CINXE.COM

How can zero trust help secure the BYOD workforce? -- GCN

<!DOCTYPE html> <html class="no-js" lang="en"> <head id="Head1"><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://gcn.com/Articles/2020/10/05/zero-trust-BYOD.aspx?p=1","20201011105406","https://web.archive.org/","web","/_static/", "1602413646"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/><meta http-equiv="X-UA-Compatible" content="IE=edge"/> <title>How can zero trust help secure the BYOD workforce? -- GCN</title> <meta name="description" content="By reducing complexity with a unified platform and leveraging a zero-trust approach, IT teams can reduce risk and act quickly to efficiently manage and secure the environment anywhere endpoints exist."> <meta name="keywords" content="GCN, computer news, gcn.com, ada, product reviews, vivek kundra, intellipedia, defense knowledge online, windows, fdcc compliance, data.gov, microsoft, obama, defense technology, US-CERT, information assurance, cloud computing, virtualizaton, cybersecurity, cyber command, conficker, smart grid, wolfram alpha, gcn awards, open source, canes navy, conficker worm, ipv6, fisma, nist, ites2, cto, dko, voip, stimulus, cyberattacks, mobile, wireless, gcn awards, gcn magazine, government computer news magazine, gcn daily, blackberry, rugged it, PEO-EIS, cyber security jobs, cybersecurity jobs, cyber security career, cybersecurity career"> <meta property="og:title" content="How can zero trust help secure the BYOD workforce? -- GCN"/> <meta property="og:description" content="By reducing complexity with a unified platform and leveraging a zero-trust approach, IT teams can reduce risk and act quickly to efficiently manage and secure the environment anywhere endpoints exist."/> <meta property="og:url" content="https://web.archive.org/web/20201011105406/https://gcn.com/articles/2020/10/05/zero-trust-byod.aspx"/> <meta property="og:image" content="https://web.archive.org/web/20201011105406im_/https://gcn.com/-/media/GIG/EDIT_SHARED/Workforce/videoconference_0.jpg"/> <meta property="og:site_name" content="GCN"/> <!-- BEGIN Google Partner Tag HEAD CODE --> <script async="async" src="https://web.archive.org/web/20201011105406js_/https://securepubads.g.doubleclick.net/tag/js/gpt.js"> </script> <script type="text/javascript"> var googletag = googletag || {}; googletag.cmd = googletag.cmd || []; </script> <script> googletag.cmd.push(function() { googletag.pubads().addEventListener('slotRenderEnded', function (e) { if (!e.isEmpty) { // If the ad is not empty document.getElementById(e.slot.getSlotElementId()).setAttribute('class', 'ad-loaded'); } }); googletag.pubads().enableSingleRequest(); googletag.enableServices(); }); </script> <!-- END Google Partner Tag HEAD CODE --> <!-- BEGIN Olytics HEAD CODE --> <link rel="stylesheet" href="https://web.archive.org/web/20201011105406cs_/https://olytics.omeda.com/olytics/css/v3/p/olytics.css"/> <script type="text/javascript"> window.olytics||(window.olytics=[]),window.olytics.methods=["fire","confirm"],window.olytics.factory=function(i){return function(){var t=Array.prototype.slice.call(arguments);return t.unshift(i),window.olytics.push(t),window.olytics}};for(var i=0;i<window.olytics.methods.length;i++){var method=window.olytics.methods[i];window.olytics[method]=window.olytics.factory(method)}olytics.load=function(i){if(!document.getElementById("olyticsImport")){window.a=window.olytics;var t=document.createElement("script");t.async=!0,t.id="olyticsImport",t.type="text/javascript";var o="";void 0!