• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Study Links Rise in Remote Workforce with Considerable Security Risk

by CXO Staff
January 14, 2021
in News

83% of survey respondents report the rise in remote workers increases the risk of a security incident, as per a BeyondTrust commissioned study conducted by Forrester Consulting.

home office remote working work from home WFH

BeyondTrust has released the results of a commissioned study conducted by Forrester Consulting on behalf of BeyondTrust titled, ‘Evolving Privileged Identity Management (PIM) In the Next Normal,’ November 2020. The study was commissioned to evaluate PIM challenges in the “new normal” created by the COVID-19 pandemic.

Morey Haber, BeyondTrust
Morey Haber, BeyondTrust

The COVID-19 pandemic imposed an immediate and massive shift to a remote workforce. This created new vulnerabilities by expanding organisations’ attack surfaces. The pandemic has created a situation where virtually all remote employees need privileged access to perform their jobs and has hastened the “identity as the new perimeter” paradigm.

This survey uncovers the requirements for creating a secure remote workforce that protects the business with PIM in the post-COVID era. Key findings include:

The impact of COVID-19 on the acceleration of the remote workforce

  • 91% forecasted increase in size of remote workforce, versus 45% before the pandemic
  • 53% of US workers reported wanting to work from home more, even after the pandemic is over

The inadequacy of perimeter-based network security and legacy remote access technologies, like VPN, in securing remote workers

  • 83% believe the increase in remote workers increases the risk of a security incident
  • 47% rank “Preparing for an Increasingly Remote Workforce” as a Top 5 security priority for 2021

A comprehensive PIM solution mitigates threats by protecting privileges across accounts, endpoints, and access pathways

  • 91% of respondents agree that PIM plays a crucial role in securing remote workers
  • 86% of respondents say their organisations will invest more in PIM over the next two years to address the risks related to remote working
  • 56% report that improved IT administration efficiencies are the top benefit of PIM

“The findings of this global survey confirm the fact that the pandemic has accelerated the borderless enterprise and brings identity to the forefront of the new perimeter,” states Morey Haber, CTO and CISO at BeyondTrust. “To protect their assets, enterprises must secure their data throughout their IT estate. This requires comprehensive PIM solutions that enable uncompromised access to applications and data from anywhere, by any user or device.”

The definition of who requires privileged access can no longer be reserved for IT administrators; it must include use cases related to remote working. Having robust access controls allows employees to conduct their jobs wherever they are, without incurring risk. PIM strategies must go beyond traditional password management and include a holistic approach, including endpoint privilege management and secure remote access.

Key Recommendations

Privileged users are critical to the operations of digital business, yet they also present a substantial security risk. Organisations need effective PIM controls to limit the attack surface while enabling regular business operations. The survey results point to the following best practices:

  • Plan for dramatically more remote privileged users

The rapid increase in the need for privileged access by remote workers will open many security holes and compliance violations. To avoid this, set up tools and processes to discover and categorise privileged users and activities to determine appropriate access rights. Apply security controls that best fit the needs of various privileged user types and situations.

  • Establish a strong governance model for PIM

Traditional PIM tools don’t effectively meet the rules and governance of privileged users. Evolve and expand your solutions to secure changing environments and attack surfaces.

  • Implement strategies to reduce the attack surface and prevent lateral movement

Adhere to the principle of least privilege (POLP) by granting privileged users just enough access to resources, and just enough permissions to perform actions required for their jobs.

  • Apply just-in-time (JIT) access approaches for dynamic business use cases

Privileged access must be agile within business areas that have a high rate of change and where personnel or machine identities must access resources. Limiting access to time-bound requests with context-aware workflows for approval removes standing access while enabling the business to move forward.

  • Balance UX with security controls for remote privileged users

Make the authentication and access request process as frictionless as possible. Employ unobtrusive security controls, like session monitoring and threat detection, that run in the background and alert you to high-risk activities.

  • Provide centralised, consistent administration with an integrated PIM suite

Malicious actors target privileges to gain access to and move laterally throughout an organisation. Comprehensive PIM tools and approaches will help protect your enterprise. A holistic PIM solution will provide full visibility of threats across the privileged landscape. An integrated platform will provide consistent administration, reporting, and response capabilities.

Tags: BeyondTrustCOVID-19featured1Forrester ConsultingITMorey HaberVPN
ShareTweet

Related Posts

Massive data breach exposes 16 billion credentials
Future

Massive data breach exposes 16 billion credentials

In what cybersecurity experts are calling possibly the largest credential leak ever, over 16 billion usernames and passwords have been...

June 20, 2025
Pure Storage introduces the Enterprise Data Cloud
Future

Pure Storage introduces the Enterprise Data Cloud

Pure Storage has introduced the Enterprise Data Cloud (EDC), a bold new standard in data and storage management simplicity that...

June 19, 2025

Discussion about this post

Latest Issue

Massive data breach exposes 16 billion credentials

Massive data breach exposes 16 billion credentials

June 20, 2025
Pure Storage introduces the Enterprise Data Cloud

Pure Storage introduces the Enterprise Data Cloud

June 19, 2025
HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

June 18, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.