Working from anywhere is part of the dynamics of many companies and professionals, and fully remote or hybrid work models have become the new normal. The pandemic has forced companies to adopt remote work models in a matter of weeks, and this has opened up many security holes. It is not by chance that we are experiencing a wave of cyber attacks: Cyber criminals have started to use these loopholes, notably, to hijack organizations' data and systems.
To prepare for remote work, most enterprise IT teams have chosen to establish terminal servers as a middleware, between corporate applications and the remote worker. This architecture, launched in the 1990s, is known as VDI – virtual desktop interface. In addition to VDI, there is also a massive use of VPN technologies or virtual private networks. The main reasons that led companies to adhere to this architecture are the cost and the wide availability of trained professionals.
As it is an architecture from the 90s, client-server type, this architecture requires that the employee has applications installed on his computer (such as VPN Client, for example), in addition to using specific TCP ports, which must be protected by firewalls and security devices. The complexity of managing the configurations of these terminals, in addition to the exposure of TCP ports on the Internet, creates fertile ground for cybercriminals to act.
Evolution to Cloud Architectures
The concept of a cloud workspace was introduced by Google in the 2010s, precisely to eliminate these weaknesses. With cloud-based technologies, installation, support, monitoring and remote work management processes have become more effective, and most importantly, secure.
Well, and when it comes to security, we need to understand how a secure structure actually works. In this sense, we cite the Zero-Trust architecture, as used in Cloud Workspace, for example.
This “Zero Trust” model, as translated into Portuguese, offers more stringent security checks as it allows applications and systems to be accessed only by previously authenticated and authorized users. This security architecture is considered to be sophisticated and quite effective against threats.
Access to information becomes unified and more secure. In addition to optimizing management and work processes, the tool stands out when it comes to safety. So check out the 8 Benefits of Cloud Workspace.
- Secure transmission: To ensure data security and deter suspicious users on the network, the entire session is encrypted with AES 256.
- High performance and low cost: because it uses the Akamai network for content delivery, it has less communication time.
- Corporate and strong authentication: in addition to integrating with the client authentication server (AD), it allows SSO through SAM-L (optional) and also multi-factor authentication (MFA) through email, SMS or TOTP (temporary, one-time password ); it also integrates with SIEM (Splunk).
- Multi-Cloud, Hybrid Cloud: management for hosts in Matrix, whether in retail clouds or in environments offered by the customer.
- Greater visibility with fine details: with detailed user information, it is possible to build a greater security base, in addition to identifying possible threats.
- Easy management: the solution offers more autonomy in management, providing more efficiency in the processes.
- Safety in communication: Edge servers automatically drop sessions from DDoS attacks at the network layer and inspect web requests to block threats.
- Simplified access management: central point of entry and control through a single management portal with complete auditing of user activity.
Cloud Workspace is a solution that aims to improve productivity with more efficiency and time optimization. Bet on modern tools and count on the services offered by Matrix to contribute to your company's digital transformation!