01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

employees to contractors and sub-contractors – are spread around the globe. Design drawings<br />

and collaboration must also extend across a multitude of different devices -- from laptops to<br />

phones and tablets to connected things. And access business apps and sensitive company<br />

information anywhere is there is a Wi-Fi connection or a cellular signal.<br />

This dynamic work environment promises to drive new levels of freedom, productivity and<br />

innovation. It also introduces new vulnerabilities and an expanded attack surface that requires a<br />

more intelligent and contextual security model that centers on the user rather than the device.<br />

Savvy IT and security teams will combine centralized policy control, user behavior insights, and<br />

machine learning and artificial intelligence to administer security policies based on user behaviors<br />

and access patterns. When an anomaly or risky behavior is detected, the system will contextually<br />

apply appropriate security measures ranging from requiring a second-layer of authentication when<br />

logging in from a new device and turning off certain features such as the ability to download or<br />

print when accessing from a foreign network to blocking access to select (or all) apps after multiple<br />

failed log-in attempts or access from a dangerous location.<br />

A New Solution<br />

This is where things like digital workspace technologies, come into play because they allow<br />

companies to provide access to all the applications their employees need and prefer to use in<br />

one, unified experience while giving IT a single control plane they can use to onboard and manage<br />

application performance without getting in the way of the user experience.<br />

A true digital workspace requires three attributes:<br />

• First, it’s unified, giving users single-sign-on access to all the apps and content they need<br />

to be productive in one unified experience.<br />

• Second, it’s secure, applying contextual security policies to ensure apps and content<br />

remain safe<br />

• And third, it’s intelligent, using machine learning, micro-apps and bots to surface key<br />

insights and guide and automate work.<br />

In creating digital workspaces, companies can serve up personalized access to the systems,<br />

information and tools their employees need, when and how they need them while keeping their<br />

information and systems secure. And they can do it in a way that provides:<br />

• Standardization and simplification through a single, centralized workspace that unites<br />

users and keeps business in sync.<br />

• Deployment efficiencies and cost control, as IT can more easily and cost-effectively stand<br />

up and provision servers, workgroups and new projects.<br />

• Greater resilience and security enabled by a flexible, digital perimeter that ensures every<br />

user is intrinsically secure.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!