+ All Categories
Home > Technology > 3 Reasons It's Time for a New Remote Access Model

3 Reasons It's Time for a New Remote Access Model

Date post: 21-Jan-2018
Category:
Upload: akamai-technologies
View: 306 times
Download: 0 times
Share this document with a friend
21
3 Reasons It’s Time for a New Remote Access Model
Transcript

3 ReasonsIt’s Time for a New Remote Access Model

We’re here to talk about why

remote access technology

needs to change

Enterprises are

turning inside out1

©2017 AKAMAI | FASTER FORWARDTM

The amount of remote users continues to grow

Users need access to

internal applications

from across the globe

Contractors

Remote Employees

Suppliers

Partners

Mobile Users

©2017 AKAMAI | FASTER FORWARDTM

Most companies have remote access

solutions but they are complex…

75% of

enterprises

touch up to 14 network and

app components when

providing 3rd party remote access

Source: 2016 Soha Systems Survey

Traditional remote access models

are antiquated and can’t support

digital enterprises

©2016 AKAMAI | FASTER FORWARDTM

“DMZs and legacy VPNs were designed for

the networks of the 1990s and have become

obsolete because they lack the agility

needed to protect digital businesses.”

Excerpt from Gartner's It's Time to Isolate Your Services

From the Internet Cesspool

©2016 AKAMAI | FASTER FORWARDTM

Traditional access methods

increase security risk2

©2017 AKAMAI | FASTER FORWARDTM

Enterprises Deploy Applications Behind Firewalls

App 1

Firewalls block

inbound connections

Firewalls allow

outbound connections

Firewall

Application

Access Control

User

©2017 AKAMAI | FASTER FORWARDTM

App 1

Firewall

Application

Access Control

Traditional Remote Access Solutions

Put a Hole in the Firewall

Network

Access Control

User

Client

> VPN

Imagine this very real scenario

A bad guy stole credentials from a partner who you provide

remote access to for an application. The bad guy, gets

network access and is able to move laterally within the

network and find other systems like the point of sale system.

The partner credentials put the bad guy in the trusted zone so

why not give them full access?

©2017 AKAMAI | FASTER FORWARDTM

App 1

Firewall

Application

Access Control

Once a User Has Access to the Network

They Can Easily Move Laterally to Other Apps

Network

Access Control

User

Client

App 2Application

Access Control

App 3

> VPN

©2017 AKAMAI | FASTER FORWARDTM

Remote Access Increases Risk

63% of

all data

breaches

are linked to 3rd parties

You have seen the previous scenario

played out on the news many times…

The bottom line is traditional access

solutions, such as VPNs, can increase risk.

Source: 2016 Soha Systems Survey

©2017 AKAMAI | FASTER FORWARDTM

IT Resources Aren’t

Being Optimally Utilized3

Senior IT resources are often used to manage

remote access because of the complexity

©2016 AKAMAI | FASTER FORWARDTM

Remote access on-and off-boarding

often includes IT management:

• User hardware

• Client-side software

• VPNs, ADCs, load balancers

• Firewall changes

• Network Updates

• And more…

75% of

enterprises

touch up to 14 network and app

components when providing

3rd party remote access

Source: 2016 Soha Systems Survey

©2017 AKAMAI | FASTER FORWARDTM

IT also spends a lot of time on

monitoring and reporting remote access

Reporting

Remote Access

And it’s not always clear

Monitoring

What could these senior resources

accomplish if remote access

wasn’t so complex?

©2017 AKAMAI | FASTER FORWARDTM

There is a better way

©2016 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized

web experiences and manage complexity from peak

demand, mobile devices and data collection.

Akamai

Enterprise Application Access


Recommended