THE ROAMING USER THREAT

In just the last few years we have become a world of roamers. Unlike the romantic notion from the past of a world traveller roaming the globe in search of exotic adventures, today’s roamer is the rather more mundane knowledge worker shuttling from the office to a client site, perhaps hopping on a wi-fi network at a coffee shop or in a hotel. Our historic adventurer knows to get vaccinated in advance against the very real risk of infection in the wild blue yonder. So we are led to reasonably ask why the modern mobile cloud roamer doesn’t take a similarly pragmatic approach to risks of wandering unprotected into the cyber-unknown.

Organizations spend billions of dollars to protect their networks against outside threats. JP Morgan Chase, which was recently the victim of a significant and high profile breach, spends over $250 million a year on security. Despite all of this investment, the attackers are still getting through the defensive perimeter and wrecking financial and organizational havoc.

Roaming users are a real and growing part of the problem. The security industry has invested heavily in ever more sophisticated ways to defend the network, applications and data from attack, introducing new products and technologies at a dizzying pace. Customers have scrambled to keep pace, investing in defense-in-depth architectures to beef up their perimeter. Yet it is a simple and common matter for a roaming user to head out into the world unprotected, only to get unknowingly, and unintentionally, infected with malware. Coming back into the office, the roaming user passes literally right under the nose of the ever-watchful network security team (and their banks upon banks of server-based perimeter security devices and infrastructure)! He or she kicks back, takes a sip of their morning coffee and then fires up their laptop to get the day going. And by that point, it is simply too late. The malware infection is in the network, spidering out, replicating, perhaps pulling down additional files from servers across the internet – and getting ready to do its’ dirty work.

The problem is that the whole concept of the server-based network perimeter has evolved – the horse has bolted from the barn and we’re never going to get it back inside. The world has clearly moved to a mobile cloud based IT architecture. So what’s the solution? At iSheriff, we believe that security needs to be flexible and adaptable: cybercriminals will eventually find the gaps in your cyber-armor, and today’s roaming user is a hole big enough to drive a metaphorical truck through. iSheriff’s Web Security Service keeps users fully protected and compliant wherever, and however, they are connecting. The user’s device automatically and transparently connects to our global cloud network and enjoys the same level of protection as if the user were sitting back behind the network firewall.

User roaming is an absolutely necessary part of today’s business world, but it doesn’t have to open up gaps in your security posture.

 

Introducing iSheriff Cloud Security

Subscribe to Email Updates

About iSheriff

iSheriff is the leading provider of content and endpoint security from the cloud. We keep organizations and individuals safe from cybercrime, malware and digital threats. Thousands of businesses across a wide array of industries have deployed our solutions, including some of the most sophisticated buyers of security technology worldwide.