Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Ian Kilpatrick, chairman Wick Hill Group: How to Ensure Secure Remote Working

June 2010 by Ian Kilpatrick, chairman Wick Hill Group

Businesses have never been under more pressure to reduce costs and operate efficiently, yet at the same time workers are increasingly demanding remote access to company applications and data.

There has been a rapid growth in the number of users requiring access - road warriors, employees working from home, day extenders, third parties such as contractors and partners, etc. In addition, both remote and office workers want the freedom to access from the office, from home or from a cybercafé.

These developments have accelerated the need for companies to provide users with secure access to their corporate desktop from any computer. However, there are major security implications in this scenario, made more serious by the increasing likelihood of financial repercussions for data breaches from organisations such as the Information Commissioner’s Office (ICO) or the Payment Card Industry (PCI).

All this has created a headache for information security professionals, who have the unenviable task of managing and policing remote users with company laptops and home PCs. IT staff have to deal with user problems through the helpdesk, making sure that the anti-virus on their machines is up-to-date, and ensuring that all other updates and patches are installed. This is an expensive process and carries a number of security risks.

One approach to this problematic situation has been developed by leading security company Check Point. The company has come up with a product called Abra, a USB flash drive which serves as a plug-and-play secure, virtual office which can be used on any PC or laptop.

Abra creates a workspace where the user can access corporate files and applications securely. The user’s session and the host PC are segregated, so users can even operate on what might normally be considered insecure machines. Built-in encryption protects data when working or travelling, ensuring PCI and ICO compliance.

The Abra type approach provides remote or roaming workers with considerable operational freedom, but they are still subject to the company’s security policies. Indeed, for many companies, this approach can provide greater security management than existing arrangements.

The transfer of files between the PC hosting the Abra, and the corporate network, is strictly controlled. The use of applications and programmes too is subject to the applied security policy.

Only pre-approved applications are allowed to run within the secure virtual workspace. This effectively blocks the installation of malware and other threats. Abra can also block attempts to print from applications running inside this protected environment.

Security is enhanced by minimum password strength enforcement, as well as certificates and tokens for multi-factor authentication. A ‘virtual keyboard’ can be used at login to block password theft by key-loggers.

While Abra may not be the solution for all user environments, it is an ideal solution for organisations looking to let users purchase and manage their own PCs and laptops, and for those needing high security (including encryption) for devices outside the workplace


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts