Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

11 Things To Have In Your Coronavirus Business Continuity Plan

From implementing user-specific access control policies and presenting applications through the cloud to preparing for staff augmentation and core system outages, here are the big issues a coronavirus business continuity plan should address.

Back 1 ... 5   6   7   8   9   ... 12 Next

Modifications For Control Based On Physical Location

Any security control that was based on physical location has needed to be reconsidered during the coronavirus pandemic since the organization can’t guarantee that the computer or device are where they expected them to be, said Morey Haber, chief technology officer and chief information security officer at BeyondTrust. In contrast, a zero-trust model doesn’t care where the user is logging in from.

Physical location-based security controls can include access controllers for networks as well as network zoning, both of which Haber said were standard for any office-based environment. But now, Haber said businesses need to shift away from a model that permits access inside a specific geolocation and instead look at the trustworthiness of the device itself, with additional gating for BYOD situations.

Swapping location control with something more obtuse can give organizations more confidence that a user and device are who they say they are, according to Haber. A bank in Europe that works with BeyondTrust had to drop all physical location security controls to facilitate work from home during COVID-19, which Haber said required the company’s CISO to jump through some very challenging hoops.

Back 1 ... 5   6   7   8   9   ... 12 Next

sponsored resources