Ultimate guide to secure remote access – TechTarget

Ultimate guide to secure remote access – TechTarget

Secure remote access is one of the most critical aspects of networking and security today — even more so because of the COVID-19 pandemic, which forced employers to expand and fortify their remote work capabilities. Companies need to provide employees and business partners remote access to resources, such as applications and data, without compromising security. In this guide, we examine how businesses should rethink key aspects of their secure remote access strategies, set policies accordingly and get to know the entirety of the secure remote access ecosystem.


What is secure remote access?

What it means to provide secure remote access has changed considerably in the past few years as a result of new technologies and the pandemic. At its most basic, secure remote access is having location-agnostic connectivity among enterprise users and centralized applications, resources and systems, whether cloud-based or on premises.

The following technologies can contribute to secure remote access:

  • VPNs;
  • intrusion prevention systems and intrusion detection systems;
  • Secure Access Service Edge (SASE) and software-defined perimeter;
  • firewalls;
  • cloud access security brokers;
  • zero-trust network access;
  • virtual desktop infrastructure; and
  • identity and access management (IAM).

Some of these technologies are explained in deeper detail below.

Who is responsible for secure remote access?

Although remote access tools, such as VPNs and firewalls, are typically under the purview of network teams, in this new era, cybersecurity teams tend to lead and manage the policies, processes and technologies associated with ensuring secure remote access.

Cybersecurity teams assess and mitigate the risks of remote access, including the following:

  • password sharing;
  • software that violates an organization’s security standards;
  • unencrypted personal devices and lack of cyber hygiene; and
  • minimal to no patching.

Their responsibilities involve combating the top cybersecurity risks by strengthening and measuring the effectiveness of access controls, monitoring and managing remote access activities, keeping remote access rules current and testing remote access operations.

The diminishing power of VPNs

One tactic organizations use to combat the vulnerabilities associated with working remotely — especially if employees are …….

Source: https://www.techtarget.com/searchsecurity/Ultimate-guide-to-secure-remote-access

Leave a Reply

Your email address will not be published. Required fields are marked *