Access Manager SonicWALL Integration Overview

Dell One Identity Cloud Access Manager Installation Guide

Dell Statistica Statistica Enterprise Installation Instructions

Security Analytics Engine 1.0. Help Desk User Guide

Defender Delegated Administration. User Guide

Object Level Authentication

Quest Collaboration Services 3.5. How it Works Guide

How To Protect Your Active Directory (Ad) From A Security Breach

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

The Business Case for Security Information Management

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Desktop Authority vs. Group Policy Preferences

2.0. Quick Start Guide

New Features and Enhancements

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Clean VPN Approach to Secure Remote Access for the SMB

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Proven LANDesk Solutions

Defender 5.7. Remote Access User Guide

Dell Statistica Document Management System (SDMS) Installation Instructions

Active Directory Auditing: What It Is, and What It Isn t

formerly Help Desk Authority Upgrade Guide

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Getting Agile with Database Development

Go beyond basic up/down monitoring

Dell InTrust Preparing for Auditing CheckPoint Firewall

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

Simplify Your Network Security with All-In-One Unified Threat Management

Using Web Security Services to Protect Portable Devices

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

formerly Help Desk Authority HDAccess Administrator Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Next Gen Firewall and UTM Buyers Guide

Protecting Data with a Unified Platform

Transcription:

10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

Introduction Every year, network attacks become more widespread, more intelligent and more difficult to detect. Given the public nature of retailers, entry points into the network go beyond employee laptops, desktops and smartphones to include public Wi-Fi, and public-facing ecommerce servers. As a result, retail networks have two primary challenges. The first is dealing with the complexity of managing many remote locations. The second is being able to provide security protection that mirrors the same threats as those facing large enterprise networks. In a small retail business, the role of administering network security often falls on the business owner or the default inhouse techie. Typically, neither of these individuals would have the time, resources or expertise to work on complex network security protection deployments and administration. In a distributed retail environment, both the IT department and security department have unique challenges. For IT, it is managing a complex and distributed network (including wireless and switch management). For security, it is deploying consistent policies across the organization. You can build a secure retail network by taking advantage of modern network security technologies. This e-book examines the ten primary security challenges for your retail network and offers ten proven solutions. 2 2015 Dell, Inc. All rights reserved Share:

Step 1: Layer your security Your challenge: Bolster your defense against new threats at every layer Many of today's attacks are blended attacks which use multiple techniques at different layers to try to infiltrate the network. These attacks can bypass outdated firewalls that lack the power to inspect all traffic, including large files and HTTPS encrypted traffic. Your solution: Deploy a Unified Threat Management firewall The best approach for retail network security protection today is Unified Threat Management (UTM). Simply put, UTM firewalls combine the effectiveness of various point defenses to add protection at every networking layer. For a retailer, the value of UTM comes from its combining complex tasks into a single device with a management console. This approach provides a powerful defense against a wide range of security threats. This makes network protection more complete, affordable and easy to manage. Deploy a Unified Threat Management firewall 3 2015 Dell, Inc. All rights reserved Share:

Step 2: Secure your gateway Your challenge: Block threats before they enter your network E-commerce and Wi-Fi increases the ability for you to reach more potential customers by expanding your network perimeter. However, an expanded perimeter presents more approaches for additional attacks. Your solution: Inspect the whole file Deep Packet Inspection technology, when properly deployed at the gateway, can scan the entirety of the data packets that touch your network perimeter. In addition, your UTM firewall also needs to be able to inspect encrypted communication coming from HTTPS traffic in order to catch threats that are hidden inside files, applications and attachments. No limits on size or type of file 4 2015 Dell, Inc. All rights reserved Share:

Step 3: Keep it simple Your challenge: Cut out complexity Simplicity affects your bottom line. The total cost you pay for security isn't only measured in its list acquisition price. It's also in the cost of installing, using, managing and maintaining your solution. Your solution: Simplify your technology High-performance security does not have to be complex. Modern security appliances can make setup and management easy, using features like intuitive web-based interfaces and easy-to-use configuration wizards. For multiple locations, centralized or hosted management can further ease administration and ultimately lower ongoing cost of ownership. Simplify your technology 5 2015 Dell, Inc. All rights reserved Share:

Step 4: Keep it affordable Your challenge: Ensure comprehensive protection on a small budget Every organization, no matter the size, needs the same protection used by the biggest banks, hospitals, universities and governments. Often to get the best protection means spending beyond the budget. Your solution: Consolidate your security Reduce your costs for hardware, set-up, operations and administrative overhead by consolidating multiple security tools in one easily managed, affordable appliance. Optimally, such an appliance should include content filtering, intrusion prevention, anti-spyware, anti-malware and native apps for remote access from any device. To stop today s threats, consolidated security needs to also include the ability to inspect encrypted files without file size limitations. Consolidate your security 6 2015 Dell, Inc. All rights reserved Share:

Step 5: Get rid of bottlenecks Your challenge: Keep your firewall current with your network build-out Even if your firewall is only a couple years old, it might be compromising the security and efficiency of your network. You should not have to resort to turning off security features to maintain performance. Scheduled reviews of network improvements must consider the firewall as a key component. Your solution: Select high-performance hardware and software that is priced for small businesses. For optimal performance while maintaining maximum security, your solution must deliver throughput that won't bog down performance. Multi-core microprocessor technology allows UTM appliances that are designed for small businesses to gain significant network efficiency. Select high-performance hardware and software that is priced for small businesses 7 2015 Dell, Inc. All rights reserved Share:

