APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • ServiceNow
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 )
    left
    The Dishonesty of IT

    Paul Little fair,

    How Do You Transform Your Business?

    Liam Mallett, CIO, Kings Group

    Is the divide between IT and the business getting wider?

    Paul Ayers, Director, Cloud Enterprise Architecture, Oracle & Regular Columnist

    Will Cognitive Technologies Change the Way we Fight Cyber Crime?

    Jean-Claude Broido, VP, Security Asia, IBM

    Empowering Software Teams

    Andrew Browne, Software Architect, SEEK

    right

    How to put the net admin out of his (her) misery!

    Don Tan, Regional Director, Asia Pacific, Pulse Secure

    Tweet
    content-image

    Don Tan, Regional Director, Asia Pacific, Pulse Secure

    Pity the poor network admin, already struggling with the entire new tech hitting the corporate infrastructure, when almost daily he/she reads unnerving stats like the following from IDC:

    ‘The growth of new technologies will add almost US$1.8 trillion to the overall size of the IT industry in terms of annual sales by 2020, and Asia Pacific will lead the way!’ Oops!

    IDC calls this new tech ‘innovation accelerators’. The average net admin will have a different name for it.

    A big slice of that spending covers IoT devices, while cloud apps and mobility are not so far behind. It is already hitting creaking networks, accelerating complexity, and multiplying the day-to-day issues of network controllers. CIOs too are feeling the pressure from the explosion of innovation accelerators. Worried IT leaders are asking searching questions about various issues:

    a. Security – is our system good enough?

    b. Cloud – can we secure cloud as effectively as we secure our data centre?

    c. Apps – how do we secure all the mobile apps our staff like to use?

    d. IoT – maybe we need centralised visibility and multi-vendor enforcement.

    e. The relentless march towards hybrid IT – gulp!

    Here’s the good news: CIOs can relax as long as they select an effective and comprehensive next-generation network access control system (NAC) to deliver secure access solutions to enterprises and service providers.

    The ideal solution will cover enterprises from every vertical and of all sizes. It will utilise a virtual private network (VPN), network access control (NAC), and mobile security products to enable end-user mobility securely and seamlessly in their organisations.

    An effective and comprehensive next-generation network access control system (NAC) will deliver secure access solutions to enterprises and service providers

    It must deliver secure access solutions for people, devices, things, and services.

    So, net admins need not look despair. Look for a smart network access control (NAC) solution built for the next generation of networks. NAC should make controlling and connecting to network, really simpler. Complete net visibility is ensured with simplified auditing and monitoring of network that is driven across the enterprise.

    A next-generation VPN is a good start. It should blend data centre applications and public cloud services. Easy compliance is a must, to give granular control over who is accessing what, from where, when, and how. End users would like to see the same experience no matter what device they use.

    Clearly a mobile VPN must cover both iOS and android-based devices. A single sign-on is highly desirable for both on-premise systems and cloud solutions. Deployment options should include purpose-built and virtual machine.

    Policy control

    This must make controlling who and what connects to the network simple. Complete visibility is a key here, as it simplifies auditing and monitoring of network devices enterprise wide. Automatic device addition must include features for Windows, Mac, smartphones, and tablets.

    The right solution will address regulatory compliance with the most stringent regulations.

    A unified access control policy should cover wired and wireless connections, personal and corporate devices, and remote and local access. Wizards and templates will take the complexity out of setting up a NAC solution.

    Mobility management

    This needs to balance the right amount of control without invading device owners’ privacy.

    A tool that deploys apps by group via an enterprise app catalogue would be nice, while workspace separation will ensure BYOD user privacy. A cloud-based console would be heavenly.

    To ensure security, certificate-based authentication is essential for enabling automatic access to VPNs and email. Access to unmodified enterprise-approved apps in the Google Play and Apple App stores can enable the use of MS Office and other popular suites.

    Finally, users must be confident that their privacy is not invaded, and their personal data will not be deleted. Find a solution that covers all this functionality and your network worries are over.
    tag

    IoT

    Weekly Brief

    loading
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Digital Transformation: A Journey Beyond Technology

    Digital Transformation: A Journey Beyond Technology

    John Ang, Group CTO, EtonHouse International Education Group
    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Richa Arora, Senior Director Of Data Governance, Cbre
    Transforming Tollways Through People, Data and Digital Vision

    Transforming Tollways Through People, Data and Digital Vision

    Carlo Cagalingan, Chief Digital Officer and Chief Information Officer, Metro Pacific Tollways Corporation
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://servicenow.apacciooutlook.com/cxoinsights/how-to-put-the-net-admin-out-of-his-her-misery-nwid-4429.html