Security that follows the data is the only solution. Companies need to enable their teams to work from any location across the world, including work from home. Remote distributed workforces have grown 44% over the last 5 years, enabling access to specialized talent, reduced office overhead, flexible freelance-based staff, and of course an increased ability to adapt to unforeseen world events.
Enabling remote work requires security diligence. The risk of a data breach within an enterprise is already high - add to this the potential of data leaking onto remote workers’ personal devices, cloud applications, and public shares, and your risk is amplified exponentially. Supporting remote work also requires additional layers of compliance, typically to show data is protected by default and tracked and audited at all times.
Search “securing remote workforce” on Google and you will find lots of articles preaching traditional security best practices: have remote workers log in via virtual private network (VPN), ship secure devices to remote workers, classify all your data and set up data loss prevention (DLP) to monitor and block data sharing, set up a cloud security access broker (CASB) to restrict access to non-sanctioned cloud applications, etc. Some of these measures are important, some offer partial protection, and some are a significant impediment to worker productivity.
Why are remote workforce security measures insufficient?
Most data protection tools focus on putting up walls around the data, rather than protecting the data itself. Unfortunately, each solution that puts up walls, such as a DLP, is very complex and error-prone. There are just too many possibilities where the security team can fail to configure some aspect of the technology appropriately and leave a gap, especially in today’s continually changing landscape where sharing and collaboration tools that focus on productivity are far ahead of legacy security tools. There are just too many possibilities of the data being misclassified, where DLP incorrectly allows the data to pass unfettered.
Traditional security measures can also be insufficient if they don’t scale. For example, in the case of a significant weather event or pandemic, a remote workforce may put too much strain on the corporate VPN.
Why does remote security reduce productivity?
Given all the potential protection gaps in data protection, as the remote workforce increases, the risks increase. The security team starts to add more heavy-handed DLP rules, forcing staff to use a very narrow set of applications and workflows and slows down from false positives. Many will attempt to lock down a remote workers’ experience entirely with virtual desktop infrastructure (VDI). VDI can be very secure, but it comes at considerable cost in the form of usability and productivity. As staff feels increasingly pressured to get their jobs done despite all of these blockers, they increasingly find workarounds, literally undoing the security team’s work. This leads to a vicious cycle, a downward spiral of security gaps and productivity drains.
The solution is data-centric protection.
The only way to break the vicious cycle of insufficient security and hampered productivity is to shift the data protection strategy from attempting to secure every possible endpoint to securing the data itself, by default.
The Data Access Security Broker (DASB) platform provides data-centric protection. With DASB, any data is automatically protected by default, and this protection is persistent no matter where the data goes or how it is accessed. Moreover, once DASB is implemented in the enterprise, it automatically protects any other similar data it comes in contact with, expansively extending DASB’s protection to any new and existing data in the enterprise automatically.
Most importantly, DASB requires no changes to the user experience. Employees, no matter where they are working from, use the applications they want, in the way they want, with no plug-ins, pop-ups or special viewers. Unlike other attempts at remote security such as VDI, DLP, orDigital Rights Management (DRM) that force constrained workflows and put unfair limits on file types, applications, and versions, end-users are not even aware that DASB is protecting data behind the scenes unless they attempt to violate business policy.
The organization has persistent access control even in the event that data leaks onto an unauthorized device or cloud, or into the wrong hands. DASB tracks every action taken on protected data and reports it to your Security Information and Event Management (SIEM), turning every action into an auditable event.
When data is protected by default and stays protected and audited wherever it goes, even if it leaks into the wrong hands, it stops the vicious cycle of insufficient security and reduced productivity. Companies can finally get off the hamster wheel of constantly trying to discover and classify new data, and constantly trying to find and plug vulnerabilities in your remote security infrastructure. And only then, when thousands of remote workers are accessing data daily from their personal devices and cloud applications, the CISO remains confident that data is airtight.