SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Distributed Workforce
Distributed Workforce
Management in the Cloud:
Spreading IT Security Wherever
Employees Roam
White Paper: Distributed Workforce


Distributed Workforce Management in the Cloud:
Distributed Workforce
Spreading IT Security Wherever Employees Roam


      Contents

      Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

      More Users Are Working Outside of the Traditional Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

      The Challenge for IT Departments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

      Cloud-Based Management Ideal for Mobile Workers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

      Symantec.cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

      Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

      More Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Distributed Workforce Management in the Cloud:
    Spreading IT Security Wherever Employees Roam



          Introduction
          The ever-increasing availability of faster, wireless network access, wirelessly enabled laptops and other devices, and
          collaboration tools such as Instant Messaging (IM) are turning the traditional office into an un-tethered workspace that
          can happen just about anywhere, any time. But all this poses new challenges for IT departments who must monitor and
          secure the online interactions of these highly distributed and roaming workers.

          Remote workers such as teleworkers and employees at remote offices often are "always on," surfing the Net,
          communicating with colleagues and others, accessing data and applications critical to the business—much of which
          happens outside of the protections available through the corporate network or VPN. Meanwhile, employees that are highly
          mobile tend to migrate over numerous network environments and geographic locations, thus increasing opportunities for
          exposure.

          All this makes it more difficult for IT to consistently enforce policies, ensure laptops and other endpoints are protected
          with the most current security mechanisms and malware protections, and safeguard electronic interactions. To address
          this complexity, a growing number of companies are opting to call on security experts who can, via hosted or cloud-based
          solutions, help organizations more efficiently and effectively manage and protect their distributed workforce. The benefits
          of this approach are numerous: reduced capital investments and operating costs, simplified IT, and the ability to
          streamline and improve secure information exchange among distributed employees. Cloud-based solutions also can
          protect much more than just the device by securing and managing the remote workers’ movements as they traverse the
          Internet, access email, send and receive IMs and more.



          More Users Are Working Outside of the Traditional Office
          It is estimated that the worldwide mobile worker population will have grown from 919.4 million in 2008 (accounting for
          29% of the worldwide workforce), to 1.19 billion in 2013, accounting for 34.9% of the workforce.1 Even among workers
          who do not consider themselves to be road warriors, market research firm Gartner estimates that today, 45% of workers
          in the United States are out of the traditional office a minimum of eight hours per week. Adding further proof that the
          mobility trend is a global phenomenon, analysts at IDC report that the largest number of mobile workers today is found in
          the Asia-Pacific region. In Western Europe, half of the workforce is considered to be mobile.2

          Workers today are as likely to do their jobs on their own laptops as they are to labor away on mobile equipment issued by
          their employers. Regardless of who pays for the equipment, workers at organizations of all sizes are texting, emailing,
          downloading corporate documents, accessing portals, even surfing the Web to research clients or competitors while on the
          road, at home, at customer sites, in hotels, on airplanes, or at nearby coffee shops.

          The benefits of such an un-tethered workforce are many. Employee productivity ranks high as a desired outcome, allowing
          workers to do what they have to do from wherever they happen—or need—to be. The evolving distributed workspace
          means an increasing number of employees have neither a company-provided physical office nor a desk, and their work is
          increasingly happening 24 hours a day, 7 days a week.3 Contrary to an assumption that this is turning society into a
          population of obsessive and stressed out wage-slaves, a growing number of studies suggest that the ability to be

         1-Worldwide Mobile Worker Population 2009 – 2013 Forecast: December 2009, IDC #221309, Volume: 1
         2-Worldwide Mobile Worker Population 2009 – 2013 Forecast: December 2009, IDC #221309, Volume: 1
         3-Watchlist: “Continuing Changes in the Nature of Work, 2010-2020” 30 March 2010. G00174602




1
Distributed Workforce Management in the Cloud:
Spreading IT Security Wherever Employees Roam


      productive nearly everywhere is actually providing more flexibility to address the quality of work and life balance issues.
      Consider this paradox: a 2009 survey of 100,000 workers conducted by Kelly Services (a workforce service provider) found
      that 76 percent of respondents feel that the ability to work outside the office, yet remain in constant contact, has been a
      positive development, even though almost a third are now working longer hours.4

      Employees today also are leveraging more sophisticated collaboration tools, such as IM, that promise instant
      communication and knowledge sharing. Collaboration tools, including IM, are vital to ensuring that regular and ongoing
      communication occurs between employees. While IM has yet to make the inroads that email and telephone have long
      enjoyed, Forrester Research says the numbers of "instant messaging junkies" are growing among telecommuting
      information workers, adding that it is time to make this key collaboration tool a corporate priority."5

      While the flexibility provides undisputed opportunities to enhance productivity, the fact remains that distributed workers
      do need secure, managed and dependable access to the applications and data necessary to do their jobs, regardless of
      their location, various workspaces and increased autonomy.



      The Challenge for IT Departments
      Many experts observe that IT organizations need to plan for increasingly chaotic environments that are no longer in their
      direct control.6 IT managers must keep pace with the constant demand for information, make sure that acceptable use
      and security policies are applied, and determine how to best manage remote systems, users and data/content.

