What security measures should businesses prioritize to support secure remote work?
With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?
In our company, we use only company devices for workers at home and VPN appropriate clients to control the internet flows towards our company firewall.
A behavioral endpoint product is recommended. This product is likely to cooperate with your corporate signature-based antivirus.
Any good product could be used in that way. We chose well known Israel products, combined with our standard US products, at that time.
Community Manager at a tech services company with 51-200 employees
Community Manager
Oct 6, 2020
@Philippe Panardie Thanks for your input! I agree that there isn't one answer. Do you have recommendations of specific solutions that companies should consider?
Security is a multi-layered problem and as always the human end is the weak layer
Increasingly I believe the human layer-layer8 needs more attention. This requires getting the basics right. How are we allowing external devices into our networks? DO we own these devices? VPN Tunnels?
Or are creating a virtual working place and focus on IAM?
This is BYOD on steroids and multiplies the attack zone. A line has to be drawn and a Trust Zone created. Traditional devices have native encryption so we allow them as trusted devices and use their native encryption. Then other policies are made. Does the employee have access to good internet(In Africa this is an issue) or do they have to go to a coffee shop or some such place? A good behavioral endpoint product will help. In some cases a company intranet. Microsoft teams are proving very accessible in Africa.
A business endpoint is any device (such as mobile phone, desktop, laptop, tablet, server, or any virtual environment) that is physically an endpoint on a business’s enterprise computer network.
There is not a single answer.
In our company, we use only company devices for workers at home and VPN appropriate clients to control the internet flows towards our company firewall.
A behavioral endpoint product is recommended. This product is likely to cooperate with your corporate signature-based antivirus.
Any good product could be used in that way. We chose well known Israel products, combined with our standard US products, at that time.
@Philippe Panardie Thanks for your input! I agree that there isn't one answer. Do you have recommendations of specific solutions that companies should consider?
Wearing a mask while accessing your service is not a joke hardening tunneling protocols and uses the most updated one it's kind of like wearing masks.
@Omer Mohammed great analogy!
Security is a multi-layered problem and as always the human end is the weak layer
Increasingly I believe the human layer-layer8 needs more attention. This requires getting the basics right. How are we allowing external devices into our networks? DO we own these devices? VPN Tunnels?
Or are creating a virtual working place and focus on IAM?
This is BYOD on steroids and multiplies the attack zone. A line has to be drawn and a Trust Zone created. Traditional devices have native encryption so we allow them as trusted devices and use their native encryption. Then other policies are made. Does the employee have access to good internet(In Africa this is an issue) or do they have to go to a coffee shop or some such place? A good behavioral endpoint product will help. In some cases a company intranet. Microsoft teams are proving very accessible in Africa.