As More Enterprises Turn to Cloud Applications to Support Remote Employees, Securing Access is In the Spotlight
By: Orhan Yildirim
Microsoft announced last week that demand for cloud services rose a stunning 775%, causing them to have to prioritize customers given capacity limitations, even as they raced to add more capacity in.
In a March 28 blog post, officials said that demand for its new Windows Virtual Desktop usage grew by more than three times, particularly in regions where social distancing recommendations or regulations were put into place. The company is throttling non-essential Office 365 services, responding to growth in their popular Teams real time communications and collaboration application design for virtual work, and have been understandably prioritizing health-related workloads driven by the COVID-19 pandemic.
Other cloud providers are experiencing similar surges, including companies offering Unified-Communications-as-a-Service (UCaaS) and Containers-as-a-Service (CaaS) like Google, Microsoft, Zoom, 8×8, Amazon Web Services, and IBM.
What does this mean for enterprises who have had to pivot to virtual working as the main or even only mode, immediately and for months to come? IT teams –also working virtually – have been working overtime to keep up with these fast-moving changes. These IT heroes have been named “essential workers” by governments who have categorized roles where workers may be required to report to the office, or a data center, or other physical locations to ensure critical communications networks, services and applications remain available and protected.
For those having to reconfigure accounts, to deal with VPNs or other private network types, to ensure cloud capacity and bandwidth is adequate to support these unanticipated surges, having automated security systems in place – including Privileged Access Management automated systems – is a huge plus.
Black Swan events like the completely unanticipated COVID-19 pandemic are a true test of every organization’s network and security posture, impacting remote access, business continuity and security measures, as access becomes the most demanding and important challenge to address.
In a physically controlled setting, IT teams have complete visibility into and control over network access, internal networks, data, and applications. When all workers go remote, the risks can skyrocket, including connecting through insecure WiFi access, increasing the potential exposure to unsafe content that may impact a business.
When you add in cloud services, not only can network sessions be compromised, but entire datasets and applications that live in public clouds expand the potential attack surface possibly exponentially.
And while various flavors of VPNs, Single Sign On (SSO) applications, and multi-factor authentication can be used to validate and only let authenticated and authorized users in, having a comprehensive PAM solution in place makes it easier for IT teams to secure data at rest and in motion.
Adversaries get this. They see COVID-19 as a prime opportunity to break into enterprise and government systems given these unexpected vulnerabilities, and mining data and information stored on public, private or hybrid clouds can be highly lucrative in the dark world (whether stealing sensitive and valuable information or attempting ransom).
Despite the speed with which the COVID-19 turned the world upside down, IT teams are working non-stop to ensure their organizations are protected, and are doing so with full security platforms which include SIEM tools and analytics, SSL inspection, intrusion detection and prevention, network firewalls, DDoS prevention, data leak prevention (DLP), SSL threat mitigation, application firewalls, and above all identity management.
We understand this and the importance of Privileged Access Management as key frontline defense because we are hearing from our large clients in banking, telecom, healthcare and more that they are successfully managing the transition, including the massive shift to cloud. They are maintaining infrastructure integrity, while also protecting data and applications served from the cloud and are doing so with modern PAM software that scales.
Ironsphere can stand up solutions within days, given our open architecture and unique approach, which are more easily and efficiently integrated into multi-cloud environments – more naturally adaptive and cost efficient than legacy PAM vendor solutions. We stand by to support the heroic IT teams who are making it possible for healthcare providers and other critical service providers to operate in ways that will save lives – without risking what could be devastating security breaches.
With the explosion of data being stored and shared in cloud environments, the role of IT teams becomes increasingly complex, and the need for task automation more compelling than ever. Enterprises are including IT task automation across many areas, including Privileged Access Management (PAM), and are adopting related Privileged Task Automation (PTA) related to PAM to address new challenges, including those posed by work-from-home scenarios.read more
Enterprise IT professionals continually strive to simplify the routine tasks they need to perform frequently. The opportunities to do so, associated with Privileged Access Management, lead to substantial improvements in business outcomes, and generally happier IT teams.read more
Regulatory compliance is becoming more challenging for all industries, but in the financial, payments, contact center, and healthcare industries, the requirements are becoming even more intense, especially given attacks (and successful breaches) of mission-critical systems in these industries.read more