Now that we’ve settled into the rhythm of remote working, companies need to transition from the bootstrapped survival plans that were implemented back in 2020 to mature(r) remote working strategies. The early gripes of remote working such as an improper desk setup, disconnect after disconnect from the corporate VPN or multiple 2FA prompts throughout the day may have been tolerable initially, but cannot persist in the long term. IT teams are now charged with provisioning technologies to eliminate productivity drain and enable employees to work effectively wherever they are. While business growth hinges on employee productivity, IT professionals will undoubtedly be mindful of the security-usability tradeoff. Users need to be granted an appropriate level of access without making authentication arduous. Devices need to be thoroughly analyzed for threats and vulnerabilities regardless of ownership and management status. Access to corporate applications needs to be brokered whether hosted on-premise or in the cloud. In our upcoming session, we’ll discuss how to balance security and usability in the context of remote working: Usability: employees shouldn’t have to worry about how they’re going to get their work done; it should be as simple as flipping open a laptop and logging on. We’ll discuss how an SDP can eliminate the productivity problems associated with remote working without compromising security. Performance: an architecture that scales and adapts to the growing needs of your business is important for manageability. We’ll go over how an SDP reduces the management burden of traditional access technologies while eliminating the need to adopt point solutions to deal with niche security use cases. Privacy: employees are more mindful of the blur between work and personal lives, mainly because there hasn’t been a division for the past two years. How can IT teams overcome the privacy concerns of employees while making sure that they have the needed observability?

Hora

19:00 - 20:00 hs GMT+1

Organizador

Cloud Security Alliance: CloudBytes
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2025 359 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 26 de Junio de 2025
Mar 27 de Junio de 2025
Mié 28 de Junio de 2025
Jue 29 de Junio de 2025
Vie 30 de Junio de 2025
Sáb 31 de Junio de 2025
Dom 01 de Junio de 2025
Lun 02 de Junio de 2025
Mar 03 de Junio de 2025
Mié 04 de Junio de 2025
Jue 05 de Junio de 2025
Vie 06 de Junio de 2025
Sáb 07 de Junio de 2025
Dom 08 de Junio de 2025
Lun 09 de Junio de 2025
Mar 10 de Junio de 2025
Mié 11 de Junio de 2025
Jue 12 de Junio de 2025
Vie 13 de Junio de 2025
Sáb 14 de Junio de 2025
Dom 15 de Junio de 2025
Lun 16 de Junio de 2025
Mar 17 de Junio de 2025
Mié 18 de Junio de 2025
Jue 19 de Junio de 2025
Vie 20 de Junio de 2025
Sáb 21 de Junio de 2025
Dom 22 de Junio de 2025
Lun 23 de Junio de 2025
Mar 24 de Junio de 2025
Mié 25 de Junio de 2025
Jue 26 de Junio de 2025
Vie 27 de Junio de 2025
Sáb 28 de Junio de 2025
Dom 29 de Junio de 2025
Lun 30 de Junio de 2025
Mar 01 de Junio de 2025
Mié 02 de Junio de 2025
Jue 03 de Junio de 2025
Vie 04 de Junio de 2025
Sáb 05 de Junio de 2025
Dom 06 de Junio de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado