Outside the zone of safety

Every day, businesses worldwide face sophisticated threats to their data and communications networks.
While enterprises continue to invest heavily in hardening their IT infrastructures and enforcing comprehensive and constantly updated security policies against malicious code attacks, another in-house threat – the mobile workforce – is opening the floodgates to compromised enterprise data and corporate network contamination.

While mobile working provides commercial and operational benefits, enterprise security policies frequently suffocate the effectiveness and productivity of mobile workforce devices.

In this article, we will examine why best-of-breed software alone is unable to provide the mobile workforce and their laptops with the same level of security as office-based workers.

Two lines of defense in a corporate environment that is protected
Currently, organizations use a layered approach to anticipate, detect, and prevent threats from laptop attacks.
This is in addition to a centralized, unbending IT policy that trumps an individual’s control over his or her own laptop.
Due to the importance placed on corporate IT governance by IT departments, their primary method of enforcing organizational security policies effectively is through control of all networking components.

When laptop users connect to the Internet via the corporate network, they are protected by two lines of defense:

A comprehensive set of IT security appliances running secure and hardened operating systems, as well as security software such as firewalls, intrusion prevention/detection systems, antivirus, antispyware, antispam, and content filtering, all of which are fully managed by the corporate IT organization.
On the user’s laptop, the user installs and controls personal firewall and antivirus software.
Additionally, when laptops are contained within a secure corporate environment, the IT department of the organization can exercise complete and consistent control over (and visibility into) any device, which is a critical operational consideration. This means that the IT department can:

Consistently update respective laptops with data, policies, and other pertinent information.
Effectively monitor the entire network in terms of the status of all network components.

Outside the zone of safety
When a laptop leaves the enterprise-managed network, the two-line defense system breaks down, as the laptop is no longer protected by the corporate security appliances layer and is entirely dependent on the security software installed on the local operating system.

The roaming laptop is at risk of being attacked by nearby wireless and wireline devices (in hotels, business lounges, airports, WiFi at Internet Cafes, etc.).

These threats represent a threat that extends well beyond the scope of the individual laptop, as intrusive code may proceed to use the laptop as a platform for breaching corporate security once it returns to its base and connects to the network.

Reliance on only the best-of-breed software on the laptop is flawed for the following reasons:

Operating System Inherent Vulnerabilities – By definition, security software that runs on Windows is vulnerable to Windows-specific vulnerabilities, effectively exposing personal firewall and antivirus applications to malicious content attacks.
Unknown Threats – security software is designed to protect against known threats only. It may be too late by the time these threats are added to the knowledge base.
Immediate Damage – malicious content executes directly on the protected platform, rather than on a security appliance designed to filter and buffer the content.
Managing Security Levels – ensuring that all computers have the latest security updates installed and enforcing a unified security policy can be extremely challenging. When computers are on the front lines, these security flaws can have a catastrophic effect on the entire network. In other words, it is “all or nothing,” meaning that either the entire network is secured or it is not.

As a result, many organizations adopt stringent security policies that prohibit the majority of wireless networking options (significantly limiting user productivity and remote computing freedom), or impose stringent, costly, and difficult-to-enforce cleaning procedures for laptops returned from the “field.”

Mobile-optimized best-of-breed software
To address the current vulnerabilities in laptop security, an increasing number of CSOs have chosen to place computers behind a robust security gateway, typically a dedicated security appliance.
Unlike personal computers, these appliances feature hardened operating systems that lack security holes, “back doors,” or unprotected layers. They were created with a single objective in mind: to provide security.
Due to the fact that these security appliances are hardware-based rather than software-based, the following benefits accrue:
Cannot be uninstalled – security attacks frequently begin by attempting to uninstall or disable security software.
Software-based security solutions, as every software program includes a targetable uninstall option.
In comparison, appliance-based security cannot be removed due to the fact that it is hard coded into the hardware.

Memory that is not writable – solutions based on hardware manage memory in a restricted and controlled manner. Access to the memory of security appliances can be restricted, providing additional protection against attacks on the security mechanism.
Through the use of hardware, a comprehensive set of security solutions can be combined into a single device.
Additionally, hardware enables the coexistence of best-of-breed enterprise-class solutions and proprietary developments operating at both the lower and upper levels (e.g. packet and network level, application level etc.).

Additionally, hardware can alleviate the well-known tension between users and IT managers regarding users’ computing freedom.
On the one hand, users desire complete freedom when using computers, while IT managers strive to enforce security policies (e.g. banning the use of P2P software).
IT managers resolve the conflict between the user’s desire for computing freedom and the IT manager’s desire to control and enforce security policies by utilizing a security appliance.
Whereas with software, policy is embedded in the laptop or computer, with an appliance, security policies can be enforced externally to the laptop, allowing the user complete freedom within the secure computing environment.

To summarize, CSOs should consider layered security architecture on a hardware appliance to provide corporate-level security for laptops operating outside of a secure office environment.
A dedicated appliance can house all of the best-of-breed security software and reintroduce the two lines of defense that were previously available on office-based PCs.
By incorporating a security gateway, the damage is contained at the gateway in the event of a security breach.

66 thoughts on “Outside the zone of safety”

  1. Pingback: How To Apply Online For A Job - Hire A Virtual Assistant

  2. Pingback: Expanding Your VAR Enterprise - Hire A Virtual Assistant

  3. Pingback: You Are Still Awaiting The Results Of Your Background Checks. - Hire A Virtual Assistant

  4. Pingback: The Four Secrets To Wealth & Success - Hire A Virtual Assistant

  5. Pingback: Email Marketing The Easy Way - Hire A Virtual Assistant

  6. Pingback: The New Frontier For Your AUP Is Blogging - Hire A Virtual Assistant

  7. Pingback: E-commerce And The Supply Of Drinking Water - Hire A Virtual Assistant

  8. Pingback: Ten Things To Consider Before Purchasing A Business In California - Hire A Virtual Assistant

  9. Pingback: Do Definitions Inform You On How To Improve Your Business? - Hire A Virtual Assistant

  10. Pingback: This Week's International Trade News - Hire A Virtual Assistant

  11. Pingback: Expressing You! - Breathing Life Into Your Presentation - Hire A Virtual Assistant

  12. Pingback: Merchant Accounts For Small Businesses - Hire A Virtual Assistant

  13. Pingback: Processors Of Credit Cards - Hire A Virtual Assistant

  14. Pingback: The Business Analyst's Emerging Role - Hire A Virtual Assistant

  15. Pingback: Critical Considerations That Can Make Or Break Your Business - Hire A Virtual Assistant

  16. Pingback: Google: Page Experience Ranking Algorithm Coming May 2021 - Hire A Virtual Assistant

  17. Pingback: How To Create A Shopping Cart And Integrate It Into A Website - Hire A Virtual Assistant

  18. Pingback: Shop Safely Online - Hire A Virtual Assistant

  19. Pingback: More Proof That Blogs Are Taking Over The World - Hire A Virtual Assistant

  20. Pingback: Ten Pointers For Using Electronic Forms - Hire A Virtual Assistant

  21. Pingback: Where Should Your Blog Be Hosted? - Hire A Virtual Assistant

  22. Pingback: Create Your Own E-commerce Store - Hire A Virtual Assistant

  23. Pingback: Offline Data Recovery Solutions - Hire A Virtual Assistant

  24. Pingback: Newcomers To Online Shopping - Hire A Virtual Assistant

  25. Pingback: ECommerce - A Strategy - Hire A Virtual Assistant

  26. Pingback: All Your Blogging Needs Can Be Satisfied With Blog Software - Hire A Virtual Assistant

  27. Pingback: Choosing An Inventory Software Solution That Is Appropriate For Your Business - Hire A Virtual Assistant

  28. Pingback: You'll Love Ordering Flowers Online For These 10 Reasons - Hire A Virtual Assistant

  29. Pingback: Utilization Of Independent Information Sources - Hire A Virtual Assistant

