The pandemic has definitely changed the workplace of the future. In fact, a recent survey by Gartner has revealed that 90% of respondents plan to allow their employees to telecommute at least part of the day, even after being vaccinated against COVID-19.
In this new Everywhere Enterprise, networks, applications and data are accessed from anywhere, and employees use multiple devices to access corporate data and services while telecommuting. Although productivity has skyrocketed, this new telecommuting context has significantly increased cyberattacks and has led to the emergence of new security challenges.
Adding to the challenges posed by telecommuting is the fact that employees do not prioritize security, even though cybersecurity threats targeting teleworkers have reached very high numbers. The Consumer Cybersecurity Report 2021 carried out by Ivanti, has revealed that one in four users admits to using their work email or password to log in to web pages and consumer applications, such as food delivery and electronic stores, exposing themselves thus both themselves and their companies.
Working "from anywhere" requires ensuring safety "everywhere." Let's welcome Zero Trust or "zero trust" security.
Simply explained, “zero trust” security allows companies to continually verify every asset and transaction before allowing any type of network access. Verification includes, among other things, strong user authentication, device posture checking, and micro-segmentation of networks. Before granting access, zero trust also considers the entire context of the user's environment, not just disjointed data. For example, if an employee is at the airport, are they trying to access confidential customer information from a company-owned device on a secure corporate network, or do they do so from a personal smartphone using the airport's free Wi-Fi?
With a Zero Trust security model, companies can effectively defend against the leading causes of data breaches, such as credential theft, password reuse, and user spoofing. In addition, when implemented correctly, “zero trust” is capable of protecting the privacy of users' own data, something that has become a growing concern for both users and organizations today.
Context-aware automation is the key to an effective Zero Trust authentication strategy. Automation tools often include critical “zero trust” security features such as continuous device security assessment, role-based user access control, and location awareness. By ensuring that the user and the device are in good health, companies also ensure that valid requests are granted quickly and efficiently to reduce the operational cost of “zero trust”.
With learning, supervised and unsupervised capabilities, companies can proactively and predictively detect configuration drift issues, performance issues, application crash issues, and security vulnerabilities on devices. security, etc., and remedy them before the end user experiences any disruption.
For example, Ivanti Neurons allows the IT department to query all devices with sensor-based technology and natural language processing, obtaining intelligence in real time and in a matter of seconds for the entire company. This provides fast operational insight, real-time inventory, and security settings on all working devices.
Using quality “zero trust” and contextual automation technologies, companies can proactively and predictably detect problems and self-heal and self-protect devices afterward.
Ivanti Neurons customers benefit from a more than 50% reduction in support call times, eliminating duplicate work between IT and security operations teams, and reducing the number of vulnerable devices by up to 50% . Ivanti Neurons customers also reduce unplanned outages by up to 63%, decrease deployment time for security updates by 88%, and resolve up to 80% of working device issues before users have reported them.
Going forward, Zero Trust security offers the most efficient and cost-effective way to secure telecommuting, which is undoubtedly the future of work. Companies must urgently accelerate their transition to “zero trust”, and take advantage of the latest technologies to modernize their security strategies. In addition to significantly reducing the risk of breaches, a Zero Trust strategy offers secure, contextual and personalized user experiences in this new normal.