Step 6: Keep systems current Your challenge: Keep track of what is using your network People use a combination of devices and software to do their work. Many devices and many apps can open windows for cyber-criminals. Controlling what has access to the network, and securing devices, can overwhelm retailer s security systems. Your solution: Protect your network from suspect devices and applications At the highest level, a firewall should be able to quarantine guest and employee devices that do not have current antivirus protection. For even deeper protection, knowing what devices are on the network, and making sure that your guests and employees have the latest software, can reduce exposure to vulnerabilities. Protect your network from suspect devices and applications 8 2015 Dell, Inc. All rights reserved Share:

Step 7: Keep your network productive Your challenge: Weed out non-productive traffic Today's business networks can be choked by spam, unauthorized web activity and social networking traffic that have nothing to do with getting work done. You may not even know that the person down the hall who is downloading movies is bringing your network to a crawl. Your solution: Implement content and application management Insist on a firewall that shows you all network activity of all users in real time. In an environment where you have both employees and guests, you may want to have different usage policies. For employees, it should allow you to easily create rules to restrict the use of non-productive applications and sub-applications (e.g., Facebook may be acceptable for marketing purposes, but the games within Facebook are not). For guests, you may consider restricting activity so as to prohibit users from going to offensive or inappropriate sites. Implement content and application management 9 2015 Dell, Inc. All rights reserved Share:

Step 8: Stay compliant Your challenge: Meet regulations and avoid penalties Today, there is increased scrutiny on protecting customer credit card data. Maintaining PCI compliance is a great way to cover security basics. PCI compliance starts with installing and maintaining a firewall configuration that protects cardholder data. Changing the default access passwords to the firewall is not just a guideline but a sound business requirement. To avoid costly penalties make sure your business is in compliance, with comprehensive network security and policy enforcement, as well as robust management and reporting. Your solution: Integrate compliance management Look for a solution that is easy to implement and starts you on the right track by first requiring you to change the default access. The very first requirement for PCI compliance is to change the default password. Beating defaults is no harder than a simple internet search to identify manufacturer defaults. Make passwords hard to guess and keep them hidden away from prying eyes. The best firewalls will integrate many security features, including malware detection, intrusion prevention and blocking the inclusion of unsanctioned credit card numbers in outbound emails, into a single device. Integrate compliance management 10 2015 Dell, Inc. All rights reserved Share:

Step 9: Secure your wireless networks Your challenge: Prevent wireless-based attacks Wireless connectivity improves the retail experience. However, it also opens more avenues for attack. On top of that, a wireless security solution often requires adding an expensive controller and another management console. Your solution: Apply wireless network security A simple approach would be to bring wireless within the security perimeter. By doing so, the security policies you set can also apply to wireless users. Wireless security should also be able to isolate employees from guests to ensure privacy and confidentiality. Apply wireless network security 11 2015 Dell, Inc. All rights reserved Share:

Step 10: Be prepared for the unexpected Your challenge: Prepare for unplanned disruptions Even the best UTM-secured network needs a disaster recovery solution. Major disasters have demonstrated how exposed small businesses can be to unexpected events. But it s not only headline-grabbing natural disasters, health pandemics or terrorist attacks that can disrupt a business. For retail businesses, building fires, broken water pipes, power outages, equipment failures, or even lost or stolen laptops can mean disaster. These events can potentially disrupt your operations indefinitely if you are not prepared. Your solution: Establish a backup plan Having the ability to restore an individual file or the whole network is within reach of practically every retailer. Backup to a secure secondary business location or third-party site means business systems can be restored and operational even in the primary site is compromised. Bare metal recovery (BMR) technology enables entire operating systems, such as database or file servers, be recovered to new or different hardware platforms if the original device can t be restored. Establish a backup plan 12 2015 Dell, Inc. All rights reserved Share:

Conclusion Retail network security can be a complex issue but, as presented in this e-book, it does not have to be. There are easy ways to start addressing it with IT solutions for small business. Look for a trusted advisor that can help you build a roadmap for small business network security. Insist on no-compromise security that matches performance and protection that fits your budget. 13 2015 Dell, Inc. All rights reserved Share:

For More Information 2015 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Dell, Inc. ( Dell ). Dell, Dell Software, the Dell Software logo and products as identified in this document are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN DELL S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR About Dell Software Dell Software helps customers unlock greater potential through the power of technology delivering scalable, affordable and simple-to-use solutions that simplify IT and mitigate risk. The Dell Software portfolio addresses five key areas of customer needs: data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, drives unmatched efficiency and productivity to accelerate business results. www.dellsoftware.com. If you have any questions regarding your potential use of this material, contact: Dell Software 4 Polaris Way Aliso Viejo, CA 92656 www.dellsoftware.com Refer to our Web site for regional and international office information. Ebook-10Steps-SecureRetail Network-US-KS-27124 14 2015 Dell, Inc. All rights reserved Share: