In-depth

Enterprise security in an 'everything, everywhere' world

Is the everything, everywhere, all the time, work ethic destroying secure collaboration in the enterprise?

There can be no doubting that the enterprise information landscape has shifted in the last couple of years, but has your data security strategy also evolved enough to keep up?

Employees using personal cloud tools are fragmenting enterprise content by displacing it from corporate drives onto personal devices, according to the 'State of the Enterprise InformationLandscape Study' (a Huddle report on the fragmentation of the enterprise brain). In effect, critical enterprise data is walking out through the front door as 41 per cent of employees use insecure cloud services and 91 per cent use personal storage devices for work.

Advertisement - Article continues below

Such statistics though should come as no great surprise to anyone working within an IT environment. BYOD in the broadest sense has been a reality for years now. But does always-on, in the broadest sense, mean always-insecure? Have enterprise security strategies really kept pace with 'digital society' for want of a better term?

Jackie Gilbert, CMO and founder of SailPoint, doesn't think so. "The old security approaches are no longer enough," she warns. "Enterprises must change IT processes and adopt new tools that can meet the 24x7 security requirement."

That's the reality of today's always-on IT environment, not that Gilbert is saying that insecurity and digital society are joined at the hip. "Security measures must start with the individual business user identities rather than the devices and applications," she said. "Historically, a high percentage of IT organisations relied on Windows or network security to manage user access to applications and data on-premises." In other words, when an employee left the company the user was removed from Active Directory and VPN access rapidly shut down. "These approaches are no longer enough in the always on world because business users are accessing cloud apps outside the network," Gilbert explains.

Advertisement
Advertisement - Article continues below

"BYOD eliminates Windows-based authentication options because mobile users never log into a Windows-based computer. Authentication strategies must account for a whole new set of user login options in BYOD environments."

Advertisement

Most Popular

Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020
Visit/security/privacy/355211/google-releases-location-data-to-showcase-effectiveness-of-coronavirus
privacy

Google releases location data to show effectiveness of coronavirus lockdowns

3 Apr 2020