Intelligent CISO Issue 30 | Page 23

infographic
devices . Two-thirds of IT security professionals anticipate malware , phishing , unauthorised user and device access , and unpatched / at-risk systems to be the most exploitable WFH attack vectors . In addition , 63 % expressed that remote work could impact compliance mandates that apply to their organisation ; especially GDPR , PCI-DSS , HIPAA and those with data breach notification .
Survey respondents employed various tools to secure remote work / home office scenarios with the top four controls being endpoint security , firewalls , virtual private networks ( SSL-VPN ) and multi-factor authentication ( MFA ). According to separate research by Enterprise Management Associates , 57 % of organisations regard the consolidation of access management solutions into a single platform to be a high or extreme priority for their business this year .
The WFH and tool consolidation trends coincide with a recent update to Pulse Access Suite , a secure access solution set that provides easy access for mobile workforces and a singlepane-of-glass to streamline provisioning , management and scalability . The Suite integrates adaptive identity and device authentication , protected connectivity , extensive visibility and analytics and threat response for hybrid IT . Organisations can centrally orchestrate Zero Trust policy to ensure compliant access to applications , resources and services across mobile , network and multi-cloud environments . u www . intelligentciso . com | Issue 30
23