Enterprise security in an 'everything, everywhere' world
Is the everything, everywhere, all the time, work ethic destroying secure collaboration in the enterprise?
There can be no doubting that the enterprise information landscape has shifted in the last couple of years, but has your data security strategy also evolved enough to keep up?
Employees using personal cloud tools are fragmenting enterprise content by displacing it from corporate drives onto personal devices, according to the 'State of the Enterprise InformationLandscape Study' (a Huddle report on the fragmentation of the enterprise brain). In effect, critical enterprise data is walking out through the front door as 41 per cent of employees use insecure cloud services and 91 per cent use personal storage devices for work.
Such statistics though should come as no great surprise to anyone working within an IT environment. BYOD in the broadest sense has been a reality for years now. But does always-on, in the broadest sense, mean always-insecure? Have enterprise security strategies really kept pace with 'digital society' for want of a better term?
Jackie Gilbert, CMO and founder of SailPoint, doesn't think so. "The old security approaches are no longer enough," she warns. "Enterprises must change IT processes and adopt new tools that can meet the 24x7 security requirement."
That's the reality of today's always-on IT environment, not that Gilbert is saying that insecurity and digital society are joined at the hip. "Security measures must start with the individual business user identities rather than the devices and applications," she said. "Historically, a high percentage of IT organisations relied on Windows or network security to manage user access to applications and data on-premises." In other words, when an employee left the company the user was removed from Active Directory and VPN access rapidly shut down. "These approaches are no longer enough in the always on world because business users are accessing cloud apps outside the network," Gilbert explains.
"BYOD eliminates Windows-based authentication options because mobile users never log into a Windows-based computer. Authentication strategies must account for a whole new set of user login options in BYOD environments."
In This Article
B2B under quarantine
Key B2C e-commerce features B2B need to adopt to surviveDownload now
The top three IT pains of the new reality and how to solve them
Driving more resiliency with unified operations and service managementDownload now
The five essentials from your endpoint security partner
Empower your MSP business to operate efficientlyDownload now
How fashion retailers are redesigning their digital future
Fashion retail guideDownload now