Adaptive security & compliance
Traditionally IT invests heavily in building and securing its perimeter with firewalls, antivirus, and other security measures. This was effective when technology, workers and data access were relatively static. IT could secure one worker's desktop computer at a particular cubicle in an office building with a single, hardwired point of network access. The network firewall guarded the perimeter, anti-x software protected various endpoints, and intrusion detection software prevented hacks and breaches.
Today, walls aren’t enough. Now security must protect all aspects of the business independently of infrastructure, access, location, device – or the user’s identity.
Next generation security must be people centric
The focus today is on securing content and data. But this presents a growing challenge as data is no longer tied to specific devices or even well-defined points of access. It’s now associated with the workforce. And while workers are a company’s greatest asset, they are often the weakest link when it comes to security.
- According to Vormetric's 2015 Insider Threat Report, 89% of the organizations globally surveyed felt they were vulnerable to insider threats, including negligent, malicious and compromised insiders.
- Besides hackers with bad intentions, careless employees – such as those who forget to logout as admins, don't lock their mobile devices, or click what look to be “harmless” links – can be equally dangerous
Today’s technology must be more personal, and able to predict employees’ needs and the contexts in which they’re working. It must provide much-needed flexibility while at the same time enhancing security – not compromising it.
Reducing the risk of internal threats
While human failure in today’s environment may result in a higher potential for breaches and security threats, better technology could detect and more quickly mitigate these risks, enhancing regulatory compliance. RES offers advanced capabilities that can help secure employees -- still allowing them to work how and where they need to, but also enabling IT to ensure they continue to work in a secure fashion.
RES triggers different views and access of the workspace based on worker context such as location, device, time of day and other context triggers. This dynamic, flexible configuration ensures that the most secure apps are only accessed within the right context, automatically.
Dynamic privilege management
With RES, organizations can enable dynamic privileges to elevate or restrict access rights to app, installation and control panel applets to limit and protect local admin privileges. This gives admins just what they need to do their jobs, but prevents exposing security gaps to the public.
Blacklisting & whitelisting
RES offers app and web-based security (i.e., blacklisting and whitelisting) to enable organizations to block problematic or even dangerous websites or executables. RES can link white lists or black lists to each worker’s context, dynamically blocking access based on defined policies. This reduces the risk of opening malicious files and accidentally introducing malware into the organization.
Too often as workers' roles change or terminate they don't immediately lose access to apps no longer needed. This not only often breaks internal compliance policies but increases an organization's internal threat levels. By automatically de-provisioning apps as needed when a worker’s role changes, RES can reduce this risk while creating a traceable record to better meet compliance requirements.
Security benefits of RES:
Internal threat protection
- Whitelisting and blacklisting
- Automatic subscribe and unsubscribe to apps and services
- Dynamic admin privileges
Better IT control
- Secure and adapt access based on context
- Reduce unauthorized use of applications and peripherals
- Establish disaster recovery of the employee workspace
- Access control and visibility
Secure employee enablement
- Self service password resets
- Better manage and secure mobile devices
- Promote security through self service
Related resourcesSEE ALL
Dig a little deeper
How can we help you with your next step? Fill out the brief inquiry form below, and we’ll get in touch with you shortly.
Thank you for your interest. A RES representative will contact you shortly.
Have questions? Contact RES