Tech majors rally to secure hybrid workforce

While in-office and remote collaboration has become the norm in organizations in a post-covid world, hybrid working comes with its own set of cybersecurity challenges. Increased risks to sensitive information and data have become a major concern, and tech majors are leading the fight to meet the challenges.

A Forrester study found that while 80% of Indian enterprises plan to adopt hybrid working within the next 12-24 months, 71% of security managers do not have high or full visibility into the home networks of remote employees, which raised huge security concerns.

The complex structure of a hybrid working model, comprising multiple clouds, networks, devices and endpoints has expanded the digital attack surface, said Huzefa Motiwala, Director of Systems Engineering, SAARC and India, Palo Alto Networks. “Switching from one to another while they are still part of the corporate network can leave businesses vulnerable to such attacks. Too many of them can make developing a cybersecurity strategy complex, while weak remote access policies and implicit trust on devices make it easy for bad actors to get in and orchestrate a breach,” he added.

In light of the heightened risks, networking majors have launched services to secure all access points to an organization’s applications and infrastructure. For example, Cisco’s Zero Trust Platform is a security model based on maintaining strict access controls, trusting no one by default.

“Unlike traditional security, the protection offered by Zero Trust is not based solely on location. It ensures that only the right people and devices have the necessary permissions to access specific data at specific times. We also have a Secure Hybrid Work solution, which unifies protection at scale and allows users to easily verify devices, enable secure access, and always defend hybrid workers from anywhere,” said Minhaj Zia, Director of Collaboration Sales, Cisco India and SAARC.

IBM has also adopted a Zero Trust strategy that provides effective access control to balance trust and risk. “We leverage IBM Security Software solutions that use machine learning and artificial intelligence to analyze key metrics such as user, device, activity, environment and behavior to determine high scores. holistic risks. This analysis leads to more granular and contextual authentication decisions to better protect both the business and user experience,” said Prashant Bhatkal, Security Software Sales Manager, IBM Technology Sales , India and South Asia.

According to Dell Technologies’ Global Data Protection Index, enterprises lack the capacity to manage critical data as they now process 10 times more data than five years ago.

“With an increase in data, the need to manage business processes across multiple networks has increased dramatically. Therefore, it is imperative for enterprises to ensure seamless data management with customized cybersecurity infrastructure solutions. “Increasing entry points for malicious actors coupled with the rise of sophisticated ransomware, malware and leaks of sensitive information, the loss of critical data can cripple an organization, stunting its growth in the digital age,” said said Ripu Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India.

To subscribe to Mint Bulletins

* Enter a valid email

* Thank you for subscribing to our newsletter.

Norma A. Roth