The Challenges With Securing The Anywhere-Work Endpoint


From the early days when PCs began to take computing power away from mainframes and data started to become decentralized, securing that endpoint has been a challenge. Desktops moved to laptops, smartphones and tablets entered the business sphere, and that “locally” decentralized data moved out of the offices with users now working from locations where IT and security operations didn’t have direct control. Client/server applications gave way to web-based applications, introducing software as a service (SaaS); managed data centers shifted to cloud services; and the complexities of securing the endpoint compounded as the data continued to move further away from the direct control of business operations.

Even with all these changes in how users work with applications and data, businesses had time to adapt and build out plans for how to deal with it. Whether those plans were entirely effective or not isn’t what we’re talking about here (Forrester has reams of research on securing and managing the endpoint, applications, and user access). We’re living in a new world of business computing. Anywhere work has become the dominant approach to how employees access business applications. So now IT and security operations teams have to develop new plans for various scenarios — the distance between the users and the corporate data can vary day to day, depending on whether the user is in the office or outside it; whether the applications accessed are in the data center or at a cloud provider; and whether the app is managed by the company or a SaaS app that is completely controlled by someone else.

Adding to the near-vertical climb of current endpoint protection is the knowledge that many users, having been quickly thrown into the world of anywhere work recently, don’t have a complete understanding of what is needed to work securely outside of an office. Forrester’s survey findings and research on information workers and their thoughts on their company’s cybersecurity approach should worry any security operations center (SOC) team. Add in that many home networks are relatively insecure and that the vast majority of business employees don’t have a background in cybersecurity and it’s no surprise that cybersecurity professionals are getting burnt out trying to overcome these problems.

This all raises a lot of questions. What can be done to protect the endpoints themselves? What existing or emerging technology can provide more protection than what you may be using now? What can be done to protect the modern endpoint — the browser? How can you engage the users in cybersecurity to show them how to work safely and securely in the new world of anywhere work?

Join me at the Forrester Security & Risk 2022 event in Washington D.C. (and virtually) on November 8–9 and we’ll look to answer these questions and provide specific guidance during my session Rethinking How To Secure The Anywhere-Work Endpoint. Learn more about the Security & Risk event agenda and register here.



Source link

Related articles

ASML on a Excessive: The place Will the Rally Lead?

Shares in Dutch semiconductor specialist have seen spectacular value actions in current weeks. Robust quarterly figures and excessive demand for EUV lithography techniques are pushing the inventory additional upward, however traders are...

Aster Types Bullish Hammer At Key Assist – Reversal Setup?

ASTER, the native token of the decentralized perpetual change Aster, formally launched final week and instantly made waves throughout the crypto market. Backed by Yzi Labs (previously Binance Labs) and carrying the general...

3 Causes Why Some Firms Do Not Pay Dividends

Up to date on September twenty second, 2025 by Bob Ciura This text is a visitor contribution by Ryan Scribner from Investing Easy. In the case of investing within the inventory market, you primarily have...

FBTC: Appreciating The Undercurrents Of Cryptocurrency Investing (BATS:FBTC)

This text was written byObserveA freight forwarding skilled with over 20 years within the trade, I'm an enthusiastic market participant with a aptitude for selecting gems from the overall rubble. My trade expertise...
spot_img

Latest articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

WP2Social Auto Publish Powered By : XYZScripts.com