openPR Logo
Press release

Protecting your Roaming Workforce with Cloud-Based Security How to use the cloud to enable BYOD and secure endpoints beyond your perimeter

09-05-2014 06:45 PM CET | IT, New Media & Software

Press release from: Sophos

By Gerhard Eschelbeck, CTO, Sophos

Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority—security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device). You need to constantly update employee security software and scan their systems for viruses without reducing their productivity. So how can you empower remote and roaming employees with the tools they need, while still protecting your computing resources and proprietary data, and without busting the budget or hiring an army of security specialists? This paper looks at BYOD security challenges posed by employees working beyond the company's secure perimeter, and proposes a transition to a cloud-based security service.

The borderless work environment
Not long ago, securing computing resources was simple and straightforward: build a solid network perimeter with a strong firewall, add host intrusion prevention, and authenticate everyone who enters. Now, companies are reaping the benefits of a mobile workforce that operates increasingly outside the network perimeter. According to Forrester Research, these high-risk mobile workers create the most value for your company. In today's anytime, anywhere, any-device work environment, the new perimeter is the security software on employee laptops and mobile devices. Some of this software is difficult to update while the users are outside the office, requiring VPN connections for access and large update files that slow down an already spotty connection.

Five security risks of a roaming BYOD workforce—and tips to resolve them

Risk 1: Out-of-date software and policy
One common complain among traveling employees is that their security software and policy slips out of date while they work away from the office. When they return, their non-compliant systems are blocked from accessing the network, and all productive activity grinds to a halt while their computers download security updates and apply the latest policy. The old “layered security” approach that combined network security with local device configuration and security software maintenance simply doesn’t work. Effective protection requires a way to automate security policy configuration, threat updates and enforcement for laptops that are outside of the network than inside—whether they are connected in airports, hotels, coffee shops, remote offices or employees' homes. Tip: Choose a cloud-based security subscription service that offers secu-rity software and policy updates anywhere without slowing down users.

Risk 2: Personal browsing on company computers
Most employees are well-intentioned and security-conscious, but as the lines between work life and personal life continue to blur, it's understandable that they use work systems for personal tasks. Personal browsing and social media use on mobile devices creates insidious new social engineering opportunities, which cybercriminals are only too happy to exploit. Facebook, LinkedIn, Twitter and other social networking sites make it easy for employees to connect with friends, family and peers. Unfortunately, unsuspecting friends and co-workers may click on malicious links they believe to be from trusted acquaintances. Companies with rigid polices banning these sites report only marginal success as many employees either ignore the policies or find ways around them. A more pragmatic solution is to block web threats using an effective web-filtering solution.Tip: Take advantage of security software web filtering capabilities that block malicious and web-borne threats before they reach the computer, as well as enforce proper usage policy.

Risk 3: Exposing sensitive data
Enabling BYOD is a must in today’s business environment, and securing proprietary data should therefore be another major priority. Customer lists, account numbers, marketing and business plans, and other sensitive data likely reside on employee notebooks and mobile devices. What happens to that sensitive data if the mobile devices are lost or stolen? An easy-to-manage encryption solution and mobile device management are recommended to keep data safe in a BYOD world. Tip: To protect data and ensure compliance, be sure that your security solutions encrypt data on multiple platforms including both Windows and Mac. Select a single solution that gives you visibility into all the devices your remote users are using, including Windows or Mac laptops and mo-bile devices.

Risk 4: Mobile workers in charge of their own security
Making end users responsible for security is like putting the sales organization in charge of accounting. Security is not the average employee’s top priority or core competency. Many struggle with technology and few can install, configure, update, and properly use security software. Even if mobile employees are capable of performing security tasks, who wants them spending time securing systems rather than doing their jobs? In the BYOD era, many employers choose to bring their mobile devices to work. Don’t make the mistake of allowing your end users to be in charge of their own security. Tip: Security must be transparent to users and reduce the burden of IT admins by selecting a solution that will protect Windows and Mac com-puters equally with a single policy.

Risk 5: Unsecure storage devices
USB devices often contain sufficient storage space to easily accommodate massive amounts of data. They are produced for consumer use, lack inherent security, may be difficult to manage, and are easily misplaced. Industries with high compliance requirements such as healthcare, insurance and financial services may restrict the use of such devices. Even if industry standards don’t apply, utilization policies and monitoring may be advisable. Tip: Monitor USB device usage across the business, and deploy a realistic device control policy. Consider encryption solutions to ensure that any data stored on these mobile storage units is protected.

