The New Security Demands Of Our Hybrid Working Future 

For technology leaders around the world, one of the silver linings of the pandemic was that it acted as an accelerant for digital transformation. While the disruption was mercifully temporary, some of the coping mechanisms deployed by businesses to get through it are likely to persist as we emerge into a post-pandemic landscape.

One of those mechanisms is hybrid working, which has now had the chance to prove its worth in the biggest remote working experiment in history. According to Statista, more than two-thirds of business leaders are now planning to reconfigure their office space to accommodate hybrid working permanently, and 73% of employees say they want flexible, remote work options to stay as a condition of their employment. The imperative is there, and businesses are already making adjustments to their physical and digital infrastructure, but what about security? 

Network Security In The New Normal

The shift to remote networking over the course of the past 24 months has been nothing short of profound. Nonetheless, the rapid move to remote-enabled working has been driven by necessity rather than natural innovation within the market, and that means some businesses are not adequately prepared in terms of their security setup. Remote user access has become the new normal, offering greater agility and arguably better productivity, but that means legacy security solutions like static firewalls and basic VPNs (virtual private networks) are no longer fit for purpose.

Organizations are now “hyper distributed”, with applications everywhere and networks branching off in all directions.

Some may have embraced SD-WAN (software-defined wide area networking) as a means of efficiently routing traffic and increasing the QoE (quality of experience) for users, but even SD-WAN on its own has security limitations that need to be separately addressed. 

Given the sheer pace of change, it is understandable that businesses would prioritize productivity over network security in the short term, but that short-term fix is now blending into a long-term solution, and businesses need to re-evaluate their security as a result. Traditionally, a patchwork approach to security has led to a disparate array of siloed solutions, from email and browser security, right through to WAAP (web app and API protection), firewall-as-a-service, remote-access VPNs, and more. The challenge now is to consolidate these multiple product points in a unified and cohesive security package, and that’s where SASE comes in. 

The Continued Rise Of SASE Network Security

Secure Access Service Edge (or SASE) has been quietly reframing how large organizations handle their security for years, but it is only since the mass shift to hybrid working that it has become relevant for nearly all businesses. What SASE does is converge security and network technologies into a single, cloud-delivered platform that is easy to scale and that facilitates rapid cloud transformation. Geographical borders and physical spaces are becoming less relevant to today’s businesses, so it makes no sense for network security to be centralized in the traditional sense. With SASE, security is moved closer to the edge where applications, users and end-points are located, resulting in an agile, unified, low-latency solution that puts user experience, network performance and network security on an equal footing. The next step is for businesses to connect the security solutions that exist across users and devices in order to eliminate any potential security gaps. 

Combining SASE With Advanced Threat Prevention

Even when rolling out a SASE solution, businesses need to be mindful of their overall security posture. The more distributed its users, and the more devices that connect remotely, the greater the potential attack surface area for threat actors. Keeping this attack surface limited and protected is arguably one of the biggest challenges facing businesses today. Check Point’s 2022 Workforce Security Report refers to this as the “remote-access security gap”, in which 70% of organisations allow access to corporate applications from personal devices. According to the report, only 5% of businesses use all of the recommended remote access security settings when preparing to facilitate hybrid working. 

What’s more, these challenges are emerging at one of the worst possible times for businesses, with cyber attacks against corporate networks increasing dramatically. As well as thinking about centralised networks, businesses now have to consider things like endpoint resilience, their vulnerability to mobile-related attacks, remote working security policies, and even how well applications such as Office 365 or G-Suite are protected in real-time.  

Check Point Harmony is the industry’s first truly unified SASE security solution with a core focus on threat detection and prevention.

Not only does it ensure zero-trust access, it’s powered by an advanced real-time threat intelligence platform that can protect devices and internet connections from the most sophisticated cyber-attacks. Instead of stitching together security solutions to cover various endpoints and channels, Harmony unifies clientless connectivity, endpoint security, email security, internet browsing, mobile security and remote VPN access, under a single, unified umbrella.

The result is that sensitive data and users are protected whether at home, in the office or on the move, regardless of how they log on or what device they use. 

Ian Porteous is Regional Director, Security Engineering, UK&I at Check Point Software

You Might Also Read:

The Value Of Network Pen Testing To Reduce Cyber Attacks:

 

« Facebook To Pay $90m Penalty For Tracking Users
Financial Services, Online Banking & Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Anvilogic

Anvilogic

Anvilogic provides a unifying experience for security professionals aimed at providing improved visibility, enrichment, and context across hundreds of alerting datasets and security tools.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

Sekoia.io

Sekoia.io

Sekoia.io is a European cybersecurity company whose mission is to develop the best protection capabilities against cyber-attacks.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

TeKnowledge

TeKnowledge

TeKnowledge enables governments and enterprises around the world to navigate the challenges with digital transformation today and tomorrow with elite cybersecurity protection and managed services.