      Remote users of electronic communications are susceptible to the same types of information security threats—from
      malware surreptitiously infecting a computer, to spam email clogging an inbox, or malicious websites unwittingly
      visited—as users sitting inside an organization’s four walls or working within the corporate network.

      But it is inherently more difficult to manage and monitor the activity of remote workers, and the devices they use.
      Typically, remote workers and their laptops are not physically attached to the corporate network, making it more difficult
      to gain visibility into their systems’ status. Remote, more autonomous workers also can make acceptable use policies more
      difficult to apply and enforce.

      Often, organizations don’t have the technical expertise or resources to institute and maintain the necessary endpoint
      protection on the equipment used by remote workers or to regularly and accurately scan devices for active infections. They
      cannot easily assess the health of these systems and determine whether protection levels are current, nor can they
      continually secure all of the myriad Internet sites employees visit, the URLs they click on, the emails and IMs they receive
      and send, or the executable files and other downloads they activate while working outside of the corporate network.

      To mitigate risks and ensure remote workers are protected yet able to access the data and resources when and where they
      need them, IT departments need to:

                 1. Protect the laptops used by employees to ensure these endpoints are regularly and accurately scanned for
                        active infections, and that they have adequate and up-to-date security levels.




     4-Kelly Global Workforce Index, 2009
     5-US Telecommuting Forecast, 2009 To 2016, Forrester, March 11, 2009
     6-Watchlist: “Continuing Changes in the Nature of Work, 2010-2020” 30 March 2010. G00174602




                                                                                                                                     2
Distributed Workforce Management in the Cloud:
    Spreading IT Security Wherever Employees Roam


                     2. Protect the electronic interactions of the distributed workforce, including email, Web communications and IM,
                            that occur anywhere and at any time.

                     3. Ensure that company assets are being used properly and that acceptable use policies are being implemented
                            correctly. By blocking inappropriate content, excessive downloads, inappropriate surfing, risky websites, etc.,
                            remote workers will be more productive and their devices and interactions will be better protected.

                     4. Ensure that the interactions of roaming users are secure, regardless of whether they are accessing corporate
                            resources from Wi-Fi hotspots, their homes, or anywhere else.



          Cloud-Based Management Ideal for Mobile Workers
          The growth of a distributed workforce is driving the need for cloud-based information assurance models that no longer
          solely depend on implementing internal infrastructure-based security controls. According to Forrester, telecommuting is
          accelerating the transition to cloud-based computing solutions, which work well for highly distributed organizations. This
          computing delivery model makes it very easy to deploy messaging security services by simply redirecting email, Web, and
          IM traffic through the service provider. And, in many cases it facilitates deploying agent-based technologies to remote
          workers over the Internet rather than via traditional machine-by-machine, on-premise installation techniques. Employees
          everywhere can access the same cloud service, which is managed and operated centrally.7

          Cloud solutions can also take the pressure off organizations to maintain large numbers of specialized, in-house staff with
          skills necessary to manage and secure their distributed workforce. Now these resources can be redeployed to take on
          other business critical projects. Cloud-based services offer a lower total cost of ownership (TCO) than solutions installed
          and run in-house, and they can watch for and stop threats before they ever infiltrate a corporate network and wreak
          havoc.

          With cloud-based services for security and management, organizations don’t have to restrict how, where and when their
          employees can take advantage of working remotely. Symantec MessageLabs Web Security.cloud service, for example,
          provides roaming and remote worker support options to help address these challenges. The service scans all Web content,
          promoting enhanced accuracy above services that rely solely on URL filtering for threat detection.

          Threat intelligence is shared across email, Web and IM for converged threat detection. A roaming agent support option is
          available that detects a user’s geographic location and network changes for optimal service performance. Administrators
          have at their disposal flexible quota management tools so they can set limits for browse time and bandwidth consumption,
          and the service features strong URL categorization allowing for more granular policies.

          Not all hosted and cloud-based services are alike though. Before adopting this computing model to serve a distributed,
          mobile workforce, IT departments need to understand and believe in the efficacy of cloud-based services. More
          importantly, they need to have high expectations of the providers’ service level agreements (SLAs), because at the end of
          the day, the service must be available, accurate and efficient.




         7-US Telecommuting Forecast, 2009 To 2016, Forrester, March 11, 2009




3
Distributed Workforce Management in the Cloud:
Spreading IT Security Wherever Employees Roam



      Symantec.cloud
      Symantec.cloud offers a comprehensive security and management solution for a distributed workforce. The solution is
      comprised of a variety of components, including Endpoint Protection.cloud, Web Security.cloud, Email Security.cloud and
      Instant Messaging Security.cloud. Using the power of cloud computing to provide essential protection,
      Symantec.cloud virtually eliminates the need to manage hardware and software on site. The solution offers one of the
      most aggressive and comprehensive service level agreements (SLA) in the industry – and Symantec.cloud measures and
      publishes its SLA results each month.

