Startup Observer.com
  • Home
  • Industries
  • Innovation
  • outsourcing
  • Business
  • Finance
  • Headlines
  • Opinion
  • News
Home Business Menlo Security Research Shows 75% of Organisations Re-evaluating Security Strategy as Remote and Hybrid Working Set to Remain
Business

Menlo Security Research Shows 75% of Organisations Re-evaluating Security Strategy as Remote and Hybrid Working Set to Remain

by wrich October 14, 2021
October 14, 2021
gawdo

– Three-quarters rely on traditional VPNs for remote access while a third also use zero trust as part of their remote access strategy
– Over half plan to reduce third party/contractor access to systems due to security risks

Bracknell, UK – A report launched today by Menlo Security, a leader in cloud security, highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ IT decision makers in the U.S. and the U.K., including a third at C-level – looks at attitudes to securing remote access to applications and resources and the adoption of zero trust solutions.

While most respondents (83%) say they are confident in their strategy for controlling access to applications for remote users, three-quarters are re-evaluating theirs in the wake of new ways of working and the growth in cloud application use. While half of employees are currently working remotely or adopting a hybrid approach, around two-fifths (42%) are expected to continue in 12 months’ time.

According to the findings, three-quarters (75%) of organisations continue to rely on VPNs (virtual private network) for controlling remote access to applications, which rises to 81% for organisations of 10,000+ employees. For around a third (36%) of organisations a zero trust approach also forms part of their remote access strategy.

“It seems that most businesses are confident in their remote access security, yet are still relying on a traditional and inherently insecure way of doing things using VPNs, which give access to everything on a network,” said Mark Guntrip, senior director, cybersecurity strategy at Menlo Security. “With only a third currently using zero trust network access, there’s a real opportunity to provide users with access to only those applications and resources needed to do their job. When you start to adopt this approach across everything you do then your whole security mindset changes.”

The top reason for implementing a zero trust solution is improved security, according to 60% of respondents, regardless of whether they are using it or not. One third (32%) point to ease of use, while speed of access and scalability are both more widely recognised among those already adopting a zero trust approach. Significantly, 40% of respondents believe that implementing a zero trust solution places less pressure on IT.

Despite overall confidence by global IT decision makers in the robustness of their strategy for controlling application access for remote users, Menlo Security’s research also shows that:

• Three-quarters of respondents believe that hybrid and remote workers accessing applications on unmanaged devices poses a significant threat to their organisation’s security. Despite this, around a fifth still allow unmanaged devices – laptops, desktops and mobile devices – to connect to corporate applications and resources.

• While the majority (79%) of respondents have a security strategy in place for remote access by third parties and contractors, there are growing concerns about the risks they present, with just over half (53%) planning to reduce or limit third-party/contractor access to systems and resources over the next 12¬–18 months.

Menlo’s Mark Guntrip adds: “As the internet becomes the new corporate network, controlling user access to private applications has become more important than ever. Organisations need to evolve their thinking from providing connectivity to the entire network to segmenting access by each individual application. The right zero trust approach will ensure seamless access between users and the applications they are authorised to use, while all other applications are invisible, preventing lateral discovery across the network.”

An infographic to accompany the report can be found here

Menlo Private Access
Menlo Security has a clientless-first approach to implementing Zero Trust Network Access, enabling organisations to secure access to applications from all devices – including managed, unmanaged and mobile devices. This approach minimises the workload on IT and security for deployment, while maximising the security posture of the company. The clientless-first approach can be augmented with a client for use cases that specifically require client-based access.

Unlike many ZTNA solutions that cannot monitor traffic being sent and received between an end user and a controlled application, Menlo Private Access ensures that security policy is always enforced by remaining inline between the end user and protected applications; utilising our Elastic Isolation Core as a control point to prevent sensitive data loss and stop potential malware from reaching the endpoint.

www.gawdo.com
Share on FacebookShare on TwitterShare on Linkedin
0 FacebookTwitterPinterestEmail
previous post
Mind the ‘Specialist Skills’ Gap The Open University’s Business Barometer report reveals a lack of en-try level and specialist talent
next post
Shareholders more likely to support eco-initiatives if they have experienced climate disasters

You may also like

Celonis and EcoVadis outline sustainable procurement partnership 

June 27, 2022

How can retailers launch an effective marketplace platform?

June 24, 2022

Check Point Software Opens New London City Office...

June 24, 2022
Editorial & Advertiser disclosureEditorial & Advertiser disclosureOur website provides you with information, news, press releases, Opinion and advertorials on various financial products and services. This is not to be considered as financial advice and should be considered only for information purposes. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third party websites, affiliate sales networks, and may link to our advertising partners websites. Though we are tied up with various advertising and affiliate networks, this does not affect our analysis or opinion. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you, or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish sponsored articles or links, you may consider all articles or links hosted on our site as a partner endorsed link.
gawdo.com
https://www.gawdo.com
  • About us
  • Advertising & Terms of Use
  • Contact Us
  • Privacy Policy

@2021 - All Right Reserved.


Back To Top
Startup Observer.com
  • Home
  • Industries
  • Innovation
  • outsourcing
  • Business
  • Finance
  • Headlines
  • Opinion
  • News
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT