Date post: | 21-Jan-2018 |
Category: |
Technology |
Upload: | akamai-technologies |
View: | 306 times |
Download: | 0 times |
©2017 AKAMAI | FASTER FORWARDTM
The amount of remote users continues to grow
Users need access to
internal applications
from across the globe
Contractors
Remote Employees
Suppliers
Partners
Mobile Users
©2017 AKAMAI | FASTER FORWARDTM
Most companies have remote access
solutions but they are complex…
75% of
enterprises
touch up to 14 network and
app components when
providing 3rd party remote access
Source: 2016 Soha Systems Survey
©2016 AKAMAI | FASTER FORWARDTM
“DMZs and legacy VPNs were designed for
the networks of the 1990s and have become
obsolete because they lack the agility
needed to protect digital businesses.”
Excerpt from Gartner's It's Time to Isolate Your Services
From the Internet Cesspool
©2017 AKAMAI | FASTER FORWARDTM
Enterprises Deploy Applications Behind Firewalls
App 1
Firewalls block
inbound connections
Firewalls allow
outbound connections
Firewall
Application
Access Control
User
©2017 AKAMAI | FASTER FORWARDTM
App 1
Firewall
Application
Access Control
Traditional Remote Access Solutions
Put a Hole in the Firewall
Network
Access Control
User
Client
> VPN
A bad guy stole credentials from a partner who you provide
remote access to for an application. The bad guy, gets
network access and is able to move laterally within the
network and find other systems like the point of sale system.
The partner credentials put the bad guy in the trusted zone so
why not give them full access?
©2017 AKAMAI | FASTER FORWARDTM
App 1
Firewall
Application
Access Control
Once a User Has Access to the Network
They Can Easily Move Laterally to Other Apps
Network
Access Control
User
Client
App 2Application
Access Control
App 3
> VPN
©2017 AKAMAI | FASTER FORWARDTM
Remote Access Increases Risk
63% of
all data
breaches
are linked to 3rd parties
You have seen the previous scenario
played out on the news many times…
The bottom line is traditional access
solutions, such as VPNs, can increase risk.
Source: 2016 Soha Systems Survey
©2016 AKAMAI | FASTER FORWARDTM
Remote access on-and off-boarding
often includes IT management:
• User hardware
• Client-side software
• VPNs, ADCs, load balancers
• Firewall changes
• Network Updates
• And more…
75% of
enterprises
touch up to 14 network and app
components when providing
3rd party remote access
Source: 2016 Soha Systems Survey
©2017 AKAMAI | FASTER FORWARDTM
IT also spends a lot of time on
monitoring and reporting remote access
Reporting
Remote Access
And it’s not always clear
Monitoring