Securing access for remote
workers accessing the cloud
It can be a complicated
process to make sure remote
workers have high levels of
security. Alain Penel, Regional
Vice President – Middle
East, Fortinet, explains what
companies need to do and how
FortiGate solutions can help.
usinesses across the region are
B
now in the process of rapidly
enabling teleworking and
remote productivity solutions to maintain
business and operational continuity with
high levels of security. This can be a
complicated process when expediency
is so critical. To complicate the process
further, businesses in the region need
to provide a growing number of remote
workers with more than just a secure
connection back to the core network or
data centre resources they are used to
remotely connecting to.
As an increasing number of applications
are also being hosted in the cloud,
organisations need to consider providing
secure remote connectivity directly
to those applications rather than
backhauling those applications through
the core network. Direct connectivity will
not only reduce the load on the network,
but also improve overall user experience,
especially for high-bandwidth or latencysensitive
applications.
A unique secure solution for all
deployment scenarios
Deploying large-scale VPN solutions
for remote users enables simple
access, segmenting users based on
role, security profile and the content
and resources they require are firstorder
tasks.
Teams also need to identify users that
require special access to resources,
like power users, such as system
administrators, IT support technicians
and emergency personnel who require
a higher level of access to corporate
resources and the ability to operate
in multiple, parallel IT environments.
Or workers that process extremely
sensitive and confidential information
or require advanced access to
confidential corporate resources,
such as administrators with privileged
system access, support technicians, key
partners aligned to the continuity plan,
emergency personnel and executive
management and those users that
require site-based access.
These considerations require thinking
about the entire network architecture,
from cloud to on-premise to endpoint.
Fortinet addresses these and similar
requirements by providing a flexible
operating system that is consistent
across form factors – whether deployed
in the cloud, on-premise or in a power
user’s home office – and whose
management can be centralised for
policy orchestration, VPN templating
and user segmentation.
Enabling a multi-pronged
security approach
Our customers that deploy FortiGate
solutions in the cloud, on-premise
or at remote locations are able to
take advantage of its single pane
of glass management, enabling the
control and orchestration of multiple
firewalls across locations to establish
Alain Penel, Regional Vice President –
Middle East, Fortinet
and maintain consistent security and
user experience. We understand that
business performance largely depends
on user productivity, access to content
and applications, at any location, at
any time. With remote access and the
ability to manage performance across
locations using Secure SD-WAN as a
core capability, the Fortinet Security
Fabric securely provides flexible options
for mobile and fixed access to cloud
resources at massive scale.
Leveraging existing innovations
Addressing new or increased capacity
requirements due to growing demand
for applications hosted in the cloud as
well as SaaS services can seem like a
significant challenge. But by leveraging
the innovation and capabilities in
their existing technology investments,
organisations can often address a
majority of their requirements without
significant additional overhead. u
intelligent CLOUD SECURITY
www.intelligentciso.com | Issue 25
55