Enterprise security in an 'everything, everywhere' world
Is the everything, everywhere, all the time, work ethic destroying secure collaboration in the enterprise?
There can be no doubting that the enterprise information landscape has shifted in the last couple of years, but has your data security strategy also evolved enough to keep up?
Employees using personal cloud tools are fragmenting enterprise content by displacing it from corporate drives onto personal devices, according to the 'State of the Enterprise InformationLandscape Study' (a Huddle report on the fragmentation of the enterprise brain). In effect, critical enterprise data is walking out through the front door as 41 per cent of employees use insecure cloud services and 91 per cent use personal storage devices for work.
Such statistics though should come as no great surprise to anyone working within an IT environment. BYOD in the broadest sense has been a reality for years now. But does always-on, in the broadest sense, mean always-insecure? Have enterprise security strategies really kept pace with 'digital society' for want of a better term?
Jackie Gilbert, CMO and founder of SailPoint, doesn't think so. "The old security approaches are no longer enough," she warns. "Enterprises must change IT processes and adopt new tools that can meet the 24x7 security requirement."
That's the reality of today's always-on IT environment, not that Gilbert is saying that insecurity and digital society are joined at the hip. "Security measures must start with the individual business user identities rather than the devices and applications," she said. "Historically, a high percentage of IT organisations relied on Windows or network security to manage user access to applications and data on-premises." In other words, when an employee left the company the user was removed from Active Directory and VPN access rapidly shut down. "These approaches are no longer enough in the always on world because business users are accessing cloud apps outside the network," Gilbert explains.
"BYOD eliminates Windows-based authentication options because mobile users never log into a Windows-based computer. Authentication strategies must account for a whole new set of user login options in BYOD environments."
In This Article
Preparing for long-term remote working after COVID-19
Learn how to safely and securely enable your remote workforceDownload now
Cloud vs on-premise storage: What’s right for you?
Key considerations driving document storage decisions for businessesDownload now
Staying ahead of the game in the world of data
Create successful marketing campaigns by understanding your customers betterDownload now
Solutions that facilitate work at full speedDownload now