Branch office security resolved

September 2010 Cyber Security

Branch office security does not have to be a cost guzzler.

When it comes to IT security, almost all businesses using IP networks to transmit data will know that they have to protect themselves and they will have systems in place to keep their data secure. However, this is often focused at the head office.

For workers that are not located at the central office, whether this is a branch office environment or a remote worker at home, the question of security is a harder one to answer. It also affects IT security thinking in general, how should I keep these remote locations secure and what problems are there around managing this?

Support and security of such branch office environments can be a significant challenge if not approached correctly. The two primary challenges are implementing business policies and managing branch office IT.

The first area to consider is how to manage many branch networks efficiently. Because each branch office is small, it will typically not have any on-site IT staff available to support users if something goes wrong. The emphasis therefore has to be on how the central IT department can provide this support and security.

The typical branch office environment often needs the same functionality as the head office when it comes to security, a firewall, VPN, IPS, Web and e-mail security are all just as important to remote workers as those at headquarters. For the central IT team, committing human resources to an implementation or upgrade can be very expensive, especially when dealing with multiple offices.

If you are starting a new branch office, being able to control and manage an update to security systems centrally, without having to put an engineer on the road for several days, provides a far better return on investment and much lower costs. Pre-configuring each system at the head office is one approach, but in most cases adjustments must be made on-site. This leads to a different configuration in each location, which makes it hard to keep track. Dedicated solutions for central management exist, but are expensive and often very complex.

Another approach to solve this problem is to use a kind of thin client approach for security. Instead of running firewall, VPN, IPS, Web and e-mail security functions on an expensive branch office device all functions are provided via a centralised security gateway which can sit in the head office or in the cloud. A small remote Ethernet device in the branch office only forwards all traffic to the central device where it is scanned and filtered, before it is sent to the Internet.

Another point to consider around IT usage policies is that bandwidth at the branch office may be more limited. Branch office environments tend to be smaller, so typically the Internet connection into the building will be smaller; there may also be only one network connection into the site. This may mean that rules on site access and surfing may have to be stricter, to ensure that all the bandwidth available is being used for business purposes and that the central IT team is able to support users properly.

For more information contact Biodata IT South Africa, +27 (0)11 234 3650,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber futures in 2020
Issue 1 2020 , Cyber Security
MJ Strydom, managing director of cybersecurity specialist company, DRS, discusses what can be expected in 2020.

Seven security trends for 2020
Issue 1 2020 , Cyber Security
What challenges await the security professional in 2020? Lukas van der Merwe looks at the trends for the year ahead.

Security is not a single product solution
Issue 1 2020 , Cyber Security
Adopting a phased approach to security allows companies to develop a layered security posture to help control costs as well as the complexity.

From physical security to cybersecurity
Access & Identity Management Handbook 2020, Genetec , Cyber Security, Security Services & Risk Management
Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.

Minding the gaps to protect industrial PLCs from cyber threats
November 2019, AVeS Cyber Security , Cyber Security
PLCs, designed to control machinery and specific processes, were never built with cybersecurity threats in mind and protecting PLCs against these threats requires healthy isolation from the Internet.

African trust centre launches cyber division
November 2019 , Cyber Security
Advancing cybersecurity to more stringent heights, LAWtrust has launched a new division focusing on cybersecurity services to complement its identity, encryption and digital signature offerings.

What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Protecting the outer perimeter with cloud services
November 2019 , Cyber Security
Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services.

Information security outsourcing service
November 2019, Condyn , Cyber Security
SearchInform launches information security outsourcing service for companies that face the problem of corporate fraud and data leakage.

Block threats before they target your business
November 2019 , Cyber Security
The antivirus solutions of a decade ago are woefully inadequate weapons in the fight against today’s complex threats.