We weathered 2020’s shift to remote work, so now the question is: What comes next?
It’s imperative that IT administrators mitigate security risks that COVID-19 revealed, modernize their tech stacks, and future-proof organizations. Traditional on-premises infrastructure and directory services are no longer the best way to manage and secure users, resources, and devices — particularly as remote users tunnel into internal networks and increasingly rely on cloud-based resources.
COVID-19 Revealed IT Security Risks
Amid the shift to remote work, we saw a spike in publicly accessible RDP ports and exposed VPNs, as well as the use of unmanaged devices. Admins had to scramble to access, troubleshoot, and secure remote user machines, and they must now manage hybrid work environments in which users move regularly between their offices and their homes to work. In fact, U.S. remote work days doubled during the pandemic, according to Gallup, and at least some of this shift is permanent.
As users continue to work outside the office, we need new ways to ensure they can access the resources they need to get their jobs done without relying on the internal network. On-prem directory infrastructure like Active Directory® requires add-ons if admins want to extend its domain to remote users, macOS® and Linux® devices, cloud-based resources, and more. However, IT can regain centralized control and security by centralizing with cloud-based infrastructure.
Webinar with Industry Veterans
Join us for a live webinar on Tuesday, Sept. 29 at 11 a.m. ET to hear from two industry veterans — a longtime former General Electric CIO and a leading industry analyst — to learn how to use this moment to update your IT infrastructure and ensure more secure and efficient operations. Former GE CIO Gary Reiner and Stephen O’Grady, the principal analyst and cofounder of RedMonk, will host a conversation about the seismic shifts the IT industry experienced this year and give you practical tips to respond.
Reiner sat down with JumpCloud CTO Greg Keller in March to talk IT trends and the future of work. Among the insights he shared was that the traditional perimeter security model must be replaced with a dynamic security model that doesn’t rely on physical infrastructure or the four walls of the office to keep resources secure. Using modern cloud infrastructure, you can manage users and their resources no matter where they’re located, with fine-grained security controls at every layer.
At its core, the right way to think about security is to get to the point where all of your permissions and policies are at the data level, and all of the validation of user access is being done with equal effectiveness across the board.Gary Reiner
Webinar Topics & Agenda
Join this live event to learn:
- Why the historical perimeter security model can’t keep up in modern workplaces
- What IT vulnerabilities the COVID-19 pandemic brought to light
- How to implement cloud infrastructure and enforce a dynamic security model that functions no matter where your users or their devices are located
- Practical tips to reduce your on-premises footprint and transition to the dynamic security model
You’ll also have time to ask your own questions of Reiner and O’Grady, so come prepared if you want to pick their brains about IT transformation and security. Learn more about the event and save your seat here: