Scenario:
Risks of Teleworking:
Challenges of teleworking:
Goal of a secure teleworking solution:
Fortinet’s Security Fabric is designed to address:
Comparing the Security Fabric with other security architectures:
Due to the recent pandemic that’s sweeping across the globe and affecting all industries, many companies are finding themselves stuck in a precarious situation and with a tough question to answer. “How can we quickly and effectively transition our workforce to mostly (if not all) remote users?”
Working remotely has its pros and cons, and in spite of some cultural resistance to the idea, for many employees it can actually be much more productive than requiring them to head into an actual office. However, for employers that have not already adopted teleworker solutions, rapidly switching most or all of their users to working remotely can be a technical nightmare if done improperly. Business disruption and the loss of operational continuity is top of the mind for every CISO, and to minimize those disruptions, organizations of any size should already have a BCDR (business continuity/disaster recover) plan in place. But for organizations that don’t, they now find themselves needing to quickly figure out how to quickly and securely transition their workforce to remote teleworker status.
As anyone who has had to do this before understands, switching your workforce to a remote user model can have its challenges. For one, the workforce needs to remain operationally efficient to still produce results – as well as instill a sense of normalcy to its employees. Business disruption is a critical issue, and organizations need to consider how to ensure that the technical implementations of your plan lead to no/minimal business disruptions, enable your employees to quickly access internal resources, and securely protecting them and the data they are accessing. The fallout from not being able to answer these questions can cause far more than just a few headaches for many organizations.
With users now using either personal or corporate devices to connect to a wide range of corporate resources – now highly distributed due to digital transformation – and doing some from home networks that may or may not be secured, increasing vulnerabilities and exploits making their way to – and onto – your network are a thing of certainty. Fortunately, the primary principles of security still apply across the board. That is:
To protect your data, along with users operating from a remote location, organizations must figure out:
Let’s take the fictional Acme Corp with 5000 employees as an example. They are dealing with the current pandemic that has forced them to move all 5000 employees to remote worker status.
They have also identified that, due to digital transformation, their data is located both on-premises as well as in the cloud. The company is using Salesforce and other SaaS applications, so they need to make sure that those SaaS applications and related data in the cloud are secure, and that the security team has visibility into who is using them and what they are doing. Additionally, they want to protect their users and make sure that any devices they are using to access internal resources are protected.
The company has a limited security team and so they have to find a solution that is not only efficient and scalable, but also fairly simple to implement. The networking team needs to be able to centrally control users’ endpoints and apply patching and update security applications to any devices that the company manages. In the end, they decided to implement Fortinet’s Security Fabric to resolve their telework issues and overcome related security challenges.
The two teams start by implementing FortiToken and FortiAuthenticator to provide multifactor authentication and single sign-on. They then deploy FortiEDR and FortiClient to provide strong endpoint protection with automatic remediation. This enables their workforce to remotely access all of the same resources and applications that they normally used when connecting from the office. FortiClient enables the networking team to provide advanced prevention protection and scalable VPN deployments to deploy to any devices that the organization manages. The security team then implements FortiEDR to compliment FortiClient by providing advanced detection and response protection. Automation Playbooks can also be created to improve time to resolution and reduce manual interventions, from detection to resolution.
For unmanaged (as well as managed) devices, FortiNAC is implemented to gain visibility into all devices seeking network access. FortiNAC enables the two teams to work together to gain full visibility into devices accessing their network, create policies to control what those devices are able to do once connected, and then provide ongoing monitoring combined with automated threat responses. This enables the teams to allow access to internal resources while still protecting the internal network from malicious actors.
Finally, the security team leverages FortiCASB for visibility and protection for SaaS applications. FortiCASB extends data-centric security policies to the cloud, protecting valuable data, and ensures that SaaS usage aligns with compliance requirements. In this example, they can use FortiCASB to gain visibility and control over their Salesforce and Office 365 applications. FortiCASB can answer questions like:
Finally, all of these solutions can be integrated together through the Fortinet Security Fabric platform. Unified management, configuration, and orchestration is key for reducing the time and overhead required to establish and maintain visibility and control across their new remote workforce.
Implementing Fortinet’s Security Fabric also helps Acme Corp. meet and maintain their compliance requirements when moving their workforce to remote status. It also helps reduce their attack surface by providing full visibility into devices accessing internal resources, controlling the actions they can take, and automating responses to reduce inefficiencies.
And finally, Fortinet’s Security Fabric can be deployed in any environment, including every major cloud platform and in multiple form factors, and still work as a single, integrated security system. This makes it the most comprehensive end to end security solution in the industry, enabling flexible deployment architectures and protection across all platforms.
To join our FUSE community, please click here.
Check out our latest events here
Subscribe to our Youtube community here!
If you have technical questions or need assistance contact us at telework@fortinet.com
#fortinet #securityfabric #teleworking #fortinac #fortiedr #forticlient #forticasb
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.