REMOTE WORKFORCE SECURITY - THE TRACE3 BLOG

Page created by Casey Stephens
 
CONTINUE READING
REMOTE WORKFORCE SECURITY - THE TRACE3 BLOG
Remote Workforce Security

What is it?
Remote workforce security refers to the ability to secure geographically distributed
teams which no longer work out of a traditional office. Remote working poses unique
cybersecurity challenges for organizations because their workforce is no longer physically
on-site to use corporate networks and devices within their security perimeter.

Why is it important?
The remote workforce continues to grow as business’s implement work from home
policies and as they look to recruit more talent. This presents a whole set of challenges for
security teams as workers move outside of a secure perimeter; especially during the
current situation where the remote workforce has drastically grown overnight. One of the
most prominent risks comes from users connecting to unknown networks which creates a
much larger attack surface for organizations. A typical solution to this would be to require
workers to use a VPN but setting up a VPN can be very time consuming and be very costly.
Not only does this pose a challenge but security teams are now faced with an increase
adoption of cloud applications and use of unmanaged devices. Securing the remote
workforce is a critical part of modern business.

Approaches
While securing a remote workforce presents new challenges there are several approaches
to help secure them. Identity and access management solutions secure the users by
validating through technologies like single sign on and multifactor authentication to grant
access to corporate resources. Endpoint security and mobile security protects users’
devices by preventing malware, blocking exploits and providing enabling detection and
response. Secure remote access and connected home security protect users at the
network level ensuring safe communications. Cloud Access Security Brokers secure cloud
applications by providing data protection, visibility and threat protection.

Access Management: Access Management refers to technology and processes for
managing identities and access permissions for users, computing devices, and
applications. Access management provides full lifecycle management by providing the
means and credentials for identification during the onboarding process, through to
authenticating and authorizing access to resources, and all the way to revoking access
credentials and identities.

Secure Remote Access: Remote Access refers to the ability to access a computer from a
remote location. Software-Defined Perimeter (SDP) solutions are utilized to authenticate
Remote Workforce Security

and authorize users based on predefined policies in order to grant remote access to
specific network areas.

Endpoint Security: An endpoint security platform is an integrated suite of endpoint
protection technologies used to prevent file-based malware attacks, detect malicious
activity, and provide the necessary investigation and remediation capabilities to respond
to dynamic security incidents and alerts. Endpoint security platforms provide a unified
framework for data sharing between endpoint protection technologies and an interface
for visibility and control.

Connected Home Security: Connected Home Security protects smart home
manufacturer’s devices in home LAN environments, where they are at risk of attacks both
due to their device’s own vulnerabilities and from lateral attacks originating from other
unsecured devices on the same network.

Cloud Access Security Broker: Cloud Access Security Brokers are platforms that sit in
between cloud services and consumers to extend security policies from on premise to the
cloud. The original use of these platforms was to discover and monitor sectioned and
unsanctioned applications in the cloud but have become so much more. They cover critical
areas of security which include data protection, compliance, visibility and threat
protection. CASBs enforce these through security polices such as authentication,
encryption, tokenization, data masking, user behavior analytics and malware detection.
These are typically run through proxies, reverse proxies and APIs.

Mobile Security: Mobile security solutions offer a platform for detecting threats on
Android and iOS devices through monitoring network activity whether it be cellular or
wireless and by monitoring application activity. More specialized vendors provide
capabilities around mobile forensics and mobile espionage defense.
Remote Workforce Security

Technologies
Access Management

                Auth0, a global leader in Identity-as-a-Service (IDaaS), provides thousands of
                customers in every market sector with the only identity solution they need for
                their web, mobile, IoT, and internal applications. Its extensible platform
                seamlessly authenticates and secures more than 2.5 billion logins per month,
                making it loved by developers and trusted by global enterprises.

