cybersecurity map

Timing Isn't Everything But It Helps

Many lessons were learned in enterprise IT and security teams in 2020, right down to the final weeks of the year with the Solarwinds attack. We closed out a miserable year with a devastating reminder about the danger of third party access and supply chain attacks. Another painful lesson for IT teams was that current application access technologies, such as virtual private networks (VPN) or virtual desktop infrastructure (VDI), are too difficult to manage and scale. Even the most resource rich companies were forced to ration VPN access for employees, third parties, and partners. This is the opposite of digital transformation, and everything modern business is about. On top of those operational challenges was the fact that these solutions are not secure, and certainly not part of a zero-trust framework.

Meanwhile, in the C-Suite, secure application access went from off the radar completely to a business continuity issue on par with natural disasters and DDoS attacks. Modern business starts with the availability of enterprise assets. 2020 was the year that the C-Suite learned that legacy access solutions were a threat to business operations, digital transformation, and even margins. They are now asking IT leaders, why is something so fundamental to our business so out of touch with what we need?

Time for Change
IT leadership is about managing change and risk while charging full speed ahead. The old way of doing things does not last forever. Ask any developer. It turns out that the way we offer enterprise access is going through another step change in the never-ending march of progress that defines enterprise IT.

IT leaders have long had VPN/VDI on the list of eventual upgrades. Next year they said, other priorities took precedent, like managing an increasingly complex hybrid environment. Not this year. 2020 exposed the weakness of current approaches to the point the C-Suite noticed, and now something must be done. What lessons did we learn in 2020 that can lead us forward with a better, more secure, and user friendly approach to application access?

Lessons Learned
1. Business Starts with Access. Immediately following the work-from-home orders it became clear that access is where business begins. Legacy solutions could not scale quickly, as they relied on a mix of hardware, licenses, and agents on endpoints, requiring significant time and human resources, neither of which most companies had at that moment. When enterprise assets are unavailable to those who need them, business continuity and efficiency are disrupted. By turning to the cloud, businesses can enable access at scale, quickly and securely for employees and third-parties.

2. User experience matters. Users have complained for years that legacy access technologies were difficult to use, often leading them to avoid them altogether by logging into SaaS apps from personal devices outside the VPN/VDI. IT solutions should not be pushing users to make insecure choices for the sake of convenience. Again, by leveraging a modern cloud platform for application access, users are met with a familiar web interface to access all business applications.

3. Zero Means Zero. Zero Trust is a fantastic framework for organizational security. Most businesses say they are on their zero-trust journey. Leaving legacy access solutions behind for modern cloud-based application access solutions is one way to make a quantum leap forward. Legacy solutions offer too much implicit trust in the user, bringing them onto the network, to the doorstep of vulnerable applications. Furthermore, businesses have limited visibility and control over the user once they have gained access. With a cloud-based access solution, the cloud serves as a broker between the user and application. Users no longer gain access to the network, or the applications themselves. Furthermore, in this cloud-based model, every move by the user is checked, verified, and authorized. This is truly zero trust in action. Enterprise application access is now a C-Suite priority, and again, the cloud provides a way forward for enterprise IT teams. The cloud cannot solve all of your IT challenges, but it is certainly the future of enterprise application access solutions.

About the Author

Tamir Hardof, CMO, Axis Security

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.