Another reinforced topic is the importance of improving security-related aspects, with cybersecurity being the main priority to increase spending on TIC.
In turn, the security teams felt their pressure increased during remote work as there was, in parallel, an increase in network complexity, a greater need for remote connections to corporate resources and the introduction of devices, people and work in home networks with low levels of security. For these environments, even VPNs alone were not sufficient to provide the necessary support for all connectivity activities, regardless of the work mode adopted.
In fact, the fear of losing market competitiveness led to fractured network perimeters and the expansion of the attack surface. To address these challenges, IT teams must take a zero-trust approach to cybersecurity.
The zero-trust approach means not trusting anything and anyone, while assuming that any user or device seeking access to the network has already been compromised. Through this approach, no device can connect to corporate resources freely, and must, whenever requesting access, provide valid credentials. Even so, he only receives permission to access the minimally essential resources to be able to carry out his work.
Thus, when denied traffic that is not validated by default, compromised devices and potential hackers cannot even execute a simple network command.
As such, organizations must adopt two crucial strategies to implement a zero-trust approach to true cybersecurity:
- Zero Trust Access (ZTA);
- Zero Trust Network Access (ZTNA).
ZTA extends access controls to the existing perimeter, from firewalls, authentication, authorization and accounting services (AAA), as well as single sign-on. Furthermore, it adds extra levels of verification, such as linking access to user role, physical geolocation or even time/day.
Finally, all devices are also examined to determine whether they are corporate assets or not, what software they are running and whether they have the latest patches, and whether the necessary security solutions are installed and enabled.
In fact, the authentication of each device and user provides IT teams with up-to-date network visibility and control, thus allowing for an easier identification of any suspicion, thus enabling the possible adoption of appropriate measures, whenever necessary. .
In turn, with ZTNA, all users who connect to the network, regardless of location and device, whether inside or outside the corporate network, are authenticated and have the necessary access, granted on a policy basis, with each individual to receive the same level of protection, as this technology provides secure access to applications, regardless of whether they are deployed in a data center or in Clouds (public or private).
With cyber threats on the rise, driven by the pandemic and consequent remote work, and with the network perimeter evolving, companies have been looking for ways to maintain control and visibility of the network. Although telecommuting is no longer mandatory, companies, regardless of the industry in which they operate, must implement zero-trust protections and controls, in order to ensure robust cybersecurity.
A Xerox study shows that 81% of SMBs have become more reliant on technology, admitting that this reliance will continue in order to support teams opting for hybrid work models. Still, 64% are quite optimistic about the future, even predicting an increase in strength, as they bet and will continue to bet on automation, digitalization and security solutions.
These solutions are capable of meeting the main challenge felt, that of correctly implementing a Digital Workplace, which makes the necessary technological resources available, thus ensuring as much or more productivity and security when compared to face-to-face work.
In addition, cloud-based device management solutions seek to increase IT productivity and improve the experience of employees, not least because, since 2020, IT teams have been relentlessly seeking to meet the demands of constantly changing work environments, while they are expected to increase productivity and improve the employee experience.
It is concluded, therefore, that companies, by investing in the best services and technological solutions, are guaranteeing a productivity that is almost equal to the work carried out in person.