By 2021, cybercrime will cost the world $6 trillion annually—and the most common threats are internal attacks from malicious insiders. IT is now responsible for managing a larger attack surface than ever, thanks to end users relying on personal devices for work, and accessing cloud apps and corporate resources from remote locations. How can you deliver the access your employees need to do their best work while protecting your organization from internal attacks?
Today’s security approach must shift from unconditional confidence in users to zero trust fundamentals. A zero trust model relies on contextual awareness to adaptively grant access to authorized users using patterns based on identity, time, and device posture. This tightens the reins on access security while giving your users their choice of devices and apps.
Reduce your attack surface
Too often, IT gets stuck in an endless cycle of adding point products like SSL VPN, single sign-on, and endpoint management to address new security use cases. This not only increases complexity, but also creates a fractured experience for end users. Forrester reports that organizations pursuing zero trust can see significant benefits from choosing a single vendor. Citrix Workspace offers an end-to-end solution to implement zero trust principles, avoiding the gaps left from relying on assorted point solutions. Instead of trying to protect data and resources around the user, Citrix Workspace reduces your attack surface by protecting the user and the apps inside the workspace, where work actually gets done.
Enable remote access without VPN
Remote users need easy access to web applications, but relying on traditional VPNs solutions can create significant security risks. If bad actors can gain access through the SSL VPN, they have free reign over your entire network. You need a contextual security solution to meet zero trust requirements while enabling BYOD and access to apps deployed in a cloud. Citrix Workspace provides a secure space to work by enabling users to remotely access web applications deployed on premises using any device—without needing to access the entire network.
All devices. Total security.
One small user mistake can cost you—in fact, on average, a single data breach can total nearly $4M4. This makes it vital for your security strategy to address threats like malicious URLs being accessed, keyloggers, or screen-capturing malware for both managed and unmanaged devices. But a zero trust approach requires more than strict enrollment policies for employee devices.
Citrix Workspace with Citrix Access Control goes beyond traditional single sign-on and multi-factor authentication to provide advanced, contextual access management tools for IT—like the ability to disable printing, copying, and pasting in certain scenarios—while Citrix Secure Browser isolates web traffic from the corporate network. And Citrix Endpoint Management keeps BYO, corporate, and other managed devices secure by isolating and protecting apps and content accessed in the workspace.
Extend security policies across the branch network
Citrix Workspace equips IT with proactive app protection and security policies that let users access all their SaaS and business apps through the Citrix Workspace app. And to further protect branch users, Citrix SD-WAN provides an ICSA labs-certified integrated perimeter firewall. This masks users and infrastructure from cyber-surveillance and encrypts all branch-to-branch egress traffic to prevent interception. By adding this architecture to the full-stack security of Citrix Workspace, you enable multi-layer security from a centralized location to all branches—a simpler and lower-cost solution than installing multiple firewalls across your organization.
Both employers and the employees must be committed to the prospects and demands of working remotely, especially during this period of social isolation. We hope the security insights discussed in this article are excellent ways to start.