How parallel networking improves retail network security

Ken Hosac

Isolating an Application on a Parallel Network Protects Against Attacks on Sensitive Data

Enterprise networks have more nooks and crannies than ever before, which is why the legacy methods of network segmentation no longer are sufficient.  The traditional monolithic network architecture is vulnerable to attacks that start in seemingly unimportant areas of the network before pivoting into parts containing sensitive data. When an attack occurs, the short-term loss of business, as well as long-term reputational damage, can be substantial.

One of the best ways to boost retail network security at the WAN edge is to leverage a separate router to move a specific application — such as digital signage or customer WiFi — off the enterprise network and onto a completely separate Parallel Network dedicated to that application.

Why Would a Retail Enterprise Create Parallel Networks?

According to Gartner, by 2020, 100 percent of large enterprises will need to report to their board of directors on cyber security and technology risk. And between 2014 and 2015, there was a 38% jump in security incidents detected. Privacy Rights Clearinghouse also reports that retailers in the U.S. have lost a reported 300 million customer records to hackers.

Traditionally, a company’s IT department might need eight or nine months to conduct a security review for a new application that the executives want to add to the enterprise network. However, as the speed of new technology development continues to increase, this kind of delay can be costly. A retailer interested in implementing digital signage, for example, can instead quickly set up a separate network using 4G LTE that doesn’t require access to or use of the primary enterprise network. New, innovative technologies can be deployed quickly and securely via Parallel Networks.

This type of agility allows retailers to move more rapidly from proof of concept to actual implementation. Technologies such as capture rates, which track and analyze how many customers walk by a storefront versus how many actually come through the door, are helpful for marketing and operations. Capture rates allow an enterprise to gauge how different window displays affect customer behaviors. If a retailer wanted to deploy this kind of new technology on the primary enterprise network, doing so would be difficult and time-consuming because of the needed security reviews. In contrast, with Parallel Networking, new technologies can be implemented quickly, securely, and cost-effectively.

How Does Parallel Networking Improve Network Security?

Unauthorized users are essentially looking for any possible way into an enterprise network. It is important to recognize that, while attacks can be difficult to stop, businesses can still minimize access and the damage that would occur if an attack were to take place.

Traditional network challenges include an increased attack surface and an increased use of public Internet (through factors such as higher numbers of mobile workers and an onslaught of IoT devices). Also, traditional VPNs are fragile and inflexible, with complex configurations and extended time needed to deploy.

In contrast, with Parallel Networking, companies physically segmenting enterprise networks into “air-gapped” security zones. Essentially, Parallel Networking breaks up the access a hacker can gain if security mechanisms fail. If an unauthorized user is somehow able to access a digital signage network, for example, they will not be able to access other areas — as could happen if they were to access the main enterprise network.

Additionally, a retail company might have physical security staff who need access to security cameras, inventory management staff who need access to sensors and scales on shelves, and PCI Compliance staff who need access to POS data. Instead of having each team conduct business over the primary enterprise network, IT administrators can use Cradlepoint’s NetCloud Perimeter on routers or directly on IoT devices to instantly set up private overlay networks. IT staff can easily micro-segment users, devices, groups, applications, and resources with simple policies in a matter of minutes, without needing detailed knowledge of command lines or complex on-box configurations.

Key Benefits of Parallel Networking in Retail

Parallel Networking provides many benefits to retailers, including the ability to:

  • Deploy technologies without taking up bandwidth.
  • Utilize plug-&-play connectivity.
  • Implement enterprise-grade security.
  • Connect in essentially any location.
  • Ensure all applications are supported.
  • Limit time and expertise needed to segment networks or for complete network configurations.
  • Limit time spent maintaining PCI Compliance.

Webinar About Parallel Networking

To learn more about how Parallel Networking can increase your retail network security while also providing a faster, more agile and cost-effective solution, watch our on-demand Parallel Networks webinar.

You might be interested in

Does your agency have a continuity plan?

Does your agency have a continuity plan?

How to keep public safety and election operations running when emergencies arise Public sector agencies provide critical services and perform essential functions that citizens depend on every day as well as during emergencies. Continuity plans ensure that the essential functions of agencies stay operational if a natural or manmade emergency should occur. While it’s difficult […]

Security at the network edge is a year-round endeavor

Security at the network edge is a year-round endeavor

Cradlepoint offers security features that help protect branch, mobile & IoT networks Our first Cradlepoint Security Week has come and gone. We had some great conversations, learned a lot, and enjoyed sharing what we know about security at the network’s edge with you. When we planned this weeklong conversation about network and data security, we didn’t know how […]

Context matters: turning data into threat intelligence

Context matters: turning data into threat intelligence

Guest Post Written By Webroot 1949, 1971, 1979, 1981, 1983 and 1991. Yes, these are numbers. You more than likely even recognize them as years. However, without context you wouldn’t immediately recognize them as years in which Sicily’s Mount Etna experienced major eruptions. Data matters, but only if it’s paired with enough context to create meaning. […]