cybersecurity map

Timing Isn't Everything But It Helps

Many lessons were learned in enterprise IT and security teams in 2020, right down to the final weeks of the year with the Solarwinds attack. We closed out a miserable year with a devastating reminder about the danger of third party access and supply chain attacks. Another painful lesson for IT teams was that current application access technologies, such as virtual private networks (VPN) or virtual desktop infrastructure (VDI), are too difficult to manage and scale. Even the most resource rich companies were forced to ration VPN access for employees, third parties, and partners. This is the opposite of digital transformation, and everything modern business is about. On top of those operational challenges was the fact that these solutions are not secure, and certainly not part of a zero-trust framework.

Meanwhile, in the C-Suite, secure application access went from off the radar completely to a business continuity issue on par with natural disasters and DDoS attacks. Modern business starts with the availability of enterprise assets. 2020 was the year that the C-Suite learned that legacy access solutions were a threat to business operations, digital transformation, and even margins. They are now asking IT leaders, why is something so fundamental to our business so out of touch with what we need?

Time for Change
IT leadership is about managing change and risk while charging full speed ahead. The old way of doing things does not last forever. Ask any developer. It turns out that the way we offer enterprise access is going through another step change in the never-ending march of progress that defines enterprise IT.

IT leaders have long had VPN/VDI on the list of eventual upgrades. Next year they said, other priorities took precedent, like managing an increasingly complex hybrid environment. Not this year. 2020 exposed the weakness of current approaches to the point the C-Suite noticed, and now something must be done. What lessons did we learn in 2020 that can lead us forward with a better, more secure, and user friendly approach to application access?

Lessons Learned
1. Business Starts with Access. Immediately following the work-from-home orders it became clear that access is where business begins. Legacy solutions could not scale quickly, as they relied on a mix of hardware, licenses, and agents on endpoints, requiring significant time and human resources, neither of which most companies had at that moment. When enterprise assets are unavailable to those who need them, business continuity and efficiency are disrupted. By turning to the cloud, businesses can enable access at scale, quickly and securely for employees and third-parties.

2. User experience matters. Users have complained for years that legacy access technologies were difficult to use, often leading them to avoid them altogether by logging into SaaS apps from personal devices outside the VPN/VDI. IT solutions should not be pushing users to make insecure choices for the sake of convenience. Again, by leveraging a modern cloud platform for application access, users are met with a familiar web interface to access all business applications.

3. Zero Means Zero. Zero Trust is a fantastic framework for organizational security. Most businesses say they are on their zero-trust journey. Leaving legacy access solutions behind for modern cloud-based application access solutions is one way to make a quantum leap forward. Legacy solutions offer too much implicit trust in the user, bringing them onto the network, to the doorstep of vulnerable applications. Furthermore, businesses have limited visibility and control over the user once they have gained access. With a cloud-based access solution, the cloud serves as a broker between the user and application. Users no longer gain access to the network, or the applications themselves. Furthermore, in this cloud-based model, every move by the user is checked, verified, and authorized. This is truly zero trust in action. Enterprise application access is now a C-Suite priority, and again, the cloud provides a way forward for enterprise IT teams. The cloud cannot solve all of your IT challenges, but it is certainly the future of enterprise application access solutions.

About the Author

Tamir Hardof, CMO, Axis Security

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.