Why the cloud is the perfect fit for today's businesses
Cloud-based, cloud-managed security solutions are transparent for end users and simple for administrators. They protect data and endpoints by focusing on individual users, with policies that follow them across systems, Windows, Mac and mobile devices —wherever they go. With a Cloud solution, security becomes far easier to use, deploy and manage with one convenient, cloud-based management console that's available from any computer with a browser. Upgrades are automatic, coverage is everywhere, and it doesn't require complicated server setup or infrastructure maintenance. This simple, pay-as- you-grow, subscription-based service is a cost-effective way to protect your business.
Modern Cloud solutions deliver comprehensive, cloud-based protection as a service that includes state-of- the-art, advanced anti-malware, web security, web filtering and mobile device management. Moreover it:
• Secures Windows and Mac computers as well as mobile devices
• Protects users from infected websites
• Allows admins to set safe and acceptable web use policy with web filtering
• Enables BYOD by allowing you to easily manage mobile devices and security policy for laptops from one console with user-centric management and reporting
• Prevents the use of unwanted removable storage devices such as USB thumb drives, external drives and more

About Sophos
More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing complete security solutions that are simple to deploy, manage, and use that deliver the industry's lowest total cost of ownership. Sophos offers award winning encryption, endpoint security, web, email, mobile and network security backed by SophosLabs - a global network of threat intelligence centers.
Sophos is headquartered in Oxford, UK.

Dubai, UAE

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release Protecting your Roaming Workforce with Cloud-Based Security How to use the cloud to enable BYOD and secure endpoints beyond your perimeter here

News-ID: 294440 • Views:

More Releases for BYOD

BYOD & Enterprise Mobility Market 2021 | Detailed Report
The BYOD & Enterprise Mobility research report undoubtedly meets the strategic and specific needs of the businesses and companies. The report acts as a perfect window that provides an explanation of market classification, market definition, applications, market trends, and engagement. The competitive landscape is studied here in terms of product range, strategies, and prospects of the market’s key players. Furthermore, the report offers insightful market data and information about the
BYOD Security Market - Growth, Trends and Forecast 2023
Bring your own device (BYOD) refers to computing devices such as smartphones and tablets that employees bring to the workplace on the secure corporate networks. These mobile devices are prone to viruses and other potential risks such as cyber attacks. BYOD security solutions protect such devices from security threats that can harm the intellectual property of the organization. Additionally, these security solutions aid employees to take optimum advantage of mobile
Endpoint Security Market Emerging concept of (BYOD)
According to a new report composed by Transparency Market Research (TMR), the global endpoint security market is highly fragmented, characterized by the occupancy of several large multinational, regional, and small-scale vendors. Intense competitive environment of the market has compelled vendors to distinguish their product & service offerings by adhering to unique and clear value propositions. In order to enhance their product portfolio, well-established companies in the market are focusing on
BYOD Security Market : Global Forecast over 2023
Bring your own device (BYOD) refers to computing devices such as smartphones and tablets that employees bring to the workplace on the secure corporate networks. These mobile devices are prone to viruses and other potential risks such as cyber attacks. BYOD security solutions protect such devices from security threats that can harm the intellectual property of the organization. Additionally, these security solutions aid employees to take optimum advantage of mobile
Global BYOD Security Market Reports, 2015-2021
BYOD i.e. bring your own device, is also referred as bring your own technology (BYOT), and bring your own phone (BYOP). It is a practice in which employee of the organization allowed to bring personally owned devices (tablets and smart phones) to their workplace and permitted to use these devices to access privileged company information and applications. Many IT departments struggling to keep updated with yearly changing technology hence increasing
Global BYOD Security Market, 2015 – 2021
BYOD i.e. bring your own device, is also referred as bring your own technology (BYOT), and bring your own phone (BYOP). It is a practice in which employee of the organization allowed to bring personally owned devices (tablets and smart phones) to their workplace and permitted to use these devices to access privileged company information and applications. Many IT departments struggling to keep updated with yearly changing technology hence increasing