itb-nz logo
Story image

How flexible identity systems support mobile working – Ping Identity

21 Jun 2019

Article by Ping Identity APAC chief technology officer Mark Perry

In 2019, the office is wherever your workers are and, wherever they are, it’s likely they’re going to need to connect to the corporate network, ideally using devices that allow them to do so securely.

For many enterprises, it’s time to rethink traditional cybersecurity practices and consider how this is best done.

Increased time outside of the official workplace has become the reality of working life for employees in a rapidly digitising economy.

A study published by International Workplace Group in 2018 found almost half of all Australian employees worked remotely for at least 50% of the week, while more than two-thirds spent at least one day a week off-site.

There are benefits aplenty for companies which embrace mobile working arrangements. They include the opportunity to reduce office space and overheads and the enhanced productivity of employees who appreciate being able to cut their commute times and enjoy a better work-life balance – and who are more likely to stick around for longer as a result.

Making mobile working more secure

While the benefits of mobile working are compelling, it’s a modus operandi which can present a challenge for cybersecurity professionals accustomed to approaching corporate network protection in a traditional way.

Throwing a virtual cordon around the enterprise becomes less effective when employees are dispersed and critical systems are running, not in the corporate data centre but offsite in the cloud, as increasingly they are in both the public and private sectors.

What’s needed is a flexible solution which makes it possible for employees to access core systems, anywhere, any time and from any device, without compromising the security of corporate software and customer data.

The zero trust approach

Implementing a zero-trust environment can be that solution.

The term ‘zero trust’ is used to refer to a security model which works on the premise that no individual or system requesting network access should be trusted by default.

The requirement to verify identity is extended to those operating inside the network, as well as outsiders seeking access.

In such an environment, everything has an identity – users, applications, services and systems – and every user, device and network flow must be authenticated and authorised.

Once the appropriate infrastructure is implemented, every application and service is potentially reachable by every other one, regardless of physical location.

Identification that works

Being able to establish and validate identities in a secure manner is the key to establishing a zero-trust environment which can provide an enterprise with the same rigorous protection that perimeter security typically delivered, a decade or two ago.

There are a number of means by which this can be achieved – think identity proofing, the issuing of secure certificates and multi-factor authentication.

Machine learning-powered authentication solutions can make the process simpler and more streamlined.

They’re able to remove unnecessary authentication steps when confidence is high that a user is who they purport to be.

They also have the capability to analyse access patterns to detect botnet and data exfiltration attacks and deny access when these appear to be occurring.

While technology plays the lead role in ensuring individuals and systems attempting to access the corporate network are bona fide, it works best when augmented by regular security awareness training for staff.

Recent times have seen phishing attacks become more sophisticated.

A modest investment in employee education is the best way to ensure workers don’t negate their employer’s investment in security technologies by inadvertently giving their credentials away to hackers and cyber-criminals.

Time to act: why businesses should get serious about protecting their mobile workforces

It’s official: mobile working is no longer an unusual, occasional or experimental practice.

It’s gone mainstream and it’s here to stay.

Companies that don’t offer their employees the opportunity to work remotely, where practicable, may find themselves at a competitive disadvantage to those that do.

However, organisations that allow workers to go mobile without implementing commensurate security measures lay their enterprises open to the very real risks of cyber-compromise or crime and the serious economic consequences that can come in their wake.

Implementing a flexible and stringent security environment, underpinned by robust identity management technology, is key to ensuring systems and data are not compromised.

Story image
Cohesity announces huge increase in valuation, goes deeper with partners
The company saw year-over-year (YoY) growth in annual recurring revenues (ARR), a continued surge in customer wins globally, and a rapidly increasing number of customers spending $5 million or more in total lifetime spend on Cohesity software.More
Story image
Why organisations should rethink the approach to retail demand planning and forecasting
Why organisations should rethink the approach to retail demand planning and forecastingMore
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
Why better API monitoring is critical for achieving quality customer service
To optimise the complete service delivery and maintain an excellent digital experience, it’s essential to consider how the APIs perform, writes ThousandEyes principal solutions analyst ANZ Mike Hicks.More
Story image
Reaping the rewards of data analytics: What are the adoption challenges holding us back? 
“Instead of requiring people to change their habits and leave their workflows to get insights, infusing the data and actionable intelligence directly where users need it most is the key driving better business outcomes.”More
Story image
Ingram Micro offers huge discounts on Lenovo ThinkPads
Lenovo ThinkPads have long been the definition of a staple notebook More