Last week, OpenDNS CEO David Ulevitch hosted a webcast called “Network Security for the Eroding Enterprise Perimeter”. In the webcast, he examined how the security needs of today are completely different than those of yesterday, primarily because the way we work has evolved.
Employees are no longer confined to a desk, inside a cubicle, inside your network. The advent of mobile devices and laptop technology, along with increased adoption of cloud services, has made the world one big mobile office. People now work from their homes, coffee shops, and airports – sometimes with the blessing of IT, sometimes without it. This has drastically changed the security landscape – you can’t just build a wall around your “castle” and call it a day.
So what can you do to protect your users and your data from today’s threats without sacrificing productivity and mobility? Your security strategy will need three key elements to be effective:
In the face of modern threats, which are both persistent and advanced, your security policies need to be consistently enforced across user levels and groups, so that you don’t have gaps for attackers to exploit. This also helps to keep track of what can be accessed by which users. An example of this is having different policies for different departments.
Your users aren’t always in the office, and they’re not always working within set hours – why should your security solution? With the amphibious nature of both data and devices (from office to home and vice-versa) in the new working world, you need constant protection, wherever your users may be located.
If your security strategy only focuses on being consistent and always-on, it may come across as heavy-handed to employees used to functioning seamlessly between work and home. That’s why the final piece of this puzzle is so important. Context helps you provide the right level of security, at the right time, on the right device. For example, different policies applied to the same device when a user is on an office network or a home network. As David says during the webcast: “[Your security policy] should be consistently applied, but contextually delivered.”
But wait, there’s more!
In addition to exploring these points in-depth, this webcast features a look at enforcing security at each one of seven layers: your data, apps, users, endpoints, network, perimeter, and the Internet itself.
Watch the full on-demand webcast here: