Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
How Do I Make Sure My Work-From-Home Users Install Updates?
Most enterprise endpoint solutions will support policies to enforce recommended updates.
Question: How do I make sure my work-from-home users install updates?
Kurtis Minder, CEO of GroupSense: For corporate assets, most enterprise endpoint solutions will support policies to enforce the recommended updates for those machines. For users who are working from home from a personal machine, corporate VPN solutions often offer a solution for verifying the configuration of those machines prior to allowing access to the corporate network or application resources. This feature, commonly referred to as "endpoint control" or "endpoint protection," enforces a corporate policy that can include OS update level, endpoint security software (antivirus, endpoint detection and response) installation, and update level.
Connectivity alternatives to VPN can negate or minimize the need for endpoint policy enforcement. Solutions such as Zscaler's Private Access (ZPA) provides the user with direct access to the desired corporate application without any access to the underlying network components. This limits the exposure and attack surface. Integrated application security in the connectivity solution protects the native application.
Related Articles:
Check out this listing of free security products and services developed for Dark Reading by Omdia analysts to help you meet the challenges of COVID-19.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024