                Deepnet Security is a leading provider of multi-factor authentication, 2 factor
                authentication and identity management solutions. Its award-winning product,
                DualShield Unified Authentication Platform provides two-factor
                authentication and two-way authentication for a variety of enterprise, web
                and cloud applications in one single security platform, and supports a wide
                selection of authentication methods and user credentials, such as hardware,
                software and mobile phone based one-time passwords, keystroke bio-metrics,
                virtual smart cards and device DNA authentication and many more.

                Duo makes multi-factor authentication radically easy to deploy, use, and
                manage by leveraging mobile phones for transaction verification to help make
                the Internet more secure.
Remote Workforce Security

Entrust Datacard® IntelliTrustTM secures and enables your company’s
digital business across employee, customer and partner user groups — all from
one platform. A cloud-based multi-factor authentication solution, IntelliTrust
offers simple deployment and management for IT and a frictionless experience
for existing and future users.

ForgeRock delivers modern and comprehensive Identity and Access
Management solutions for consumers, employees and things to simply and
safely access the connected world. Using ForgeRock, more than a thousand
global customer organizations orchestrate, manage, and secure the complete
lifecycle of identities from dynamic access controls, governance, APIs, and
storing authoritative data – consumable in any cloud or hybrid environment.

Idaptive Next-Gen Access is the only industry-recognized solution that
uniquely converges Single Sign-on (SSO), adaptive multifactor authentication
(MFA), enterprise mobility management (EMM) and user behavior analytics
(UBA). With Idaptive, organizations experience secure access everywhere,
reduced complexity, and have newfound confidence to drive new business
models and deliver kick-ass customer experiences.

LastPass is an award-winning password manager helping more than 16 million
users organize and protect their online lives. For more than 58,000 businesses
of all sizes, LastPass provides identity and access management solutions that
are easy to manage and effortless to use. From single sign-on and enterprise
password management to adaptive multifactor authentication, LastPass for
Business gives superior control to IT and frictionless access to users.

Azure Active Directory (Azure AD) is an identity and access management-as-a-
service (IDaaS) solution that combines single-on capabilities to any cloud and
on-premises application with advanced protection. It gives your people,
partners, and customers a single identity to access the applications they want
and collaborate from any platform and device. And because it’s based on
scalable management capabilities and risk-based access rules, Azure AD helps
ensure security and streamline IT processes.

Okta is the leading independent provider of identity for the enterprise. The
Okta Identity Cloud enables organizations to securely connect the right people
to the right technologies at the right time. With over 6,500 pre-built
integrations to applications and infrastructure providers, Okta customers can
easily and securely use the best technologies for their business.

OneLogin is the identity platform for secure, scalable and smart experiences
that connect people to technology. With the OneLogin Trusted Experience
Platform, customers can connect all of their applications, identify potential
threats and act quickly.

Ping Identity is pioneering Intelligent Identity. We help enterprises achieve
Zero Trust identity-defined security and more personalized, streamlined user
experiences. The Ping Intelligent Identity platform provides customers,
employees, partners and, increasingly, IoT, with access to cloud, mobile, SaaS
and on-premises applications and APIs, while also managing identity and
profile data at scale.

SecureAuth provides the most flexible and adaptable identity and access
Remote Workforce Security

                  management solution to secure all workforce and customer identities
                  everywhere: hybrid, on-prem, and cloud. Leading organizations use the
                  SecureAuth Identity Platform to secure access for everyone and everything
                  that connects to their business.

Secure Remote Access

                  AppGate brings together a set of differentiated cloud- and hybrid-ready
                  security and analytics products and services. These include AppGate SDP, the
                  industry’s leading software-defined perimeter solution, the Total Fraud
                  Protection suite of risk-based authentication and digital threat protection
                  capabilities and a range of innovative threat management and analytics
                  offerings including the Brainspace digital investigations platform and the
                  company’s Immunity range of offense-oriented software and adversary
                  simulation services.

                  Banyan Security's next generation Zero Trust Network Access platform
                  provides seamless remote access to corporate resources hosted in hybrid and
                  multi-cloud environments. Banyan enhances security by reducing your attack
                  surface, eliminating lateral movement and preventing unauthorized access.
                  Utilizing innovative TrustScoring powered by machine learning, Banyan
                  ensures both users and devices are authenticated and authorized before
                  granting granular least privilege access to sensitive corporate applications and
                  servers.

