Home Applications ExtendedEnterprise.IO a Cybersecurity Framework for a Secure Digital workplace

ExtendedEnterprise.IO a Cybersecurity Framework for a Secure Digital workplace

0
ExtendedEnterprise.IO a Cybersecurity Framework for a Secure Digital workplace
0

Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the workplace, the classroom and even into government entities, CXOs should consider the opportunities for increased productivity and communication with customers and constituents seriously, as well as understand the increased security risks posed by online, anytime access to private networks and data

Work now happens everywhere. Employees are accessing information and applications at the office, from home, in cafes, and even at 10,000 feet, on many personal and corporate endpoints, across a variety of networks. Today’s expanding organizational, and work perimeters provide even more excellent opportunities for cybercriminals. Modern zero-day threats and Man-in-the-Middle (MITM) attacks are good examples of the response from governments with increased cyber regulations and compliances that have introduced in the past two years.

Leveraging EUC technologies and SD-WAN can help mitigate the risk and exposure for companies allowing remote workers or contractors into the corporate perimeters but when relying on this can cause gaps in both your security and compliance.  The Extended Enterprise Framework supports the evolving digital workspace and the need for enterprises to embrace a framework of trust between the components in their security enclave. The Extended Enterprise Framework for Cybersecurity worksheet was created to help identify these gaps.  My recent Cybersecurity research into 2018’s Data breaches and new breach compliance laws implemented this year in the US designed the EEF.

Trying to keep up with new regulations and compliance frameworks both national or global is the use case for using the EEF. The EEF worksheets are here. This worksheet is blank with 13 boxes with examples of the type of technology in those areas. Fill it out with your current security and access capabilities. Then compare it to the EEF impact vectors diagram to see areas where your identified gaps have vulnerabilities. Then compare it to the EEF Breach report for 2018 to look at the companies that had those same gaps breached in 2018.

This month’s spotlight EEF Worksheet is on Citrix Virtual Apps and Desktops 7.X. Citrix is a EUC technology company that focuses on both EUC and SD-WAN. Citrix is leveraged in a 3rd party remote worker or contractor use case in many companies today. This technology had many complaint and security capabilities to support this capability but based on the EEF gap analysis it highlights where it is susceptible to advanced phishing techniques using social engineering and programming expertise, bots, and ransomware threats without both advanced configuration and 3rd party integrations.  Are you using Citrix for remote contractors? Are you configured for the gaps? Like OS security flaws visibility, governing access and control, Virus scanning and Compliance monitoring?  Use this month’s EEF for Citrix Worksheet to help build your gap analysis for your contractors and remote workers.

Using EEF for guidance can more effectively safeguard 3rd party access as your digital workspace strategy expand and evolve at the same time as dynamic cyber threats escalate and adapt to target new vulnerabilities beyond traditional perimeters. http://extendedenterprise.io

Categories:
Jaymes Davis Jaymes Davis has been providing solutions and technical expertise in the computer industry since 1996 specializing in fringe technologies and Advanced computer sciences. Mr. Davis came to Tehama.io, as one of the industry’s top consultants with over 600 client projects ranging from global enterprise companies of 20,000+ employees to regionalized medium-sized businesses to small businesses with 5-25 employees.During his career, Jaymes has helped his clients leverage virtualization technologies to increase their IT efficiencies, address business requirements, and lower the total cost of ownership for their IT infrastructures. He is responsible for the design and development of Entisys Solutions’ Virtualization Oriented Architecture™ (VOA), a methodology that closely aligns business strategies with IT infrastructure solutions.Jaymes is a published author whose whitepapers and articles have been endorsed by the industry’s top virtualization experts and innovators. Prior to joining Entisys Solutions in 2006, Jaymes held the position of Chief Technical Architect with Server Centric Consulting.Speaking at VMworld 2011, 2012 Citrix Synergy Best Practices for Xendesktop, Autodesk University and NVIDIA GPU Conference 2016. Recognized by CRN for the top virtualization Practice in North America in 2012 and Tech Elite 250 #1 Virtualization practice for 2011 to 2015. 

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]

    Downloads

      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors

          Close