The new state of cybersecurity: protection inside and outside the company
More and more people are working remotely, be it for travel, meetings, home office or freelance, which can mean that they work far from the security processes and protocols at the core of the company.
So, to protect workers from remote locations, a different approach is required.
The facets of protecting a network without perimeters
The workforce has never been more distributed than it is now and therefore has never been at greater risk as some figures in the current scenario show:
- 40% of workers are itinerant users
- 88% of companies have 5 or more remote offices
- 78% believe that remote or roaming users are more vulnerable to attacks
- 66% have experienced a targeted attack, mostly remote or roaming users
Most companies still use traditional methods to protect roaming users as well as remote offices, but in their case, keeping up with cybersecurity expectations based on their current needs is practically impossible. What about those traditional methods?
- 82% of companies have a VPN policy, of this percentage 85% consider that roaming users violate these policies.
More than 60% of companies report that all roaming and remote traffic goes through the corporate network, but returning networks is costly and slows performance for users. This situation is driving the increase in the adoption of SaaS and direct access to the Internet, along with the pertinent security measures.
So, 60% of businesses already expect most applications to be SaaS-based within 2 years, but 41% are also concerned about data breaches that can be entered without SaaS IT oversight.
More and more companies are looking for a different solution, implemented and consolidated in the cloud, suitable for today’s users who can connect to work from anywhere in the world; a solution that is also capable of providing protection wherever they are.
wasp ® is our advanced cybersecurity solution to protect the resources of connected companies from different geographical points, which through its hybrid model guarantees the protection of fixed and portable computing resources, with a first-line security layer in the cloud with based on customer needs.