                  With Duo Beyond, you can identify trusted endpoints by easily deploying
                  device certificates, block any untrusted endpoints and give your users secure
                  access without a VPN.

                  Odo’s Zero Trust Network Access platform enables organizations to simplify,
                  secure and scale remote access to self-hosted resources across public cloud
                  and on-premise infrastructures. Odo’s clientless and agentless solution
                  enables security teams to easily manage secure access to any application,
                  server, database and environment, providing full visibility across all user
                  activity and eliminating the need for VPNs.

                  ScaleFT is a pioneer in Zero Trust providing a BeyondCorp-inspired access
                  management platform that enables secure remote access without a VPN. The
                  ScaleFT team collectively has decades of experience in IT, coming from
                  companies such as Rackspace, The Apache Foundation, Yahoo! and more.

                  Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated,
                  complex and hardware-based traditional network security technologies, and
                  transformed them into a user-friendly and easy-to-use software solution —
                  simplifying secure network access for the modern and distributed workforce.

                  Proofpoint Meta is the zero-trust alternative to VPN for secure remote
                  access to any enterprise application, anywhere. With our people-centric
                  solution, rapidly deploy access from user devices to applications in the
                  data center and the cloud.

                  Pulse Secure provides easy, comprehensive software-driven Secure Access
                  solutions that provide visibility and seamless, protected connectivity between
Remote Workforce Security

                    users, devices, things, and services. Our suites uniquely integrate cloud,
                    mobile, application, and network access to enable hybrid IT in a Zero Trust
                    world.

                    Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on
                    enterprises’ business-critical services and sensitive data, while ensuring
                    uninterrupted business continuity. Safe-T’s cloud and on-premises solutions
                    ensure that an organization’s access use cases, whether into the organization
                    or from the organization out to the internet, are secured according to the
                    “validate first, access later” philosophy of Zero Trust.

                    Luminate enables security and IT teams to create Zero Trust Application
                    Access architecture without traditional VPN appliances. Our Secure Access
                    Cloud™ securely connects any user from any device, anywhere in the world to
                    corporate applications, on-premises and in the cloud, while all other corporate
                    resources are cloaked without granting access to the entire network.

                    Verizon further enhanced its best-in-class Software Defined Perimeter (SDP)
                    security service by acquiring PrecisionAccess solution from Vidder. Verizon’s
                    SDP service creates a network boundary that provides trusted and unified
                    access control for users and devices. Access control is across internal
                    networks, clouds, and external users, enhancing security by continually
                    ensuring that only trusted devices used by entitled users can ever see and
                    access trusted applications.

                    Zscaler Private Access (ZPA) is a cloud-delivered, zero trust network access
                    (ZTNA) service that provides secure access to all private applications, without
                    the need for a remote access VPN. ZPA delivers a zero trust model by using
                    the Zscaler security cloud to deliver scalable remote and local access to
                    enterprise apps while never placing users on the network.

Endpoint Security

                    VMware Carbon Black is a leader in cloud-native endpoint protection
                    dedicated to keeping the world safe from cyberattacks. The VMware Carbon
                    Black Cloud consolidates endpoint protection and IT operations into an
                    endpoint protection platform (EPP) that prevents advanced threats, provides
                    actionable insight and enables businesses of all sizes to simplify operations. By
                    analyzing billions of security events per day across the globe, VMware Carbon
                    Black has key insights into attackers’ behaviors, enabling customers to detect,
                    respond to and stop emerging attacks.

                    Cybereason, creators of the leading Cyber Defense Platform, gives the
                    advantage back to the defender through a completely new approach to
                    cybersecurity. Cybereason offers endpoint prevention, detection and
                    response and active monitoring. The solution delivers multi-layered endpoint
                    prevention by leveraging signature and signatureless techniques to prevent
                    known and unknown threats in conjunction with behavioral and deception
                    techniques to prevent ransomware and fileless attacks.

