Download PDF version Contact company

Check Point® Software Technologies Ltd., a provider of cyber security solutions globally, releases findings from a new assessment carried out amongst 1,200 IT security professionals globally, which examines how the shift to remote work changed organisations' security practices around users, devices, and access.

As the threat landscape evolves and cyber-attacks become increasingly more sophisticated, many organisations have surprisingly not implemented security solutions that ensure best-in-class connectivity and security for remote employees.

Critical security solutions

The COVID-19 pandemic has forever changed the way in which they work, most companies have transitioned their entire workforce from on-premise to remote working. While a majority of organisations have fully adopted remote work as a way of life, security-wise there are still many gaps that need to be bridged. Organisations are challenged with finding a balance between remote users’ productivity and ensuring device, access, and corporate assets security.

According to Check Point Software’s best practices, there are five critical security solutions

According to Check Point Software’s best practices, there are five critical security solutions needed to protect remote users against internet-based attacks, which include URL filtering, URL reputation, content disarm & reconstruction (CDR), zero phishing, and credentials protection. However, only 9% of organisations surveyed use all five protections and 11% do not utilise any of the listed methods to secure remote access to corporate applications.

Remote access security

Key findings include:

  • The remote-access security gap: 70% of organisations allow access to corporate applications from personal devices, such as unmanaged devices, or bring your own device (BYOD). Only 5% of respondents reported they use all of the recommended remote access security methods.
  • The need for internet access security: 20% of respondents reported that they do not use any of the five methods mentioned to protect remote users while browsing the internet, and only 9% use all five methods to protect against internet-based attacks.
  • A lack of protection against ransomware: 26% of respondents do not have an endpoint solution that can automatically detect and stop ransomware attacks. Thirty-one percent do not use any of the mentioned methods to prevent sensitive business data from leaking outside the organisation.
  • Email and Mobile Security: Only 12% of organisations that allow corporate access from mobile devices use a mobile threat defence solution. This highlights how exposed organisations are too fast-moving, 5th generation cyber-attacks that target remote workers.

While many companies have embraced the new hybrid and remote work models, they have not adopted all of the critical solutions needed to secure their remote workforce. This survey confirmed that organisations have a gap when it comes to users, devices, and access security,” said Itai Greenberg, Vice President of Product Management at Check Point Software Technologies.

Consolidated cybersecurity solution

Check Point Harmony is a unified security solution for users, devices, and access

To bridge this gap, organisations should progress to a Secure Access Service Edge (SASE) architecture. SASE security models provide quick and simple access to corporate applications, for any user and from any device, and protect remote employees from all internet-based threats.”

Overall in 2021, researchers have seen 50% more attacks per week on corporate networks. As cyber-attacks become more sophisticated and exploit the remote work environment, enterprises need a consolidated cybersecurity solution that strengthens their defences and improves their agility against attacks.

Check Point Harmony is a unified security solution for users, devices, and access. The solution provides organisations with comprehensive and robust workforce security, by consolidating 5 security products to provide complete protection for remote users - all in a single solution that is easy to use, manage and buy.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?