Secure Remote Access Emergency Readiness

How to ensure business resiliency, user productivity and security

BE READY

Many circumstances and compliance obligations require organizations to activate or rapidly extend remote access capabilities as part of a business continuity strategy.  Beyond impacting user productivity, this emergency workplace shift can stress IT infrastructure and operations. With advanced planning, crises that require immediate, increased and varied remote access capacity should not increase threat exposure, cyberattack and data leakage risks.

Top Tips

Here are some important Secure Access Emergency Readiness tips to ensure business continuity, operational efficacy and protected accessibility.

TIP:
Scope

TIP:
Scope

Understand your remote access needs in terms of users, applications and resources in order to assess respective physical, virtual or user-based connection capacity and throughput.

TIP:
Capacity Plan

TIP:
Capacity Plan

Identify key applications and resources, whether on-premises or cloud, that will require increased capacity and apply to an emergency capacity plan.

TIP:
Capacity Elasticity

TIP:
Capacity Elasticity

Explore application and security tool license and capacity shifting options set in advance with your vendors to handle burst utilization.

TIP:
Appropriate Access

TIP:
Appropriate Access

Review and maintain application, data and role mapping to ensure users only access the resources they need. Have processes in place to quickly respond to user or role escalation and ad hoc privileged access and revocation.

TIP:
Deployment

TIP:
Deployment

Consider virtual and cloud environment deployment and clientless mode to allow for more rapid on-demand deployment and scale options.

TIP:
Disaster Recovery

TIP:
Disaster Recovery

Establish Disaster Recovery (DR) sites to provide secure access services in case of a primary site outage or failure and explore Secure Access solution’s DR options for active/active or active/ passive modes.

TIP:
Communications

TIP:
Communications

Build, publish and review emergency remote work guidelines, resources and communications.

TIP:
Usability

TIP:
Usability

Activate advanced secure access usability features for streamlined access, such as: always-on, per-application and simultaneous tunneling, configuration lock down, clientless operation and online portals.

TIP:
Privileged Users

TIP:
Privileged Users

Ensure emergency means to simulate on-premise access, including Layer-3 access to a specific subnet, HTML5 access to local machines, or Virtual Desktop Infrastructure by privileged users and technicians.

TIP:
Endpoint Compliance

TIP:
Endpoint Compliance

Enforce endpoint compliance policy and activate self-remediation capabilities to reduce phishing and ransomware threats introduced by increased remote users and potential vulnerable devices.

TIP:
Mobile Security

TIP:
Mobile Security

Invoke mobile device security options, such as mobile VPN, device security, segregating corporate apps and information, and data encryption to allow for broader corporate and personal device use.

TIP:
Behavior Monitoring

TIP:
Behavior Monitoring

Utilize Adaptive Authentication and User Entity Behavior Analytics (UEBA) to better understand and react to new user/device usage, as well as unwanted and anomalous activity.

TIP:
Application Delivery

TIP:
Application Delivery

Leverage usage analytics and optimal gateway selection capabilities to better distribute workloads and to deliver “essential” applications to users without performance degradation.

Recognition

“Pulse Secure has enabled us to support remote work for most of our employees during the COVID-19 crisis.”

– Chief Technology Officer (CTO), Large Enterprise Transportation Services Company