Ericom Blog
 
 
Support Center   |    Forums   |    Blog   |    Contact

Can the Internet really become the new (secure) corporate network?

| 162
SHARE:
Can the Internet really become the new (secure) corporate network?

The opening slide in last’s week Gartner Security and Risk Management Summit in National Harbor, Maryland highlighted the (ostensibly) simple distinction between Good and Bad, and questioned whether we can really distinguish between the two when it comes to identifying malware. Even with numerous advanced security solutions monitoring both the network and the endpoint, it’s becoming increasingly difficult, if not downright impossible, to identify and stop 100% of malicious attacks before they can do damage.

If this is indeed the case, then perhaps it is time to change our mindset about how Internet content is consumed in the workplace. One thing is certainly clear: virtually all employees need to browse the Internet during the course of their daily tasks, and cannot function without it. Long gone are the days when Internet access was just for the chosen few.

Here's an interesting thought: If the vast majority of employees are using the Internet, then perhaps we should stop building dedicated secure networks and simply ensure that the public Internet in its entirety is accessed in a secure manner. Which begs the question—can this be done?

According to Neil Macdonald, Gartner VP & Distinguished Analyst, Remote Browsing is one of the hottest cyber security technologies in 2017. Remote Browsing provides corporate employees with a seamless way to securely access the Internet, with minimal IT overhead and zero impact on the user experience. Add to that the use of disposable containers that ensure rapid performance and eliminate malware persistence, and the use of Linux as a secure operating system in which to browse, and you get a winning formula.

So what do you think -- can the public Internet “replace” the secure corporate network? 

Profile:
Director of Product Marketing | Ericom Software

Related blog posts

comments powered by Disqus
 
 

Sign Up!

By subscribing you agree to the terms of our Privacy Policy

Categories

Recent Posts