fbpx

protection About users connecting outside the organization

Remote connection to the organization's resources

The corona virus has changed the work patterns we were used to.
One of the main things that have changed is the possibility of working from home by remotely connecting to the organization's resources.
Connecting from a home computer has dramatically increased information security incidents in the organization for a variety of reasons:
1. Unsecured Internet connection (home, cafes, etc.).
2. As a rule, the strictures applied to the user inside the organization do not apply to him outside the organization.
3. The computer may be used by a number of people who are not necessarily employees of the organization and may in good faith enter malicious websites.

The attackers identified this sensitive attack surface and launched broad campaigns to access computer resources and from there to the organization's resources.
Information security companies have developed advanced tools that will help us protect the computers of employees connecting outside the organization.
Among the leading companies is Fortinet.

Some of the product capabilities:

EMS: Zero Trust Network Access

An access control method that uses client device identification, authentication, and Trust Zero tags to provide role-based application access. The system allows system administrators the flexibility to manage network access for remote users outside the network. Access to the applications is granted only after verifying the device, verifying the user's identity, authorizing the user and then performing mandatory standard tests for entering the organization, for example, anti-virus, updated operating system, etc.

EMS: Web filtering

The Control Endpoint FortiClient feature allows the IT administrator to add Internet filtering to the end users even though they are outside the organization.
This feature is significant in the protection of the organization since it is known that there is a significant amount of websites that contain malware that can easily flow to the corporate computer and from there to the resources of the organization.

To receive a quote on information security for businesses

Do you have any questions?

Fill out the form and our representative will work with you:

Skip to content