Tech giants prepare to tackle cybersecurity threats in a hybrid working model

Tech giants prepare to tackle cybersecurity threats in a hybrid working model

Technology companies are preparing to deal with cybersecurity threats that have increased with the adoption of a hybrid working model. Experts believe that the hybrid way of working has led to a greater adoption of digital operations, which has greatly increased the need to protect the data generated.

A Forrester study recently found that 80% of Indian organizations plan to adopt a hybrid working model in the next 12-24 months. However, 71% of security leaders said they lacked high or complete visibility into remote employees’ home networks, raising major security concerns.

Hybrid work has brought multiple clouds, devices, networks and endpoints into the mix, which has expanded the digital attack surface, said Huzefa Motiwala, director of systems engineering for India and SAARC, Palo Alto Networks. “Exchanging between these, while still being part of the corporate network, can leave companies vulnerable to attack. Too many of these can make developing a cybersecurity strategy a complex affair, while weak remote access policies and implicit trust in many devices make it easy for bad actors to get in and orchestrate a breach.”

Networking major Cisco said its Zero Trust platform provides a solution for securing all access to an organization’s applications and infrastructure. Zero Trust is a security model based on maintaining strict access controls and trusting no one by default.

“Unlike traditional security, Zero Trust protection is not based solely on location. That way, you can ensure that only the right people and devices have permissions to access specific data at specific times. We also have a secure hybrid worker solution that unifies protection at scale and makes it easy for users to verify devices, enable secure access, and always defend hybrid workers from any location,” said Minhaj Zia, Director of Collaboration Sales, Cisco India and SAARC.

IBM has also adopted a Zero Trust strategy that provides effective access control that balances trust and risk. “We leverage IBM Security Software solutions that use machine learning and artificial intelligence to analyze key parameters such as user, device, activity, environment and behavior, in context to determine holistic risk scores. This analytics drive more accurate contextual authentication decisions to better protect both the business and user experience,” said Prashant Bhatkal, Security Software Sales Leader, IBM Technology Sales, India and South Asia.

According to the Dell Technologies Global Data Protection Index report, many companies lack the ability to manage mission-critical data, handling 10x more data today than they did 5 years ago.

“With the rise of this data, the need to manage business processes across multiple networks has increased significantly. Therefore, it is imperative that companies ensure smooth data management with customized cybersecurity infrastructure solutions. With increasing entry points for malicious actors coupled with the rise of sophisticated ransomware, malware, and sensitive information leaks, the loss of mission-critical data can cripple an organization, slowing its growth in the digital age,” said Ripu. Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India.

At Dell Technologies India, employees receive regular updates to global data protection standards. “Our initiatives, such as choosing a VPN (virtual private network), performing a password audit and adopting the right infrastructure solutions in the workplace, have kept Dell Technologies employees safe and optimistic,” added Bajwa.

subscribe to mint newsletters

* Please enter a valid email

* Thank you for subscribing to our newsletter.

Leave a Comment