FEATURE : HYBRID WORKFORCES
HYBRID WORK IS HERE TO STAY AND WE ’ RE GOING TO SEE MORE USE CASES EMERGE WHERE ORGANIZATIONS NEED SECURITY SOLUTIONS THAT ENABLE THE BUSINESS AS OPPOSED TO THE MORE DRACONIAN ALLOW / BLOCK SCENARIO .
One key thing is the association with the channels or paths of data that are important to protect . We need to not only consider the threats , but also what can happen from a data leakage perspective if , for example , someone accidentally dragged a file on to a personal OneDrive or email account .
This is another area that can be controlled in Forcepoint ONE , so there is a lot of flexibility offered .
Can you provide an example of how Forcepoint One has helped to transform a customer ’ s security posture and the benefits they have received ?
How does Forcepoint ONE offer a simple path to a Zero Trust architecture ?
The simplest path to Zero Trust is to not just permit certain things but continue to inspect them .
Technology-wise , you might block a malware site straight up and not allow connectivity , or you could allow movement of data to something that is managed or maybe unknown and unsanctioned at that point in time but inspect what ’ s going on .
It will sit in the path of traffic for an application with a proxy – that can be a reverse proxy or agentless , for example . Configurability wise , there are also connectors into apps with APIs .
Hybrid work exacerbates the need for Zero Trust . Not only are there standard devices being used outside of the office , there are also mobiles and iPads so it ’ s difficult to be able to trust any of these .
If I was on a business trip , connected to Wi-Fi in a coffee shop , there is a point for exfiltration and for vulnerabilities to be exploited .
This really is about knowing who the person is , allowing access to the things they ’ re supposed to have access to , but then controlling what they do with the data that they work with every day .
How does the platform simplify security while ensuring scalability and performance ?
It ’ s really the combination of the hybrid work , SaaS application enablement and being in that ‘ grey ’ area . Not forcing the old school block or allow scenario , but instead enabling the business .
The platform is built out on top of different hyperscalers , such as AWS . We provide this global network of connectivity and access to applications , while still providing security and control .
Through technology such as CASB we can identify applications via shadow IT discovery . We can track these and decide whether there are risks associated and , if so , whether it should be blocked or allowed but brought under IT ’ s preview .
Forcepoint ONE allows things like discovery of an application , movement into a control plane perspective and then also from a security posture benefit perspective .
Zero Trust Network Access ( ZTNA ), specifically , is a way to provide access to a corporate file store or application to specific individuals . This could be a contractor or a partner that you ’ re working with , allowing use of that application while providing security around it .
There ’ s actually more than 300 points of presence that exist today in that network from a connectivity perspective . Because it is not built on a strict , rigid model , we can scale up and down on the fly which means there ’ s no need to purchase finite resources – it just happens automatically .
Similarly , if a new customer comes on board , on a shared multi-tenant service , and they have 100,000 or more users , we don ’ t want that to affect another customer ’ s ability to protect their applications .
Regardless of the other tenants that are in the environment , we ’ re able to provide control and that sets Forcepoint ONE apart from many other technologies in the SASE and SSE Magic Quadrant spaces .
54 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com