Welcome to the Unbound Enterprise

Understanding the Need for the Unbound Enterprise

Unbound Work Requires Unbound Security

Getting to unbound depends on a corporate leadership open to the change of moving traditional software to the cloud. That is step one. Step two is re-envisioning cybersecurity for the unbound enterprise. As remote workers shift to cloud applications for productivity, and the workforce becomes more agile, traditional perimeter security breaks down. In this new environment, people can be anywhere. The data center is no longer the center of the data. User and data become the new security perimeter.

When COVID quickly forced a majority work from home environment, many companies experienced a surge in productivity and the wide-spread adoption of the cloud. For these companies, it is likely that leadership will keep remote work (in some form) as a long-term option for employees, even after the threat of the pandemic has passed. In fact, they’re embracing new, flexible technologies and arrangements that offer the ability to work from anywhere, at any time, on any device, and across applications that can exist anywhere. Users are no longer bound to the workplace. Applications and data are no longer bound to the corporate network. That’s what unbound means to me. 

Traditional security tends to take an outside-in approach, starting with the perimeter and building layers of security toward the data, all to keep the bad guys out. As many companies started to realize during the Sunburst attack—that’s an approach that falls short. So why not take an inside-out approach instead? Attempts to rein in users and data tend to be counterproductive because they usually cost organizations dearly, both in terms of production and overall efficiency. A user and data-centric security approach no longer starts with where they reside. No longer tethered to a fixed network, unbound employees become liberated from hardware infrastructure limitations of the past.

User and Data-Centric Security 

No matter how robust security strategies are, data breaches will continue to happen. As users continue to work remotely, they’ll continue to introduce new security risks. The cybersecurity path forward requires a deeper analysis of behaviors. The first step is establishing a behavior baseline at the individual level. What constitutes normal behavior? What behavior is unusual? Bad actors impersonate our employees to access and steal our data. Taking a closer look at how users interact with data no matter where it resides will help move the unbound enterprise left of breach. The deep understanding of behavior and risk creates a shift in security strategy—one where policies no longer have to be binary but instead, automatically personalized to the user.

Due to the level of specialized talent focused on cloud security, overall security of cloud applications often exceeds on-premises application security. But even cloud providers suffer from the talent shortage, and data security is still the responsibility of your organization and the employees accessing data. 

Cloud and Intelligent Security

The unbound enterprise will bring new levels of productivity and efficiency to organizations and their employees—but getting there requires a security strategy that is unbound as well. Expect to hear more on this topic from me and from other senior Forcepoint leaders in 2021. Until then, wishing you and your teams a safe and healthy end to this year!

And no security team can do it all. These days, you need to leverage AI and machine learning to help with creating and enforcing rules that play a role in executing security strategy at the user level. Done correctly, this marriage between cloud security and AI security will be invisible to the user. Productivity won’t be disrupted. Even better, a truly dynamic system can help identify and react to indicators of behavior, keeping your organization left of breach. 

This post was first first published on Forcepoint website by Nico Popp. You can view it by clicking here