                    CrowdStrike is the leader in cloud-delivered next-generation endpoint
                    protection. CrowdStrike has revolutionized endpoint protection by being the
                    first and only company to unify next-generation antivirus (AV), endpoint
Remote Workforce Security

                  detection and response (EDR), and a 24/7 managed hunting service — all
                  delivered via a single lightweight agent.

                  Cylance develops artificial intelligence to deliver prevention-first, predictive
                  security products and smart, simple, secure solutions that change how
                  organizations approach endpoint security. Cylance provides full spectrum
                  predictive threat prevention and visibility across the enterprise to combat the
                  most notorious and advanced cybersecurity attacks. With AI-based malware
                  prevention, threat hunting, automated detection and response, and expert
                  security services, Cylance protects the endpoint without increasing staff
                  workload or costs.

                  Endgame makes military-grade endpoint protection as simple as anti-virus.
                  Leveraging the industry’s most advanced machine learning technology,
                  Endgame enables security operators of any skill level to deliver full-force
                  protection, stopping everything from ransomware, to phishing, and targeted
                  attacks. Endgame is the only endpoint security platform to offer a unique
                  hybrid architecture that delivers both cloud administration and data
                  localization that meets all industry, regulatory, and global compliance
                  requirements.

                  SentinelOne is a pioneer in delivering autonomous security for the endpoint,
                  datacenter and cloud environments to help organizations secure their assets
                  with speed and simplicity. SentinelOne unifies prevention, detection, response,
                  remediation and forensics in a single platform powered by artificial
                  intelligence. With SentinelOne, organizations can detect malicious behavior
                  across multiple vectors, rapidly eliminate threats with fully-automated
                  integrated response and to adapt their defenses against the most advanced
                  cyberattacks.

Connected Home Security

                  Bitdefender IoT Security Platform’s design supports the rapid adoption of
                  Internet-connected devices on new or existing infrastructures. It protects the
                  whole networking ecosystem against cyber-attacks, malware, and spying
                  attempts. The platform draws on the intelligence of more than 500 million
                  endpoints, with each new detection automatically improving the platform for
                  all users globally.

                  Powered by proprietary artificial intelligence models and uniquely built on
                  billions of real-world data points, the CUJO AI portfolio of products is
                  designed to gain a clear insight on how data moves across networks and to
                  digitally protect people and devices, creating a safer smart-living experience in
                  homes, businesses and connected communities. Network, mobile and public
                  Wi-Fi operators around the world utilize the CUJO AI portfolio of products to
                  provide their customers with a seamlessly integrated suite of value-added
                  services, covering network monitoring and protection, advanced connected
                  device identification, real-time network security, privacy protection, content
                  access control and digital parenting.

                  Firedome is built to secure billions of home IoT devices and prevent the next
                  cyber-catastrophe. With home IoT device companies facing the risk of being
                  held responsible for harmful breaches and attacks, Firedome has tailored its
Remote Workforce Security

                   offering to their business and product needs. Firedome is funded by top
                   security veterans with offices in New York and Tel Aviv, and employs
                   multinational cyber, embedded, research and analysis experts.

                   Fortress Information Security is an information security and cyber risk
                   mitigation company redefining traditional risk management. Fortress utilizes
                   its Risk Identification, Monitoring, & Management Platform (RIMM), to help
                   companies better understand, visualize and secure its critical business
                   assets. Fortress’ always-on, co-managed RIMM platform combines next-gen
                   security technology and vulnerability management tools, to more efficiently
                   operationalize findings, remediation and risk management across the
                   enterprise.

                   F-Secure shield enterprises and consumers against everything from advanced
                   cyber attacks and data breaches to widespread ransomware infections. Its
                   technology combines the power of machine learning with the human
                   expertise of its world-renowned security labs for a singular approach called
                   Live Security.

                   SAM provides a software-based security solution that integrates seamlessly
                   with any platform and protects local area networks by securing the gateway
                   and all of its connected devices. Installed remotely on existing gateways, SAM
                   doesn't require any additional hardware or a technician to provide
                   comprehensive network security. The solution is offered as a service, allowing
                   users to have the enterprise-grade protection including virtually patching
                   vulnerabilities such as KRACK and other high-level, targeted attacks. SAM
                   works with leading chipset manufacturers, including Intel, to provide network
                   security from the source.

Cloud Access Security Broker
                   Bitglass, the total data protection company, is a global cloud access
                   security broker (CASB) and agentless mobile security company based
                   in Silicon Valley. The company's solutions enable real-time end-to-end
                   data protection, from the cloud to the device. Bitglass is backed by
                   Tier 1 investors and was founded in 2013 by a team of industry
                   veterans with a proven track record of innovation and execution.

                   Censornet provides a multi-channel, multi-layered approach to
                   securing the cloud via its purpose-built platform. CensorNet delivers
                   integrated web security, email security, CASB and multi-factor
                   authentication to provide security focused visibility and control of an
                   organization’s assets. Our elastic security platform combines
                   traditional security controls (e.g. web/URL filtering, email security)
                   with granular cloud application control and adaptive multi-factor
                   authentication to allow access while controlling outcomes.

                   Cisco Cloudlock is the API-based Cloud Access Security Broker
                   (CASB) that helps accelerate use of the cloud. Cloudlock secures your
                   identities, data, and apps, combating account compromises, data
                   breaches, and cloud app ecosystem risks. Our API-driven approach
                   provides a simple and open way to enable healthy cloud adoption
Remote Workforce Security

CipherCloud, a leader in cloud security and visibility, enables
companies to adopt the cloud while delivering data protection,
compliance and control. CipherCloud delivers a comprehensive multicloud
security platform that integrates advanced data protection,
content control, monitoring, cloud discovery and risk analysis. The
largest financial services, insurance, healthcare, telecommunication,
and government companies across more than 25 countries have put
their trust in CipherCloud.

Forcepoint is the human-centric cybersecurity company that
understands behavior and adapts security response and enforcement
to risk. The Forcepoint Human Point platform delivers Risk-Adaptive
Protection to continuously ensure trusted use of critical data and
systems.

Skyhigh Networks, acquired by McAFee, is the world’s leading Cloud
Access Security Broker (CASB). Skyhigh enables enterprises to safely
adopt cloud services, while meeting their security, compliance and
governance requirements. With more than 600 enterprise customers
globally, Skyhigh provides organizations the visibility and
management for all their cloud services, including enforcement of
data loss prevention policies; detecting and preventing internal and
external threats; encrypting data with customer-controlled keys; and
implementing access-control policies.

Microsoft Cloud App Security is a multimode Cloud Access Security
Broker (CASB). It provides rich visibility, control over data travel, and
sophisticated analytics to identify and combat cyberthreats across all
your cloud services.

Netskope is the leader in cloud security. We help the world’s largest
organizations take full advantage of the cloud and web without
sacrificing security. Our patented Cloud XD technology eliminates
blind spots by going deeper than any other security provider to
quickly target and control activities across thousands of cloud
services and millions of websites. With full control from one cloud, our
customers benefit from 360-degree data protection that guards data
everywhere and advanced threat protection that stops elusive
attacks.

The Oracle CASB Cloud Service is the only Cloud Access Security
Broker (CASB) that gives you both visibility into your entire cloud
stack and the security automation tool your IT team needs.

By offering advanced data protection and consistency across
applications, Prisma SaaS reins in the risks. It addresses your cloud
access security broker needs and provides advanced capabilities in
risk discovery, data loss prevention, compliance assurance, data
governance, user behavior monitoring and advanced threat
prevention. Now you can maintain compliance while preventing data
leaks and business disruption through a fully cloud-delivered CASB
deployment.
Remote Workforce Security

                  Proofpoint Cloud App Security Broker (Proofpoint CASB) helps you
                  secure applications such as Microsoft Office 365, Google’s G Suite,
                  Box, and more. Our CASB solution and protection app provides a
                  unique risk-aware, people-centered approach gives you visibility and
                  control over your cloud apps, so you can deploy cloud services with
                  confidence. Our powerful analytics help you grant the right levels of
                  access to users and third-party add-on apps based on the risk factors
                  that matter to you.

                  Symantec CloudSOC Cloud Access Security Broker (CASB) is the
                  broadest, deepest protection for the public cloud: visibility, data
                  security, and threat protection for IaaS accounts and data in the cloud

Mobile Security
                  Better Mobile is a leading Mobile Threat Defense (MTD) solution provider that
                  uses predictive AI technology to identify and stop mobile security threats
                  without compromising end-user productivity or privacy. Better MTD’s
                  predictive protection comes from its Deep Thinker AI platform that applies
                  artificial intelligence and learning models to identify known and unknown
                  threats at the device, network and application levels.

                  Check Point SandBlast Mobile prevents mobile threats before they start.
                  Whether data is at-rest on a device or in-motion, SandBlast Mobile protects
                  against vulnerabilities and attacks that put data at risk.

                  Kaspersky Security for Mobile is a Mobile Threat Defense (MTD) and Mobile
                  Threat Management (MTM) solution that helps businesses ensure that their
                  mobile workers can use mobile devices to perform work tasks without putting
                  sensitive business data and critical business processes at risk. It combines
                  industry-leading anti-malware, anti-spam and web, application and device
                  controls as well as anti-theft features.

                  Lookout is a cybersecurity company for the post-perimeter, cloud-first,
                  mobile-first world. Powered by the largest dataset of mobile code in existence,
                  the Lookout Security Cloud provides visibility into the entire spectrum of
                  mobile risk. Lookout is trusted by hundreds of millions of individual users,
                  enterprises and government agencies and partners such as AT&T, Verizon,
                  Vodafone, Microsoft, Apple and others.

                  PRADEO SECURITY offers a complete, automatic and seamless protection to
                  mobile devices and applications, aligned with your organization security policy
                  while preserving business agility.

                  Privoro is leading the way in mobile security hardware systems – enabling
                  organizations to adopt a zero trust posture against commercial mobile devices
                  while delivering high-security services and unsurpassed control.

                  Proofpoint Mobile Defense provides enterprises with comprehensive
Remote Workforce Security

protection and visibility against malicious and privacy-leaking iOS and Android
apps. These apps frequently lead to advanced persistent threats (APTs), spear
phishing attacks on employees, and leaked corporate data.

Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat
Defense (MTD) solution that helps businesses spend less time and effort to
manage and secure traditional and mobile endpoints. The only UEM solution
that integrates natively with a leading next-gen endpoint security platform,
Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10
and macOS devices.

Symantec Endpoint Protection Mobile's risk-based mobile security approach is
designed from the ground up to defend against all detected threats that put
business data at risk of exposure, theft and manipulation, while respecting
users' need for privacy, productivity and a great mobile experience.

Wandera provides a unified cloud security solution to protect this new way of
working. We secure your data and devices against cyber threats, help you
apply policies to filter internet access and reduce risk exposure, and enable
zero-trust access to all your applications.

ZecOps provides the industry-first automated agentless Digital Forensics and
Incident Response (DFIR) platform on endpoints, servers and mobile devices.
ZecOps platform enables automated discovery, analysis, and disinfection of
persistent attackers that go unnoticed by existing security controls by finding
and leveraging attackers’ mistakes. In addition to identifying and responding to
cyber security threats, ZecOps platform diagnoses IT issues and enhances
DevSecOps. The platform is also suitable for ATMs, IOT and other embedded
devices. All ZecOps solutions take minutes to deploy even at scale and operate
without prerequisites.

Zimperium is the industry leader in Mobile Threat Defense with the world’s
largest deployment of mobile device sensors. Only Zimperium offers real-time,
on-device protection against both known and unknown threats, enabling
detection and remediation of attacks on all three levels - the device, the
network and the application.
You can also read