Over the past few challenging weeks, my colleagues from product management and I had numerous conversations with organizations around the world, who shared their concerns about the shift to remote working, how to handle the surge in access requests, and how it’s affected their business continuity.
Despite operating in different countries and industries, their concerns and challenges were similar — all relating to their ability to react quickly, with these three trends now emerging: Increased demand for urgent network changes
Many computer science and engineering see a dramatic increase in the volume of network changes due to the shift to remote working. Employees working from home need to urgently gain access to various organizational systems.
These time-sensitive requests are on top of the routine network changes that frequently occur in every organization. A developer, for example, who completes one project and moves ahead to work on another, now requires new network access to a different app/resource. These simple, routine changes are often implemented manually, by modifying firewall rules one by one, or using a searchable index of rules, at best, taking days, if not weeks. But when it takes too long to implement a change, especially if the change is critical, firewall admins may be forced to make the changes without having the time to thoroughly investigate the total impact on the security posture of the company.
Despite operating in different countries and industries, their concerns and challenges were similar — all relating to their ability to react quickly, with these three trends now emerging: Increased demand for urgent network changes
Many computer science and engineering see a dramatic increase in the volume of network changes due to the shift to remote working. Employees working from home need to urgently gain access to various organizational systems.
These time-sensitive requests are on top of the routine network changes that frequently occur in every organization. A developer, for example, who completes one project and moves ahead to work on another, now requires new network access to a different app/resource. These simple, routine changes are often implemented manually, by modifying firewall rules one by one, or using a searchable index of rules, at best, taking days, if not weeks. But when it takes too long to implement a change, especially if the change is critical, firewall admins may be forced to make the changes without having the time to thoroughly investigate the total impact on the security posture of the company.
No comments:
Post a Comment