==i&&void 0!==i.oid&&(o=i.oid),t.setAttribute("data-oid",o),t.src="https://web.archive.org/web/20201011105406/https://olytics.omeda.com/olytics/js/v3/p/olytics.min.js",t.addEventListener("load",function(t){for(olytics.initialize({Olytics:i});window.a.length>0;){var o=window.a.shift(),s=o.shift();olytics[s]&&olytics[s].apply(olytics,o)}},!1);var s=document.getElementsByTagName("script")[0];s.parentNode.insertBefore(t,s)}},olytics.load({oid:"d158cf08e5844cba89cc42fe00c7776d"}); </script> <script> olytics.fire( { behaviorId: '9897J1372478A9T', topic: 'Cybersecurity,Telework,Mobile,Trending' } ); </script> <!-- END Olytics HEAD CODE --> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <meta http-equiv="X-UA-Compatible" content="IE=edge"/> <meta name="viewport" content="width=device-width,initial-scale=1"/> <link rel="stylesheet" href="/web/20201011105406cs_/https://gcn.com/design/gig/fcw/2018/css/style_print.css?v=1"> <script> (function () { _ml = window._ml || {}; _ml.eid = '50202'; _ml.ht = 'shex'; _ml.em = ''; _ml.dm = ''; _ml.informer = { enable: true }; var s = document.getElementsByTagName('script')[0], cd = new Date(), mltag = document.createElement('script'); mltag.type = 'text/javascript'; mltag.async = true; mltag.src = 'https://web.archive.org/web/20201011105406/https://ml314.com/tag.aspx?' + cd.getDate() + cd.getMonth() + cd.getFullYear(); s.parentNode.insertBefore(mltag, s); })(); </script> <title> </title></head> <body> <form method="post" action="/web/20201011105406/https://gcn.com/Articles/2020/10/05/zero-trust-BYOD.aspx?p=1" id="form2" novalidate=""> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value=""/> <input type="hidden" name="__EVENTARGUMENT" id="__EVENTARGUMENT" value=""/> <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="J0B/Omh0K19Jqqln8Ktue2rxUhT+uzcVIM/xehlwpse9CST2JqP2njPRlZuNL5xMiMe/qU9k8J/wWFd2riL0GbMEQ153D6hZdxlpRNrykiGcSzXq4hKBEr7Z/d+IlebdYbni8hx6AmHLQwHifesm0Ja1E8wksYJIU/BXLET2taF3PQ6FWuKrnkbIeFc74BV5dlaP3glLvczI1Cm/155ug+3RB1jvD5vEU3x4ApzhKuxznBx1sXFrv5oerkd4uIQI9jRJlg34beRuPw+MP8AnC3aXAWCBklHLHxEtrGQxTf3lbLYtLTasmhaxnHDDDLiBVRPEWyh5d+1LYSS/AGJnMcgxw76GqCmySQwXCjsxCitDgd+vsPZs/S+jHKe4ULyhiNohFxWe18T8VH9Waj3sRWdhj4YHB1AwX4u7kLZcdlhXftoEORjU1d9hRUNZtSd+Q0WtCb7aPKpJWXM6rChR6pctFZalxwxho0JZsSOjVvfmUfadWw2zTUBnyCc0p3+VByzPZAHjKGHpz49piVXdely3XUo5zZuIWoYZZ8MKDdUasyjF5m7T0pxQrS8MeSTH71DRjdWbb5E/Y69Hs+Qq1aTGes0BbJuNNQPVCgAMtj85jI14zbygyH0X4H1LuYzxzO7O2Ogw3eVYpZl7oTNBHKIak/Svk4vPJzRFd1rpdwfs0STyFcpeFT9TKlwoy2NyhkGWqo+2YeW8q4utcGez7jr2axYNdV3iZXE3SdoNhf3rVu5MRwCBOKQp/chcUvvTUxvO8+OY4xu4ejue5V1yQbnyD9RiQIKPN7oUJZ+T5qfHVN0M6X117T3WF/KLhKQoCVjitvBPfwLJZvofWnEo5iMM3iWBWgb0jbE2cyCBkH1slHQZgOWfQNfrzpDqabzZXEbXpP+EkOL7+6H13y8XT4BYogwaEcN3aSjSv4JMPKpU6RzB8CWqwf+SBclV/N3F0qr0b+SKou5WzHRIg6O8k0Yqm8vFKyHnm1NKsEM3dwXg35+OJpMMueC+KkVFP8E2rA7IWfDX2YDJpQoWmF+mesaqv2jAqcpjkPA/aoUzmxc5OaPzBSY2y3D0PcXwH+kNMBGrCGjCfq3YZQj2RbYEndkOY5OjF8WxS5kl0CunJfVpdisoig3JJCN3o16kgYOl57zO6SmBkLnf+/tyGJlPHiJgBlXXw6H6iIS7zN27SGqSB/VRCzEqQT9saX6sjoTdUqMfGz8VbVLA/QqBRjSDHXdvA05t7nuJXahAOXX/PhTmqxoK8rPZZUOONRliRsZ5+UNmnO3KwenGegx2G9oZ94o3iCRc9rS3APhj9KilMu6DB6FfJ6obyvWuteatkSjb7szURYiG8v39kXlOsY8BsaaRNeA477GQcOCIoC7siEL4hI/vXznxpz8VlCdlN2si+D9IVdOAZ7X5Bu40IJAILYM6Rr9b80wfMZP8vC6vvYOZeYAMTNK9OSRD1qogovh9rTK3yAun/1UOLBRdlwW20In6pElGAtq7O5j/mKNo+SfQRtbKvj+xv43zzmf9xV331ZBg9ZIZJwQ2fNdNbI965tqQ7nR716/c6qVPr3J78h4o5ZhcNHgL70JK+1CFPonD8xcN8PWEN3WfKPeEboquct30WFpiqOpC+zkOhz4A982mCgcrYeAieyWyrjgwmQout7Yw/LjYdyqpyxn2Gnm+5A4rue3ydefDw73hMRwHIfQeH8eiM/cBqRMv4WCsGf+SvCWU0pys5jBKAf0/PjMhaREq/562Lba6rwbOXDEOUTDSAbrO2qZ+ZU956iUEr95ky6OGBwwOqGFSct5evXqeWwB8RSddsPhK1+BY+4ngwtkjh0MCtP/HZnllwaJgsrBEJ6SF+5s5oOcwSJqT+X26lAIch1qwLFnS2UI1j6GdrMo3eLPUQjd42uEUOoFfm00ugTxqN0dp4jn5MBTppnEAPs3PZUa1E5xq5T+D/Z75mAIJAynQ6OWaNqpOuKgaAtBESjHlC4xgX6lCSW7JMGj2py/YAZpgu/BoWWyuUIDzOvpu0DcrGFNiUkzUShHYAGffVspCzNCsnPrftzmIKWVWYTbW4eRfLGfZ7Nqr9QpeoNjXuKgtnn5ZTnIDe3FuPVuCbOYGVg56zpNeMuiCUtUAZYvGicJFDOa5sguypRUecFjmGKE8zI7zcTv+mkC0g5pNirE2odT44kdwqZ08iVh0FtPR/ywT39KbmtQNnzgK9ouIwoRccOsI3VW1AA/xRKG0SfOXDI9PzEW5BoRqzu85BqzYWoR0/eEV860busLTqkjKEjzVLR17bYyGGFjEz0kNlBZny6mEp9oEjJLZZnTIM4N2mJIwWpQPZ6t0mruc1AiidcjUSxJfdES+WFI7EbiPxD1did9YWkqn2Rbs72003vSAtCZUIt7QeyPsRZ+fJTDbCpKLeojfNHHqo0L4giS9mXcdLOkwKKe9CKGp7ABreG+orVExjbzdp24DrgL6KYz7o1I7hxowquVRBh82gvuJKjUJ+R/6kqMmHSE8611SVmr3T1OZbbjzMmIkVOQ3osde1gT3CAPAB9B1ics5dwhp6UGDOhW+XQQw0/trnU2pLiBuoVC9aq5BRJdQmCqCe11yKBvsyh/VoPG75iGi3HSScDX4XD4Kbh+uquhZgiIuMBkgp/e7ywjtAlTLV77iIS3xCH7d/KJtIG6XHs+PoJw0LQiW6YmsYKUpD4NGMHNcpvMqb3nQVbZr24WMbqMr79IWWGGEUN0PP84Cb+lbsPAyUDHIL8tVhhcUjE320e4W/V2pJQ9Fr3PaTXtlORkNJVuzNsxGovFi1PxdWltiXkABCG/IFS9fh/L345vZ3g3muC28vTpjBVeN1sl6V+qCn8jbNqcNKMerCbyOTb/nATzYbYu4/SumglklqLvDxf5dTBmhoIjtGyE2gbL+OD8rcVLxui1ZawNwA9psPSmWKv3n94/xo1adXxBSSBzBGdSl0BnabMO4ZDtEup8zojjQvlx1gq6qi/YBLSScCQsFPGvQLEQrRh6whbvYN2LF/diTfW7Znxmc3xwVb5SoxrCtu6kdPMfn7BngFQIMcTM3wcGpmrLf78tM89bLb6gBtlekt8+MOJ2KsZF7Ul1yLXrc6WjTQP2v"/> </div> <script type="text/javascript"> //<![CDATA[ var theForm = document.forms['form2']; if (!theForm) { theForm = document.form2; } function __doPostBack(eventTarget, eventArgument) { if (!theForm.onsubmit || (theForm.onsubmit() != false)) { theForm.__EVENTTARGET.value = eventTarget; theForm.__EVENTARGUMENT.value = eventArgument; theForm.submit(); } } //]]> </script> <script src="/web/20201011105406js_/https://gcn.com/WebResource.axd?d=pynGkmcFUV13He1Qd6_TZCBIjC6zCiEqmi_kDcnpBDGtmmPBmv3CrteKCAgzbUk5eSixZw2&amp;t=637103058965614113" type="text/javascript"></script> <script src="/web/20201011105406js_/https://gcn.com/ScriptResource.axd?d=uHIkleVeDJf4xS50Krz-yKIbsogxsARipyAFZ-QiowLKCn8ZX1JtCja1u0RrZEEZKxAM5FV4haytxitTtZqqNpmPcKKA3BLDLu9ZENuGQ1JqfEWiAMP7CsbJ3uYqnV6u0i-h3IJxflq0io8vjqviaFadW7U1&amp;t=ffffffffecf19baa" type="text/javascript"></script> <script src="/web/20201011105406js_/https://gcn.com/ScriptResource.axd?d=Jw6tUGWnA15YEa3ai3FadN4Tys6-s5-_WQA4GHsOVV0smV8btazs5-wG80pIg34-K80z7kuUkkVeuSqYVFgCETCeBJoAtRyb5fRiJArxgrrd7216Oo0fMsCemOyr51zDhUCnVS9jBHdvOboecnJG2jfa2V41&amp;t=ffffffffecf19baa" type="text/javascript"></script> <div class="aspNetHidden"> <input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="E77E423D"/> </div> <script type="text/javascript"> //<![CDATA[ Sys.WebForms.PageRequestManager._initialize('ScriptManager', 'form2', [], [], [], 90, ''); //]]> </script> <div class="wrapper"> <div class="leaderboard"> </div> <header role="banner" class="header"> <div id="ph_header1_0_divBlockBox" class="logo"> <div id="ph_header1_0_divBody" class="summary"><a href="/web/20201011105406/https://gcn.com/"><img src="/web/20201011105406im_/https://gcn.com/Articles/2020/10/05/~/media/GIG/GCN/Web/2018/site/gcn_logo_black.svg" alt="GCN | Technology, Tools and Tactics for Public Sector IT" title="GCN | Technology, Tools and Tactics for Public Sector IT"></a></div> </div> </header> <div id="main" role="main"> <div class="sideBar"> </div> <div class="pContent"> <div id="level0"> <div id="article"> <img src="/web/20201011105406im_/https://gcn.com/Articles/2020/10/05/-/media/GIG/EDIT_SHARED/Workforce/videoconference_0.jpg" alt="videoconference (MicroOne/Shutterstock.com)" class="storyimage"/> <p id="ph_pcontent3_0_KickerText" class="kicker">INDUSTRY INSIGHT</p> <h3 id="ph_pcontent3_0_MainHeading" class="title">How can zero trust help secure the BYOD workforce?</h3> <ul id="ph_pcontent3_0_ByAuthor" class="byline"> <li class="author">By Brian McKee</li><li class="date">Oct 05, 2020</li> </ul> <p>With maximum telework in place for the foreseeable future, federal IT teams are focused on ensuring employees have network access to needed applications and data from any location, on any device. With the quick onset of the pandemic, many agencies were forced to take a bring-your-own-device approach to telework. The greater variety of endpoints and reduced visibility into these endpoints created even more challenges.  </p> <p>BYOD and remote work as a whole complicate the agency network infrastructure, increasing the risk of a breach. For example, the operating system on a personal/remote device may not be up to date or its software patched. As federal IT leaders work to accommodate the remote workforce and the resulting added complexity, they are often turning to a zero-trust approach.</p> <p>With the mantra of “trust no one,” a zero-trust architecture is a strategy for managing technology risk. Assessments and grants of trust must happen in a granular fashion. Authorized users receive access to applications – regardless of whether the user is on-site or remote, an agency worker or a third party.</p> <p><strong>Although useful, it’s not perfect</strong></p> <p>When evaluating access, systems typically rely on data that shows how the user is accessing the network. Typically, this data is several weeks or even months old -- or simply inaccurate as a result of configuration changes or other factors. The challenge is exacerbated by BYOD and consistency in devices and software. Having real-time data helps agency IT teams make a better, more informed decision on whether or not to allow access to certain data. </p> <p>Further, the collection of risk point solutions running across federal networks has only added to the problem at hand. Most point tools need an installed agent, and studies have shown that the more agents there are on an endpoint, <a href="https://web.archive.org/web/20201011105406/https://cve.mitre.org/">the higher the probability that it will be breached</a>.