  30. Pingback: How Do You Pick The Best Website For You? - Hire A Virtual Assistant

  31. Pingback: SMS Marketing: What It Is And How To Get Started - Hire A Virtual Assistant

  32. Pingback: Google: New Deadline For Mobile-first Indexing March 2021 - Hire A Virtual Assistant

  33. Pingback: Top 7 Reasons For Companies To Be Present In The App StoreBetty Lockwood - Hire A Virtual Assistant

  34. Pingback: The Benefits And Drawbacks Of Internet Promotion - Hire A Virtual Assistant

  35. Pingback: 6 Nonprofit Web Design Mistakes To Avoid In 2021 - Hire A Virtual Assistant

  36. Pingback: Consider The Following Before Conducting An Internal Employee Survey - Hire A Virtual Assistant

  37. Pingback: The Parallels Between Economic Growth And The Growth Of Construction Equipment - Hire A Virtual Assistant

  38. Pingback: How To Implement Credit Card Acceptance In Your Business - Hire A Virtual Assistant

  39. Pingback: Google: We’ll Pick The HTTPS Version Of Your Website If It Is Also Available With HTTP - Hire A Virtual Assistant

  40. Pingback: The Internet Is Ruled By Sticky Sites - Hire A Virtual Assistant

  41. Pingback: Better Mobile Search Engine Optimization - Hire A Virtual Assistant

  42. Pingback: In Australia, Online Shopping Is A Craze. - Hire A Virtual Assistant

  43. Pingback: Loading Time, Your Web Pages, Your Search Engine Rankings, And Your Bottom Line - Hire A Virtual Assistant

  44. Pingback: How To Get Rid Of Pop-Up Ads: Reclaim Your Home Court Advantage - Hire A Virtual Assistant

  45. Pingback: Google: Redirect M.dot Subdomain URLs After Deleting Them - Hire A Virtual Assistant

  46. Pingback: A Global Industry Of Significant Size - Hire A Virtual Assistant

  47. Pingback: New In SEOprofiler: Even More Keyword Suggestions For The Ranking Monitor - Hire A Virtual Assistant

  48. Pingback: Text Messages Are An Ecommerce Opportunity - Hire A Virtual Assistant

  49. Pingback: 5 Reasons Why Choosing The Correct Point Of Sale Equipment Increases Profits

  50. Pingback: 13 Favorite Productivity Apps For 2020 - Hire A Virtual Assistant

  51. Pingback: Mobile Site Design Impacts Organic Search Rankings - Hire A Virtual Assistant

  52. Pingback: Do You Need A Retail Merchant Account? - Hire A Virtual Assistant

  53. Pingback: Acquire A Merchant Account For Credit Cards - Hire A Virtual Assistant

  54. Pingback: ArcStone Wins Two Golds Horizon Interactive Awards - Hire A Virtual Assistant

  55. Pingback: Running A Mobile To Desktop Parity Audit - Hire A Virtual Assistant

  56. Pingback: How To Optimize Your Website Mobile Experience For Conversions - Hire A Virtual Assistant

  57. Pingback: Clienteling Personalizes In-store, Online Shopping - Hire A Virtual Assistant

  58. Pingback: Get Ready For Digital-first Credit Cards - Hire A Virtual Assistant

  59. Pingback: 4 Payment Methods To Integrate For The Holidays - Hire A Virtual Assistant

  60. Pingback: Ten Things To Consider Before Purchasing Bluetooth Headsets - Hire A Virtual Assistant

  61. Pingback: ‘Payment Request API’ To Streamline Ecommerce Checkouts, Improve Security - Hire A Virtual Assistant

  62. Pingback: Video Conferencing: A Cost-Effective Solution To Rising Fuel Prices - Hire A Virtual Assistant

  63. Pingback: 15 Mobile Payment Systems For Merchants - Hire A Virtual Assistant

  64. Pingback: Top 5 Mobile Page Speed Fixes - Hire A Virtual Assistant

  65. Pingback: Sales Report: 2020 Thanksgiving Day, Black Friday, Cyber Monday - Hire A Virtual Assistant

  66. Pingback: Apple’s IOS 15 Will Change Email Marketing - Hire A Virtual Assistant

Leave a Comment

Your email address will not be published.