Posts tagged VPN
On TJ Keitt’s Forrester blog post, “’Anywhere, Anytime’ Work Means IT Must Provide the Right Technology, to the Right Person, at the Right Time”

By Bill Reeves, Sr. Director, Product & Solution Marketing (MFT), Axway

“Working remotely” used to mean simply working from home. Now it means being able to work even when you’re mobile, including in transit or at any kind of remote location. We’re connected like we’ve never been before. But working remotely should never compromise the security standards of the organization.

When it comes to remote computing, it takes a lot of thought to determine what type of security you need, where you want the data, how you want the data handled and managed, and who should have access to it (and who should not). Sometimes leveraging the remote capabilities of smartphones and other devices means that you are exposing the enterprise to a whole new level of security vulnerability. And since users are developing expectations of how they want to work, and what devices they want to use, it’s not as simple as applying the same security standard to every single device no matter what kind of data is in play, how it is being manipulated, or where it is going.

For instance, are you going to allow the same level of document creation and manipulation on a smartphone that you allow on a laptop? Some users may have relatively low expectations around what they can do via a smartphone, while others may expect functional parity across both mediums. There’s a big difference between the two, because the ability to actually manipulate data creates a whole new world of security concerns. Organizations must decide whether they will limit smartphone capabilities to viewing only or offer more robust data manipulation capabilities.

What you need to do is establish standards for transferring as well as manipulating data. Think through what kind of access you want to provide for smartphones or other mobile devices. How do you want workers to access it? Do you even allow them to access it? What security level is necessary to ensure that you are maintaining the standards set by the organization?

The bottom line? You need centralized file management. You need the ability to audit. And you need security, security, security! When you’re viewing or manipulating the data, you have to take it very seriously, and consider how it can interact with a smart phone. And, of course, the data should be encrypted at rest and in motion.

In addition to great products that address internal communication within the enterprise, Axway offers specific solutions that enable you to manage files outside of the enterprise – because the fact is you’re going to have to extend your reach, not just to your trading partners but to your internal employees at home and on the road.

Axway CSO Taher Elgamal Posts on DarkReading.com: “Leaps Of Faith”

Axway CSO Taher Elgamal posted a blog post on DarkReading.com, a news and information portal that focuses on IT security. Please take a look and share your thoughts!

“Similarly – and this may come as a surprise – from a security standpoint, the mobile realm is far more secure than the browser realm, because most mobile transactions are conducted through applications, not browsers. With mobile apps, for instance, the certificates are already built in – they don’t allow the user to trust any random site and click ‘Yes’ to a pop-up window that should genuinely give them pause. They don’t force the user to wonder who the browser should trust, because it’s not a browser.”