APPLICATION
SECURITY
– THE FINAL FRONTIER
IN THE WAR AGAINST
CYBERCRIME?
Against the backdrop of an increase in remote workforces, robust
application security is a key consideration for CISOs at global
organisations. We hear from industry experts about how best to
manage this critical area of security.
I
n today’s digital
economy filled
with remote
workers (more
than 4.3 million
in the UK alone
according to
the ONS), BYOD and flexible working
spaces, organisations’ applications and
data need to be accessed from multiple
devices, locations and networks. As
such, they have less and less control
over which of these variables can be
trusted, leaving organisations vulnerable
to opportunistic hackers looking to break
in through an untrusted network, hijacked
device or stolen employee account.
Organisations are having to take
innovative approaches to secure critical
72
IP and sensitive data, while ensuring that
employees can access the information
they need on the go. Here we look at the
different approaches organisations can
take to secure critical applications in
today’s increasingly dispersed landscape,
as explained by top security experts.
GAVIN
GAVIN HILL,
HILL, VP
VP PRODUCT
PRODUCT AND
AND
STRATEGY
STRATEGY AT
AT BROMIUM
BROMIUM
Today’s digital economy allows
employees to work remotely, but as
they have become more dispersed,
the exposure to malicious agents has
become unmanageable. Hackers are
always looking for a quick and easy
route into organisations, and employees
using unsecured public networks or
personal devices to assess sensitive IP
gives them that opportunity.
It’s vital that companies find a way to
protect sensitive data without restricting
employees. Users need to be able to
access key resources knowing that they
can trust their machine, even if their
endpoint is compromised. Past attempts
to secure IP haven’t been up to the task.
Relying on remote desktop or virtual
desktop infrastructure (VDI) has proven
ineffective as hackers have engineered
quick and easy ways for malware to
‘break out’ of these software-based
virtual machines.
Instead, we need a new approach. By
using virtualisation to create hardware-
Issue 08
|
www.intelligentciso.com