      Symantec.cloud helps IT managers protect the Web, email, and IM interactions of employees that are part of a distributed
      workforce. It helps organizations consistently develop, apply and enforce acceptable usage policies8 for all workers,
      including those working from various locations. Because the service is delivered in the cloud—outside of an organization’s
      network—threats that may exist in email, the Web, and IMs are addressed before they ever enter an organization’s
      network. Management for the distributed workforce is facilitated through the service as well; security and other services
      can be provisioned and updated to remote, distributed workers over the Internet. All workers can be maintained via a Web-
      based portal hosted by Symantec.cloud.

      In addition, the Web Security.cloud service is optimized to offer protection for workers logging on to WiFi hotspots and
      restricted access points while maintaining Web filtering policies at all times. And, the Endpoint Protection.cloud service
      provides an additional layer of security maintaining current protection levels and security policies for workers’
      laptops—even when they are outside the corporate network.

      The Symantec.cloud solutions optimized for a distributed workforce include:

                   • Endpoint Protection.cloud
                        The cloud-based solution helps protect an organization’s endpoint systems (Windows-based desktops, laptops,
                        and file servers) with advanced technologies for antivirus, antispyware, firewall, and host intrusion prevention,
                        all managed from a single Web-based management console. Security updates are automatic and seamless, so
                        protection of employees’ laptops is current whether in the office or on the road.

                   • Web Security.cloud
                        This solution blocks Web-borne virus, spyware and phishing threats and controls Web traffic through cloud-
                        based URL filtering. Support for roaming users extends protection and policy enforcement to employees who
                        access the Internet from outside the corporate network.

                   • Email Security.cloud
                        The service combines advanced email antivirus, antispam, and content filtering capabilities in an easy-to-
                        manage solution that requires no on-site hardware or software. The email security service supports all mobile
                        devices that send/receive email through corporate exchange servers associated with the service. This means
                        that as long as the end user’s email traffic is routed through an associated corporate exchange server, clean
                        email will be delivered to and from the handheld device.



     8-Not Just Words: Enforce Your Email and Web Acceptable Usage Policies, MessageLabs, 2008




                                                                                                                                            4
Distributed Workforce Management in the Cloud:
    Spreading IT Security Wherever Employees Roam


                 • Instant Messaging Security.cloud
                       The service provides security and control for businesses using public IM clients by applying antivirus, URL
                       filtering, content control and logging services to all instant messaging traffic.



          Conclusion
          Cloud-based services, such as Symantec.cloud’s solutions, are particularly appealing for managing an organization’s
          evolving and growing distributed workforce. Organizations do not need to be hindered by their lack of resources to
          implement and manage these remote workers because Symantec.cloud provides comprehensive, reliable coverage for
          email, Web and IM but doesn’t require expensive on-premise equipment, complex management or extensive expertise.

          Using services with automated capabilities to enforce end-user policies can help gain the confidence of customers and
          business partners. Endpoint Protection.cloud on laptops means regular, accurate scanning of devices for active infections.
          Regular and real-time monitoring, as well as acceptable usage policies that are more easily applied and enforced, means
          organizations will be protected from threats lurking in the various Internet sites employees visit, the URLs they click on,
          the emails and IMs they receive and send, or executables and other downloads they activate while working from remote
          locations.




5
Distributed Workforce Management in the Cloud:
Spreading IT Security Wherever Employees Roam



      More Information
       AMERICAS                        NETHERLANDS                    ASIA PACIFIC
                                       WTC Amsterdam
       UNITED STATES                                                  HONG KONG
                                       Zuidplein 36/H-Tower
       512 Seventh Avenue                                             Room 3006, Central Plaza
                                       NL-1077 XV
       6th Floor                                                      18 Harbour Road
                                       Amsterdam
       New York, NY 10018                                             Tower II
                                       Netherlands
       USA                                                            Wanchai
                                       Tel +31 (0) 20 799 7929
       Toll-free +1 866 460 0000                                      Hong Kong
                                       Fax +31 (0) 20 799 7801
                                                                      Main: +852 2528 6206
                                                                      Fax: +852 2526 2646
       CANADA
                                       BELGIUM/LUXEMBOURG             Support: + 852 6902 1130
       170 University Avenue
                                       Symantec Belgium
       Toronto, ON M5H 3B3
                                       Astrid Business Center
       Canada                                                         AUSTRALIA
                                       Is. Meyskensstraat 224
       Toll-free :1 866 460 0000                                      Level 13
                                       1780 Wemmel,
                                                                      207 Kent Street,
                                       Belgium
                                                                      Sydney NSW 2000
       EUROPE                          Tel: +32 2 531 11 40
                                                                      Main: +61 2 8220 7000
                                       Fax: +32 531 11 41
       HEADQUARTERS                                                   Fax: +61 2 8220 7075
       1270 Lansdowne Court                                           Support: 1 800 088 099
       Gloucester Business Park        DACH
       Gloucester, GL3 4AB             Humboldtstrasse 6
                                                                      SINGAPORE
       United Kingdom                  Gewerbegebiet Dornach
                                                                      6 Temasek Boulevard
       Tel +44 (0) 1452 627 627        85609 Aschheim
                                                                      #11-01 Suntec Tower 4
       Fax +44 (0) 1452 627 628        Deutschland
                                                                      Singapore 038986
       Freephone 0800 917 7733         Tel +49 (0) 89 94320 120
                                                                      Main: +65 6333 6366
                                       Support :+44 (0)870 850 3014
                                                                      Fax: +65 6235 8885
       LONDON                                                         Support: 800 120 4415
       3rd Floor                       NORDICS
       40 Whitfield Street             St. Kongensgade 128
                                                                      JAPAN
       London, W1T 2RH                 1264 Copenhagen K
                                                                      Akasaka Intercity
       United Kingdom                  Danmark
                                                                      1-11-44 Akasaka
       Tel +44 (0) 203 009 6500        Tel +45 33 32 37 18
                                                                      Minato-ku, Tokyo 107-0052
       Fax +44 (0) 203 009 6552        Fax +45 33 32 37 06
                                                                      Main: + 81 3 5114 4540
       Support +44 (0) 1452 627 766    Support +44 (0)870 850 3014
                                                                      Fax: + 81 3 5114 4020
                                                                      Support: + 852 6902 1130




