Compare sitting at a desk today to sitting at a desk five or ten years ago; the way we work and access information has drastically changed. Employees may or may not be at their desks in a centralized office, working on desktop computers connected to a secure network. Instead, they work from multiple locations using a variety of devices to access resources. This shift in work culture has brought about the need for a new approach to network security – one that is device-centric.

What is Banyan’s device-centric approach?

Device centricity at Banyan refers to a security approach that focuses on securing the devices that access corporate resources, rather than securing the network itself. Closely related to user-centric security, this approach recognizes that today’s workforce uses multiple networks to connect to their resources: home networks, public Wi-Fi, and mobile networks. Focusing solely on securing the network misses the bigger picture and can leave the devices vulnerable to attacks.

By focusing on the device, security can be extended all the way to the resource, creating a more holistic approach to security. This approach considers the entire security landscape–from the device through to the resource–and ensures that security measures are in place at every stage of the process.

One of the biggest advantages of device-centric security: it makes connectivity more efficient. Instead of relying on a centralized network, connectivity is established between the device and the resource, regardless of the location. This means that employees can access resources quickly and efficiently, without the need for complex VPN configurations or slow connection speeds.

Device-centric security also provides better security outcomes. By focusing on the device, security measures can be tailored to each device and user, ensuring that they meet the specific security requirements of each resource. This approach enables organizations to implement posture verification, user verification, and intelligent routing, all of which contribute to better security outcomes.

Three Crucial Parts of Device-Centric Security

  • Posture verification ensures that devices meet the minimum security requirements before being allowed to access corporate resources. This includes ensuring that devices have the latest security updates and patches, have anti-virus software installed, and are not jailbroken or rooted.
  • User verification ensures that only authorized users can access corporate resources. This includes implementing multi-factor authentication and restricting access to resources based on user roles and privileges.
  • Intelligent routing ensures that traffic is directed through the most secure and efficient route to the resource. This includes routing traffic through secure gateways and ensuring that sensitive data is encrypted.

Device-centric security is both a technical approach and a mindset about protecting the enterprise. The device accessing applications and resources becomes the commonality between breaching a corporate security posture and exploiting a resource. By focusing on the device, security can be extended all the way to the resource, creating a more holistic approach to security. This approach enables organizations to implement device identity and posture verification, user verification, and intelligent routing, all of which contribute to better security outcomes. By implementing device-centric security like Banyan’s security service edge, organizations can protect their employees while they access resources quickly and efficiently – ensuring that sensitive data is kept secure.

author avatar
Colin Rand
Colin Rand is an engineer and contributor.