</p> <p>To get real-time data for zero-trust access, agencies should unify teams on a single platform that integrates endpoint management and security, breaking down data silos and closing the accountability, visibility and resiliency gaps that exist between IT operations and security teams.</p> <p>The platform approach helps give agencies end-to-end visibility across users, servers and cloud endpoints, and it enables them to identify assets, protect systems, detect threats, respond to attacks and recover at scale. Zero trust offers a way to keep agency data secure and employees productive – if implemented using accurate, real-time data.</p> <p><strong>The future of telework</strong></p> <p>Telework is here to stay. The increase in cyber risks due to BYOD has changed the landscape, making secure access to data and devices on the network critical. The Office of Management and Budget and the National Institute of Standards and Technology have recently called for <a href="https://web.archive.org/web/20201011105406/https://csrc.nist.gov/publications/detail/sp/800-46/rev-3/draft">public comment</a> on the third edition of the <a href="https://web.archive.org/web/20201011105406/https://csrc.nist.gov/publications/detail/sp/800-46/rev-2/final">Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security</a> to identify telework areas that “industry, government, and others deem most important to revise or add.” NIST is also seeking suggestions of existing telework cybersecurity and privacy resources that could help guide updates.</p> <p>We cannot resolve security concerns by disjointed solutions, by following policies and procedures that worked in the past or by asking overworked internal teams to do more than they can handle. By reducing complexity with a unified platform and leveraging a zero-trust approach, IT teams can reduce risk and act quickly to efficiently manage and secure the environment anywhere endpoints exist.</p> <!-- pager start --> <!-- pager end --> <div class="aboutAuthor"> <p id="ph_pcontent3_0_AuthorInfo_AboutAuthor" class="author">About the Author</p> <p> <strong></strong> Brian McKee is director, product management, with Tanium. <br/> <a id="ph_pcontent3_0_AuthorInfo_AuthorEmail_0"></a> </p> </div> </div> </div> </div> <div class="sContent"> </div> <div class="xContent"> </div> </div> <footer role="contentinfo" class="footer"> </footer> <div class="scripts"> </div> </div> <div class="ad"> </div> </form> </body> </html> <!-- FILE ARCHIVED ON 10:54:06 Oct 11, 2020 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 13:27:44 Nov 24, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.575 exclusion.robots: 0.027 exclusion.robots.policy: 0.016 esindex: 0.013 cdx.remote: 8.969 LoadShardBlock: 239.842 (3) PetaboxLoader3.datanode: 111.678 (4) PetaboxLoader3.resolve: 170.214 (2) load_resource: 130.58 -->

Pages: 1 2 3 4 5 6 7 8 9 10