You don’t need more boxes

By
Follow google news

Administrators now realise that deep cultural change is needed to counter this next challenge.

The growth of flexible working is leading inexorably to the 'office anywhere' model. There will be no constraints on how, when or where we choose to work. Already, mobile workers take their laptops out into the utopian world of customer contact via the luxury of a coffee shop sofa. But very few do it securely.

You don’t need more boxes

Administrators now realise that deep cultural change is needed to counter this next challenge. The traditional perimeter defence of corporate networks is no more. It now extends through any number of hotels, airports and cafés.

Many firms attempt deperimeterisation by throwing more technology, boxes and secure connections at the problem, in the vain hope of creating an ever-expanding safe environment. But this usually brings only more cost and complexity with, ultimately, little improvement.

Many of the challenges in provisioning and supporting remote workers can be fixed by articulating, enforcing and reviewing corporate mobile usage policies. The big question is how? There is an unconventional answer.

Every mobile worker uses the internet to function. This offers the perfect mechanism to deliver and enforce endpoint security policies. It provides a ready-made deployment, administration and reporting platform that can be controlled centrally, but managed remotely.

Organisations do not need to buy more technology, they can use existing architecture. Endpoint security clients can manage user activity and protect at the same time.

There is a delicious irony that, when many analysts believe that 'in the cloud'-type services will become the de-facto method to secure endpoints, organisations may have their security policies delivered and enforced by the one thing they have spent the best part of 20 years protecting themselves against – the internet.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Telstra used ConnectID impermissibly for months

Telstra used ConnectID impermissibly for months

Two US cyber experts plead guilty to cooperating with ALPHV Blackcat

Two US cyber experts plead guilty to cooperating with ALPHV Blackcat

Murray Irrigation landholder data accidentally leaked

Murray Irrigation landholder data accidentally leaked

Three spyware-linked executives removed from US sanctions list

Three spyware-linked executives removed from US sanctions list

Log In

  |  Forgot your password?