                                                                                                  6
About Symantec.cloud
More than 31,000 organizations ranging from small
businesses to the Fortune 500 across 100 countries
use Symantec.cloud to administer, monitor, and
protect their information resources more effectively.
Organizations can choose from 14 pre-integrated
applications to help secure and manage their
business even as new technologies and devices are
introduced and traditional boundaries of the
workplace disappear. Services are delivered on a
highly scalable, reliable and energy-efficient global
infrastructure built on fourteen datacenters around
the globe. A division within Symantec Corporation,
Symantec.cloud offers customers the ability to work
more productively in a connected world.




                                                                   Symantec helps organizations secure and manage
For specific country offices        Symantec.cloud North America   their information-driven world with managed
                                                                   services, exchange spam filter, managed security
and contact numbers, please         512 7th Ave.                   services, and email antivirus.

                                                                   Copyright © 2011 Symantec Corporation. All rights
visit our website.                  6th Floor                      reserved. Symantec and the Symantec Logo are
                                                                   trademarks or registered trademarks of Symantec
                                    New York, NY 10018 USA         Corporation or its affiliates in the U.S. and other
                                                                   countries. Other names may be trademarks of their
                                                                   respective owners.
                                    1 (646) 519 8100               3/2011 21175478


                                    1 (866) 460 0000
                                    www.MessageLabs.com

Más contenido relacionado

La actualidad más candente

ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSIJMIT JOURNAL
 
The Workplace Engagement Economy Where HR, Social, Mobile, and Tech Collide
The Workplace Engagement Economy Where HR, Social, Mobile, and Tech CollideThe Workplace Engagement Economy Where HR, Social, Mobile, and Tech Collide
The Workplace Engagement Economy Where HR, Social, Mobile, and Tech CollideJessica Miller-Merrell
 
Managing at arm's length
Managing at arm's lengthManaging at arm's length
Managing at arm's lengthRegus
 
No strings attached - a white paper by HP and Staples
No strings attached - a white paper by HP and StaplesNo strings attached - a white paper by HP and Staples
No strings attached - a white paper by HP and StaplesStaples Advantage Europe
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...1E: Software Lifecycle Automation
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudySoftchoice Corporation
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Tackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksTackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksHarley Capewell
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 

La actualidad más candente (20)

ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 
The HR Technology Selection Guide
The HR Technology Selection GuideThe HR Technology Selection Guide
The HR Technology Selection Guide
 
The Workplace Engagement Economy Where HR, Social, Mobile, and Tech Collide
The Workplace Engagement Economy Where HR, Social, Mobile, and Tech CollideThe Workplace Engagement Economy Where HR, Social, Mobile, and Tech Collide
The Workplace Engagement Economy Where HR, Social, Mobile, and Tech Collide
 
Managing at arm's length
Managing at arm's lengthManaging at arm's length
Managing at arm's length
 
No strings attached - a white paper by HP and Staples
No strings attached - a white paper by HP and StaplesNo strings attached - a white paper by HP and Staples
No strings attached - a white paper by HP and Staples
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
I AM NOT A NUMBER WHY USER EMPOWERMENT IS GAINING GROUND IN FORWARD-THINKING ...
 
Interanet
InteranetInteranet
Interanet
 
Set the style
Set the styleSet the style
Set the style
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Tackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksTackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risks
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Security that works
Security that worksSecurity that works
Security that works
 
Which type of mobile worker are you?
Which type of mobile worker are you?Which type of mobile worker are you?
Which type of mobile worker are you?
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Mis3rd
Mis3rdMis3rd
Mis3rd
 

Destacado

395701387118444 1090193793database Policy
395701387118444 1090193793database Policy395701387118444 1090193793database Policy
395701387118444 1090193793database PolicyVishal Shah
 
Curriculum vitte
Curriculum vitteCurriculum vitte
Curriculum vitteVishal Shah
 
Bufferauthentication
BufferauthenticationBufferauthentication
BufferauthenticationVishal Shah
 
2011 Annual Report 4 27 12
2011 Annual Report 4 27 122011 Annual Report 4 27 12
2011 Annual Report 4 27 12Vishal Shah
 
Application 1785686
Application 1785686Application 1785686
Application 1785686Vishal Shah
 
