Intelligent CISO Issue 08 | Page 72

APPLICATION SECURITY – THE FINAL FRONTIER IN THE WAR AGAINST CYBERCRIME? Against the backdrop of an increase in remote workforces, robust application security is a key consideration for CISOs at global organisations. We hear from industry experts about how best to manage this critical area of security. I n today’s digital economy filled with remote workers (more than 4.3 million in the UK alone according to the ONS), BYOD and flexible working spaces, organisations’ applications and data need to be accessed from multiple devices, locations and networks. As such, they have less and less control over which of these variables can be trusted, leaving organisations vulnerable to opportunistic hackers looking to break in through an untrusted network, hijacked device or stolen employee account. Organisations are having to take innovative approaches to secure critical 72 IP and sensitive data, while ensuring that employees can access the information they need on the go. Here we look at the different approaches organisations can take to secure critical applications in today’s increasingly dispersed landscape, as explained by top security experts. GAVIN GAVIN HILL, HILL, VP VP PRODUCT PRODUCT AND AND STRATEGY STRATEGY AT AT BROMIUM BROMIUM Today’s digital economy allows employees to work remotely, but as they have become more dispersed, the exposure to malicious agents has become unmanageable. Hackers are always looking for a quick and easy route into organisations, and employees using unsecured public networks or personal devices to assess sensitive IP gives them that opportunity. It’s vital that companies find a way to protect sensitive data without restricting employees. Users need to be able to access key resources knowing that they can trust their machine, even if their endpoint is compromised. Past attempts to secure IP haven’t been up to the task. Relying on remote desktop or virtual desktop infrastructure (VDI) has proven ineffective as hackers have engineered quick and easy ways for malware to ‘break out’ of these software-based virtual machines. Instead, we need a new approach. By using virtualisation to create hardware- Issue 08 | www.intelligentciso.com