LateralAccessDevice

takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources | Members | User Guide

Keeping Secrets From Your Computer: Network Segregation With LAD

The environment inside the typical computer network is oftentimes wide open. Everyone knows who everyone else is, any device can address another and no one holds much back. It is all pretty convivial, easygoing and not really a problem, so long as no one has ill intentions.

And there's the rub. We all know that someone (actually many someones) out there have ill intentions. And the wide-open nature of the computer network means that once they get their foot in the door, they have free reign in the house, so to speak. This free and easy atmosphere is especially problematic in the face of the proliferation of a myriad of network-connected devices, which may or may not keep to their own business. It has been shown too many times that so-called "smart" and IoT devices can and do call home autonomously and you can only hope that these communications are limited to software updates. Even if originally innocuous, these little computing devices with communication capabilities are fertile backdoors ripe for exploitation by nefarious actors.

With perimeter security that can be breached from within and without, it is time for a new strategy to prevent the unhindered spread of threats within. The name of the game is network segregation, which is the practice of preventing unchecked communications between the various devices on your network — many of which have no need to communicate with each other anyway. Why would your security camera need to check in with your printer, anyway?

Network segregation with LAD is easy and automatic. Newly connected devices are automatically segregated from every other device and you choose which devices, such as a commonly used printer, are excepted from network segregation and allowed to communicate with others.

Network segregation is particularly helpful on networks that combine devices with different requirements for privacy or security, such as the home network of a telecommuter, who definitely does not wish his or her work computer to mingle with the kids' tablets or gaming console.

Download LAD | Learn More About LAD | LAD for Home | LAD for Business | DIY VoIP PBX

LAD: LateralAccessDevice is software that turns a computer chassis into a high-performance, multi-purpose Internet / network tool that combines multi-dimensional firewalling, network monitoring, access control, packet capture, DNS, NAT and a host of other applications into one easy to use, integrated, high-security package. LAD takes you back to before the Internet!