Audit Committee Charter
Audit Committee CharterAudit Committee Charter
Audit Committee CharterVishal Shah
 
1620722312004553
16207223120045531620722312004553
1620722312004553Vishal Shah
 

Destacado (9)

395701387118444 1090193793database Policy
395701387118444 1090193793database Policy395701387118444 1090193793database Policy
395701387118444 1090193793database Policy
 
Curriculum vitte
Curriculum vitteCurriculum vitte
Curriculum vitte
 
Fb bylaws
Fb bylawsFb bylaws
Fb bylaws
 
Bufferauthentication
BufferauthenticationBufferauthentication
Bufferauthentication
 
2011 Annual Report 4 27 12
2011 Annual Report 4 27 122011 Annual Report 4 27 12
2011 Annual Report 4 27 12
 
Application 1785686
Application 1785686Application 1785686
Application 1785686
 
Audit Committee Charter
Audit Committee CharterAudit Committee Charter
Audit Committee Charter
 
1620722312004553
16207223120045531620722312004553
1620722312004553
 
J07213dec
J07213decJ07213dec
J07213dec
 

Similar a B Distributed Workforce Management In The Cloud Wp.En Us

Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksHyker Security
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceTricia Stream
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICEMicrosoft India
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 

Similar a B Distributed Workforce Management In The Cloud Wp.En Us (20)

Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital Workspace
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 

Más de Vishal Shah

Analyst%20 Metrics 2012 Q2 Final
Analyst%20 Metrics 2012 Q2 FinalAnalyst%20 Metrics 2012 Q2 Final
Analyst%20 Metrics 2012 Q2 FinalVishal Shah
 
2011 Annual Report 4 27 1 Linked
2011 Annual Report 4 27 1 Linked2011 Annual Report 4 27 1 Linked
2011 Annual Report 4 27 1 LinkedVishal Shah
 
Twitter Authentication
Twitter AuthenticationTwitter Authentication
Twitter AuthenticationVishal Shah
 
Face Book Finacial Share Steatment
Face Book Finacial Share SteatmentFace Book Finacial Share Steatment
Face Book Finacial Share SteatmentVishal Shah
 
Draft Ietf Oauth V2 12
Draft Ietf Oauth V2 12Draft Ietf Oauth V2 12
Draft Ietf Oauth V2 12Vishal Shah
 
Draft Hammer Oauth 10
Draft Hammer Oauth 10Draft Hammer Oauth 10
Draft Hammer Oauth 10Vishal Shah
 
Curriculum vitte
Curriculum vitteCurriculum vitte
Curriculum vitteVishal Shah
 
3.0 fso reg_guide
3.0 fso reg_guide3.0 fso reg_guide
3.0 fso reg_guideVishal Shah
 
Curriculum vitte
Curriculum vitteCurriculum vitte
Curriculum vitteVishal Shah
 
Information Package24 May2011
Information Package24 May2011Information Package24 May2011
Information Package24 May2011Vishal Shah
 

Más de Vishal Shah (20)

Analyst%20 Metrics 2012 Q2 Final
Analyst%20 Metrics 2012 Q2 FinalAnalyst%20 Metrics 2012 Q2 Final
Analyst%20 Metrics 2012 Q2 Final
 
2011 Annual Report 4 27 1 Linked
2011 Annual Report 4 27 1 Linked2011 Annual Report 4 27 1 Linked
2011 Annual Report 4 27 1 Linked
 
Twitter Authentication
Twitter AuthenticationTwitter Authentication
Twitter Authentication
 
Transcript
TranscriptTranscript
Transcript
 
Rfc5849aut
Rfc5849autRfc5849aut
Rfc5849aut
 
Filling1
Filling1Filling1
Filling1
 
Filing2
Filing2Filing2
Filing2
 
Filing
FilingFiling
Filing
 
Face Book Finacial Share Steatment
Face Book Finacial Share SteatmentFace Book Finacial Share Steatment
Face Book Finacial Share Steatment
 
Draft Ietf Oauth V2 12
Draft Ietf Oauth V2 12Draft Ietf Oauth V2 12
Draft Ietf Oauth V2 12
 
Draft Hammer Oauth 10
Draft Hammer Oauth 10Draft Hammer Oauth 10
Draft Hammer Oauth 10
 
Curriculum vitte
Curriculum vitteCurriculum vitte
Curriculum vitte
 
Cover letter
Cover letterCover letter
Cover letter
 
Agreement
AgreementAgreement
Agreement
 
3.0 fso reg_guide
3.0 fso reg_guide3.0 fso reg_guide
3.0 fso reg_guide
 
Agreement
Agreement Agreement
Agreement
 
Curriculum vitte
Curriculum vitteCurriculum vitte
Curriculum vitte
 
Cover letter
Cover letterCover letter
Cover letter
 
Vishal Shah1
Vishal Shah1Vishal Shah1
Vishal Shah1
 
Information Package24 May2011
Information Package24 May2011Information Package24 May2011
Information Package24 May2011
 

