Protecting Critical Systems

VLANs (Virtual LANs) are a logical grouping of devices in the same broadcast domain. VLANs are usually configured on switches by placing some interfaces into one broadcast domain and some interfaces into another. A VLAN can eliminate the need for expensive routers and isolate sensitive company data. In such cases, placing only those users who can have access to that data on a VLAN can reduce the chances of an outsider breaching security.

 

Learn how a VLAN can protect data

Learn how to protect
critical systems

 

Although each VLAN will be configured to a specific need, in our explainer video, ZAG recommends the following general configuration when setting up a VLAN. Without proper configuration, one infected system can corrupt the entire network and possibly shut down your business. 

topology_without_vlan.jpg

Split networks into at least the following: 

The Production Network, which will host critical systems like file servers, SQL databases, backups, and work stations.

A second network that houses all other systems, including those that run your business such as temperature controls, QA Systems, processing controls, and labeling systems.

topology_with_vlan.jpg

Better network security is one reason to have a VLAN but here are other reasons why your company may want to implement a VLAN.

For instance, a segmented network should be created specifically for any Industrial Internet of Things (IIoT) devices such as those used to monitor, collect, process, and transmit data from a variety of intelligent sensors, devices, or machines. This assures protecting both the internal networks and the IIOT devices that are critical to the business.

The proliferation of sensors and other smart, connected devices has resulted in new security vulnerabilities and additional layers of protection are needed.

Need more information on VLANs or a Security Assessment of your network?
Let ZAG help you.

Talk to one of our Technology Strategists, so we can understand your business needs and goals. 

Name *
Name