Working From Home Is Not Secure Without an Effective IAM
- LANGUAGE: English DATE: Thursday, July 09, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.
Working from Home is not that different to mobile workers working remotely, but with the added challenges of using personal smartphones and PCs or laptops – similar to the Bring Your Own Device (BYOD) challenge in the enterprise setting – as well as bandwidth constraints for VPN connections etc.
One of the technologies that are essential for enabling WfH is IAM. It is the first line of defense when it comes to preventing phishing attacks. It is required for authenticating to services in the business, at the network level (VPNs), and in the cloud. MFA (Multi Factor Authentication) and Adaptive Authentication are among the most important capabilities.
In this webinar, you will learn about:
- The dos and don’t for IT in the current crisis
- Balancing security and WfH enablement – how this can work
- Key IAM requirements for secure WfH environments
- How to restructure your IAM framework for remote working and why this all is about Zero Trust strategies
- IAM capabilities to support remote working at scale
Martin Kuppinger, Principal Analyst at KuppingerCole, will look at the impact of the current crisis on IT, what and what not to do, and why IAM is so essential for supporting WfH effectively. He also will look at measures that can be taken immediately without complex deployments.
In the second part, Jay Reddy, Senior Technical Evangelist at ManageEngine, will go into details regarding the IAM capabilities to support remote working at scale.
ManageEngine is bringing IT together for IT teams that need to deliver real-time services and support. Worldwide, established and emerging enterprises -including more than 60 percent of the Fortune 500 - rely on our real-time IT management tools to ensure tight business-IT alignment and optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.