B Distributed Workforce Management In The Cloud Wp.En Us

  • 1. Distributed Workforce Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam
  • 2.
  • 3. White Paper: Distributed Workforce Distributed Workforce Management in the Cloud: Distributed Workforce Spreading IT Security Wherever Employees Roam Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 More Users Are Working Outside of the Traditional Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 The Challenge for IT Departments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Cloud-Based Management Ideal for Mobile Workers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Symantec.cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 More Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
  • 4. Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam Introduction The ever-increasing availability of faster, wireless network access, wirelessly enabled laptops and other devices, and collaboration tools such as Instant Messaging (IM) are turning the traditional office into an un-tethered workspace that can happen just about anywhere, any time. But all this poses new challenges for IT departments who must monitor and secure the online interactions of these highly distributed and roaming workers. Remote workers such as teleworkers and employees at remote offices often are "always on," surfing the Net, communicating with colleagues and others, accessing data and applications critical to the business—much of which happens outside of the protections available through the corporate network or VPN. Meanwhile, employees that are highly mobile tend to migrate over numerous network environments and geographic locations, thus increasing opportunities for exposure. All this makes it more difficult for IT to consistently enforce policies, ensure laptops and other endpoints are protected with the most current security mechanisms and malware protections, and safeguard electronic interactions. To address this complexity, a growing number of companies are opting to call on security experts who can, via hosted or cloud-based solutions, help organizations more efficiently and effectively manage and protect their distributed workforce. The benefits of this approach are numerous: reduced capital investments and operating costs, simplified IT, and the ability to streamline and improve secure information exchange among distributed employees. Cloud-based solutions also can protect much more than just the device by securing and managing the remote workers’ movements as they traverse the Internet, access email, send and receive IMs and more. More Users Are Working Outside of the Traditional Office It is estimated that the worldwide mobile worker population will have grown from 919.4 million in 2008 (accounting for 29% of the worldwide workforce), to 1.19 billion in 2013, accounting for 34.9% of the workforce.1 Even among workers who do not consider themselves to be road warriors, market research firm Gartner estimates that today, 45% of workers in the United States are out of the traditional office a minimum of eight hours per week. Adding further proof that the mobility trend is a global phenomenon, analysts at IDC report that the largest number of mobile workers today is found in the Asia-Pacific region. In Western Europe, half of the workforce is considered to be mobile.2 Workers today are as likely to do their jobs on their own laptops as they are to labor away on mobile equipment issued by their employers. Regardless of who pays for the equipment, workers at organizations of all sizes are texting, emailing, downloading corporate documents, accessing portals, even surfing the Web to research clients or competitors while on the road, at home, at customer sites, in hotels, on airplanes, or at nearby coffee shops. The benefits of such an un-tethered workforce are many. Employee productivity ranks high as a desired outcome, allowing workers to do what they have to do from wherever they happen—or need—to be. The evolving distributed workspace means an increasing number of employees have neither a company-provided physical office nor a desk, and their work is increasingly happening 24 hours a day, 7 days a week.3 Contrary to an assumption that this is turning society into a population of obsessive and stressed out wage-slaves, a growing number of studies suggest that the ability to be 1-Worldwide Mobile Worker Population 2009 – 2013 Forecast: December 2009, IDC #221309, Volume: 1 2-Worldwide Mobile Worker Population 2009 – 2013 Forecast: December 2009, IDC #221309, Volume: 1 3-Watchlist: “Continuing Changes in the Nature of Work, 2010-2020” 30 March 2010. G00174602 1
  • 5. Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam productive nearly everywhere is actually providing more flexibility to address the quality of work and life balance issues. Consider this paradox: a 2009 survey of 100,000 workers conducted by Kelly Services (a workforce service provider) found that 76 percent of respondents feel that the ability to work outside the office, yet remain in constant contact, has been a positive development, even though almost a third are now working longer hours.4 Employees today also are leveraging more sophisticated collaboration tools, such as IM, that promise instant communication and knowledge sharing. Collaboration tools, including IM, are vital to ensuring that regular and ongoing communication occurs between employees. While IM has yet to make the inroads that email and telephone have long enjoyed, Forrester Research says the numbers of "instant messaging junkies" are growing among telecommuting information workers, adding that it is time to make this key collaboration tool a corporate priority."5 While the flexibility provides undisputed opportunities to enhance productivity, the fact remains that distributed workers do need secure, managed and dependable access to the applications and data necessary to do their jobs, regardless of their location, various workspaces and increased autonomy. The Challenge for IT Departments Many experts observe that IT organizations need to plan for increasingly chaotic environments that are no longer in their direct control.6 IT managers must keep pace with the constant demand for information, make sure that acceptable use and security policies are applied, and determine how to best manage remote systems, users and