CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
employees to contractors and sub-contractors – are spread around the globe. Design drawings<br />
and collaboration must also extend across a multitude of different devices -- from laptops to<br />
phones and tablets to connected things. And access business apps and sensitive company<br />
information anywhere is there is a Wi-Fi connection or a cellular signal.<br />
This dynamic work environment promises to drive new levels of freedom, productivity and<br />
innovation. It also introduces new vulnerabilities and an expanded attack surface that requires a<br />
more intelligent and contextual security model that centers on the user rather than the device.<br />
Savvy IT and security teams will combine centralized policy control, user behavior insights, and<br />
machine learning and artificial intelligence to administer security policies based on user behaviors<br />
and access patterns. When an anomaly or risky behavior is detected, the system will contextually<br />
apply appropriate security measures ranging from requiring a second-layer of authentication when<br />
logging in from a new device and turning off certain features such as the ability to download or<br />
print when accessing from a foreign network to blocking access to select (or all) apps after multiple<br />
failed log-in attempts or access from a dangerous location.<br />
A New Solution<br />
This is where things like digital workspace technologies, come into play because they allow<br />
companies to provide access to all the applications their employees need and prefer to use in<br />
one, unified experience while giving IT a single control plane they can use to onboard and manage<br />
application performance without getting in the way of the user experience.<br />
A true digital workspace requires three attributes:<br />
• First, it’s unified, giving users single-sign-on access to all the apps and content they need<br />
to be productive in one unified experience.<br />
• Second, it’s secure, applying contextual security policies to ensure apps and content<br />
remain safe<br />
• And third, it’s intelligent, using machine learning, micro-apps and bots to surface key<br />
insights and guide and automate work.<br />
In creating digital workspaces, companies can serve up personalized access to the systems,<br />
information and tools their employees need, when and how they need them while keeping their<br />
information and systems secure. And they can do it in a way that provides:<br />
• Standardization and simplification through a single, centralized workspace that unites<br />
users and keeps business in sync.<br />
• Deployment efficiencies and cost control, as IT can more easily and cost-effectively stand<br />
up and provision servers, workgroups and new projects.<br />
• Greater resilience and security enabled by a flexible, digital perimeter that ensures every<br />
user is intrinsically secure.