Companies today need to pay particular attention to the way they process, manage, store and exchange data.
This vigilance applies both to internal-to-internal exchanges, and to internal-to-external exchanges.
To be among those who have nothing to fear in terms of IT network security, companies are investing.
And as we remind you in this blog article, cloud computing is on the rise, and companies need to take this data migration as seriously as possible.

IT network security - Research at Google

The complexity of securing an internal network: whispers from Google

There are many different types of IT network.
Managed internally or externally, for private/closed (company) or public/open (customers, employees…) use, these IT networks are likely to become more and more powerful.
Until yesterday, it was a fairly safe assumption that a company protected by a firewall had a largely secure internal network.
But that was before.
Indeed, this truth, which sounded obvious, has been somewhat shaken up by revelations from Google, which is taking a keen interest in the security and securing of corporate data.
At the end of 2014, it was the beginning of the end for secure networks, following the warning issued by Google about the complexity of securing an IT network, and the expression of its doubts about the effectiveness of firewalls.
Its argument is simple: once the firewall is penetrated by the employees themselves in the IT network, it is de facto weakened.
And when you admit this possibility, it’s hard not to want to do more and better to secure your data.

A security key for every company door

To optimally secure an IT network, you need to be able to give access to what is useful to each of the participants, and only to that, on the sole condition of using a device equipped with this identification process.
So, if everyone has a “key to the door”, or more precisely, access to the network formatted according to his or her user profile and identifiers, and above all according to the equipment he or she is using, this will limit unauthorized access and the risk of data piracy, extraction or theft.
So Mr. ABC won’t be able to access his data from Ms. EFG’s post, and vice versa, even if both people have identical access levels.
These are all promises that BeyondCorp, Google’s proposed model for countering the shortcomings of conventional security parameters, aims to keep.

Towards the end of secure networks, for ever more clouds

To test its method, Google has chosen to apply it for the Google company, enabling it to develop the process as it sees fit, always with the aim of strengthening data security.
It’s still difficult to predict the future and to say that tomorrow, a company will no longer want a secure network.
But the BeyondCorp method is the envy of many.
It’s easy to imagine that other big names in IT are working on the same subject…