data/content. Remote users of electronic communications are susceptible to the same types of information security threats—from malware surreptitiously infecting a computer, to spam email clogging an inbox, or malicious websites unwittingly visited—as users sitting inside an organization’s four walls or working within the corporate network. But it is inherently more difficult to manage and monitor the activity of remote workers, and the devices they use. Typically, remote workers and their laptops are not physically attached to the corporate network, making it more difficult to gain visibility into their systems’ status. Remote, more autonomous workers also can make acceptable use policies more difficult to apply and enforce. Often, organizations don’t have the technical expertise or resources to institute and maintain the necessary endpoint protection on the equipment used by remote workers or to regularly and accurately scan devices for active infections. They cannot easily assess the health of these systems and determine whether protection levels are current, nor can they continually secure all of the myriad Internet sites employees visit, the URLs they click on, the emails and IMs they receive and send, or the executable files and other downloads they activate while working outside of the corporate network. To mitigate risks and ensure remote workers are protected yet able to access the data and resources when and where they need them, IT departments need to: 1. Protect the laptops used by employees to ensure these endpoints are regularly and accurately scanned for active infections, and that they have adequate and up-to-date security levels. 4-Kelly Global Workforce Index, 2009 5-US Telecommuting Forecast, 2009 To 2016, Forrester, March 11, 2009 6-Watchlist: “Continuing Changes in the Nature of Work, 2010-2020” 30 March 2010. G00174602 2
  • 6. Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam 2. Protect the electronic interactions of the distributed workforce, including email, Web communications and IM, that occur anywhere and at any time. 3. Ensure that company assets are being used properly and that acceptable use policies are being implemented correctly. By blocking inappropriate content, excessive downloads, inappropriate surfing, risky websites, etc., remote workers will be more productive and their devices and interactions will be better protected. 4. Ensure that the interactions of roaming users are secure, regardless of whether they are accessing corporate resources from Wi-Fi hotspots, their homes, or anywhere else. Cloud-Based Management Ideal for Mobile Workers The growth of a distributed workforce is driving the need for cloud-based information assurance models that no longer solely depend on implementing internal infrastructure-based security controls. According to Forrester, telecommuting is accelerating the transition to cloud-based computing solutions, which work well for highly distributed organizations. This computing delivery model makes it very easy to deploy messaging security services by simply redirecting email, Web, and IM traffic through the service provider. And, in many cases it facilitates deploying agent-based technologies to remote workers over the Internet rather than via traditional machine-by-machine, on-premise installation techniques. Employees everywhere can access the same cloud service, which is managed and operated centrally.7 Cloud solutions can also take the pressure off organizations to maintain large numbers of specialized, in-house staff with skills necessary to manage and secure their distributed workforce. Now these resources can be redeployed to take on other business critical projects. Cloud-based services offer a lower total cost of ownership (TCO) than solutions installed and run in-house, and they can watch for and stop threats before they ever infiltrate a corporate network and wreak havoc. With cloud-based services for security and management, organizations don’t have to restrict how, where and when their employees can take advantage of working remotely. Symantec MessageLabs Web Security.cloud service, for example, provides roaming and remote worker support options to help address these challenges. The service scans all Web content, promoting enhanced accuracy above services that rely solely on URL filtering for threat detection. Threat intelligence is shared across email, Web and IM for converged threat detection. A roaming agent support option is available that detects a user’s geographic location and network changes for optimal service performance. Administrators have at their disposal flexible quota management tools so they can set limits for browse time and bandwidth consumption, and the service features strong URL categorization allowing for more granular policies. Not all hosted and cloud-based services are alike though. Before adopting this computing model to serve a distributed, mobile workforce, IT departments need to understand and believe in the efficacy of cloud-based services. More importantly, they need to have high expectations of the providers’ service level agreements (SLAs), because at the end of the day, the service must be available, accurate and efficient. 7-US Telecommuting Forecast, 2009 To 2016, Forrester, March 11, 2009 3
  • 7. Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam Symantec.cloud Symantec.cloud offers a comprehensive security and management solution for a distributed workforce. The solution is comprised of a variety of components, including Endpoint Protection.cloud, Web Security.cloud, Email Security.cloud and Instant Messaging Security.cloud. Using the power of cloud computing to provide essential protection, Symantec.cloud virtually eliminates the need to manage hardware and software on site. The solution offers one of the most aggressive and comprehensive service level agreements (SLA) in the industry – and Symantec.cloud measures and publishes its SLA results each month. Symantec.cloud helps IT managers protect the Web, email, and IM interactions of employees that are part of a distributed workforce. It helps organizations consistently develop, apply and enforce acceptable usage policies8 for all workers, including those working from various locations. Because the service is delivered in the cloud—outside of an organization’s network—threats that may exist in email, the Web, and IMs are addressed before they ever enter an organization’s network. Management for the distributed workforce is facilitated through the service as well; security and other services can be provisioned and updated to remote, distributed workers over the Internet. All workers can be maintained via a Web- based portal hosted by Symantec.cloud. In addition, the Web Security.cloud service is optimized to offer protection for workers logging on to WiFi hotspots and restricted access points while maintaining Web filtering policies at all times. And, the Endpoint Protection.cloud service provides an additional layer of security maintaining current protection levels and security policies for workers’ laptops—even when they are outside the corporate network. The Symantec.cloud solutions optimized for a distributed workforce include: • Endpoint Protection.cloud The cloud-based solution helps protect an organization’s endpoint systems (Windows-based desktops, laptops, and file servers) with advanced technologies for antivirus, antispyware, firewall, and host intrusion prevention, all managed from a single Web-based management console. Security updates are automatic and seamless, so protection of employees’ laptops is current whether in the office or on the road. • Web Security.cloud This solution blocks Web-borne virus, spyware and phishing threats and controls Web traffic through cloud- based URL filtering. Support for roaming users extends protection and policy enforcement to employees who access the Internet from outside the corporate network. • Email Security.cloud The service combines advanced email antivirus, antispam, and content filtering capabilities in an easy-to- manage solution that requires no on-site hardware or software. The email security service supports all mobile devices that send/receive email through corporate exchange servers associated with the service. This means that as long as the end user’s email traffic is routed through an associated corporate exchange server, clean email will be delivered to and from the handheld device. 8-Not Just Words: Enforce Your Email and Web Acceptable Usage Policies, MessageLabs, 2008 4
  • 8. Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam • Instant Messaging Security.cloud The service provides security and control for businesses using public IM clients by applying antivirus, URL filtering, content control and logging services to all instant messaging traffic. Conclusion Cloud-based services, such as Symantec.cloud’s solutions, are particularly appealing for managing an organization’s evolving and growing distributed workforce. Organizations do not need to be hindered by their lack of resources to implement and manage these remote workers because Symantec.cloud provides comprehensive, reliable coverage for email, Web and IM but doesn’t require expensive on-premise equipment, complex management or extensive expertise. Using services with automated capabilities to enforce end-user policies can help gain the confidence of customers and business partners. Endpoint Protection.cloud on laptops means regular, accurate scanning of devices for active infections. Regular and real-time monitoring, as well as acceptable usage policies that are more easily applied and enforced, means organizations will be protected from threats lurking in the various Internet sites employees visit, the URLs they click on, the emails and IMs they receive and send, or executables and other downloads they activate while working from remote locations. 5
  • 9. Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam More Information AMERICAS NETHERLANDS ASIA PACIFIC WTC Amsterdam UNITED STATES HONG KONG Zuidplein 36/H-Tower 512 Seventh Avenue Room 3006, Central Plaza NL-1077 XV 6th Floor 18 Harbour Road Amsterdam New York, NY 10018 Tower II Netherlands USA Wanchai Tel +31 (0) 20 799 7929 Toll-free +1 866 460 0000 Hong Kong Fax +31 (0) 20 799 7801 Main: +852 2528 6206 Fax: +852 2526 2646 CANADA BELGIUM/LUXEMBOURG Support: + 852 6902 1130 170 University Avenue Symantec Belgium Toronto, ON M5H 3B3 Astrid Business Center Canada AUSTRALIA Is. Meyskensstraat 224 Toll-free :1 866 460 0000 Level 13 1780 Wemmel, 207 Kent Street, Belgium Sydney NSW 2000 EUROPE Tel: +32 2 531 11 40 Main: +61 2 8220 7000 Fax: +32 531 11 41 HEADQUARTERS Fax: +61 2 8220 7075 1270 Lansdowne Court Support: 1 800 088 099 Gloucester Business Park DACH Gloucester, GL3 4AB Humboldtstrasse 6 SINGAPORE United Kingdom Gewerbegebiet Dornach 6 Temasek Boulevard Tel +44 (0) 1452 627 627 85609 Aschheim #11-01 Suntec Tower 4 Fax +44 (0) 1452 627 628 Deutschland Singapore 038986 Freephone 0800 917 7733 Tel +49 (0) 89 94320 120 Main: +65 6333 6366 Support :+44 (0)870 850 3014 Fax: +65 6235 8885 LONDON Support: 800 120 4415 3rd Floor NORDICS 40 Whitfield Street St. Kongensgade 128 JAPAN London, W1T 2RH 1264 Copenhagen K Akasaka Intercity United Kingdom Danmark 1-11-44 Akasaka Tel +44 (0) 203 009 6500 Tel +45 33 32 37 18 Minato-ku, Tokyo 107-0052 Fax +44 (0) 203 009 6552 Fax +45 33 32 37 06 Main: + 81 3 5114 4540 Support +44 (0) 1452 627 766 Support +44 (0)870 850 3014 Fax: + 81 3 5114 4020 Support: + 852 6902 1130 6
  • 10.
  • 11. About Symantec.cloud More than 31,000 organizations ranging from small businesses to the Fortune 500 across 100 countries use Symantec.cloud to administer, monitor, and protect their information resources more effectively. Organizations can choose from 14 pre-integrated applications to help secure and manage their business even as new technologies and devices are introduced and traditional boundaries of the workplace disappear. Services are delivered on a highly scalable, reliable and energy-efficient global infrastructure built on fourteen datacenters around the globe. A division within Symantec Corporation, Symantec.cloud offers customers the ability to work more productively in a connected world. Symantec helps organizations secure and manage For specific country offices Symantec.cloud North America their information-driven world with managed services, exchange spam filter, managed security and contact numbers, please 512 7th Ave. services, and email antivirus. Copyright © 2011 Symantec Corporation. All rights visit our website. 6th Floor reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec New York, NY 10018 USA Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 1 (646) 519 8100 3/2011 21175478 1 (866) 460 0000 www.MessageLabs.com