Healthcare Networking in a Hyper-Connected World

The infusion of technology into medicine has been truly transformative and has greatly improved how we approach healthcare. We can send and receive patient data anywhere in the world, instantly. Doctors can analyze vitals of patients in the hospital while at home or from their office. A clinician can instantly see if a machine has administered the correct dosage of a drug at the correct time—and address the problem if it didn’t.

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes - Part 4

Mistake #4: Underestimating the Scope of Your Segmentation Needs

 

The world’s leading technology research and advisory company, Gartner, Inc. recently reported a rise of 31 percent in connected “things” worldwide from 2016 to 2017, which amounts to nearly 8.4 billion connected things last year.

When inventing something, you should try to think about what the consequences might be

These words were recently spoken by the man affectionately known as “The Father of the Internet”, Vint Cerf, in a recent NPR interview. Unfortunately, he didn’t apply that best practice to the invention he’s best known for. While he and his team created the vehicle that makes our entire world go round (i.e.

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes - Part 3

Mistake #3: Separating Cloaking, Connectivity, and Encryption

 

A workable and effective solution for micro-segmentation comes down to the following simple mathematical formula:

Cloaking + Connectivity + Encryption = Successful Micro-Segmentation Solution (SMSS)

Take away any of those three critical elements and the formula just doesn’t work.

Host Identity Protocol - Making Secure Networking HIP Again

The old address-defined networking paradigm of blindly networking everything is problematic at best… unless you’re a hacker. But now, there’s a better way. One that’s HIP to be precise!

HIP—which stands for Host Identity Protocol—moves beyond the old way of networking. Instead, HIP only networks devices with provable host identities. And it does so in a way that shuts out hackers, while making it easy for devices to automatically join a HIP-based network.

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes - Part 2

Mistake #2: ACLs–A set of rules that are made to be broken

 

There’s an old saying that confidently declares, “Rules are made to be broken.” It’s mostly attributed to American five-star general and hero of WW II, Douglas MacArthur. In the right context, it’s meant to be a motivational message, trying to inspire people to think outside the box and not be afraid to chart their own course. When misinterpreted, especially when referring to solutions for network security, the old adage can be devastating.