Top 10 Trends in Telecommuting. Business drivers for working remotely, and the technology to make it secure



Similar documents
White paper. 10 Trends and technologies driving Secure Telecommuting

Clean VPN Approach to Secure Remote Access for the SMB

Clean VPN Approach to Secure Remote Access

Securing the Small Business Network. Keeping up with the changing threat landscape

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

How To Secure A Remote Worker Network

Deploying Firewalls Throughout Your Organization

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Best Practices for Secure Mobile Access

Cisco Virtual Office: Flexibility and Productivity for Your Workforce

The Remote Access Imperative in Disaster Recovery

Protecting Network Infrastructure. Mobile Workers. Florian Malecki - SonicWALL EMEA Enterprise Product Marketing Manager

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Next-Generation Firewalls: Critical to SMB Network Security

Consolidating SMB Network Security Infrastructure. Ways to Cut Costs and Complexity

Executive Brief on Enterprise Next-Generation Firewalls

Managed Security Services for Data

Telework and Continuity of Operations

IBM Australia. Integrated Network Security with IBM Global Technology Services

BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Top 10 Reasons Enterprises are Moving Security to the Cloud

Solution Brief. Secure and Assured Networking for Financial Services

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Misconceptions surrounding security in a virtualized environment

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Securing Unified Communications for Healthcare

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Secure Remote Access Give users in office remote access anytime, anywhere

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Zone Labs Integrity Smarter Enterprise Security

How To Protect Your Cloud From Attack

Unified Threat Management, Managed Security, and the Cloud Services Model

SonicWALL Corporate Design System. The SonicWALL Brand Identity

The Benefits of ICT. June 2007 GP.C.PDF.07.E

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Payment Card Industry Data Security Standard

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

The evolution of data connectivity

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

WHITEPAPER MAXIMIZING HOME-BASED AGENT EFFECTIVENESS THROUGH INTELLIGENT AGENT SELF-SERVICE

Ten easy steps to secure your small business

Visual Communications Company Delivers Scalable Solution for Unified Communications

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Mobility, Security and the Enterprise: 10 Best Practices for Controlling Smartphone and Tablet Access to Corporate Networks

Secure iphone Access to Corporate Web Applications

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

IT Architecture FOR DUMHIE5* by Kalani Kirk Hausman. and Susan L. Cook WILEY. Wiley Publishing/ Inc.

Putting Web Threat Protection and Content Filtering in the Cloud

IP Office: Simple, Powerful Communications for Small and Medium Size Businesses

IT Enterprise Services

MOVING INTO THE DATA CENTRE: BEST PRACTICES FOR SUCCESSFUL COLOCATION

IP Office: Simple, Powerful Communications for Small Business

Enterprise Computing Solutions

Network Security. Intertech Associates, Inc.

10 easy steps to secure your retail network

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Virtualization Essentials

How To Cap It Spending In An Economic Downturn

How To Buy Nitro Security

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Providing Telework, Workforce Mobility, and Disaster Recovery Solutions for Federal Agencies. Today s Technology Best Practices

Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites

Alcatel-Lucent Services

Benefits of Avaya IPOffice

The digital future for retail, hospitality and travel.

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

CONTENTS. A Recipe for Disaster 2. Comprehensive Disaster Recovery 3. Data Recovery Challenges, Criteria and Considerations

10 Cool Things Your Firewall Should Do. A firewall that blocks threats is only the beginning

Collaborative Workplace

Cisco Software-as-a-Service (SaaS) Access Control

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

Enhanced Enterprise SIP Communication Solutions

IP Office: Simple, Powerful Communications for Small Business

Privacy + Security + Integrity

Is Your Network Ready for VoIP?

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

How do I secure and manage an out-of-band connection to network devices?

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Internet Content Provider Safeguards Customer Networks and Services

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Securing the small business

Managing Data, Voice, and Converged IP Networks

Retail: Securing the Competitive Edge with

EasiShare Whitepaper - Empowering Your Mobile Workforce

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Juniper Networks Solution Portfolio for Public Sector Network Security

The Ultimate Guide to Gaining Control of the WAN

Firewall and UTM Solutions Guide

Nominee: Barracuda Networks

ICT budget and staffing trends in Healthcare

Factors to Consider When Developing a Cloud ROI. Michelle Olson

How To Choose A Next Generation Firewall

security in the cloud White Paper Series

Transcription:

Top 10 Trends in Telecommuting Business drivers for working remotely, and the technology to make it secure

Table of Contents Introduction 1 1. Business trend: reining in operating expenses 2 2. Business trend: finding and retaining talent 3 3. Business trend: meeting regulatory compliance 4 4. Business trend: preparing for disasters 5 5. Business trend: working green 6 6. Technology trend: accessing broadband everywhere 7 7. Technology trend: collaborating via Web 2.0 8 8. Technology trend: mobilizing communications 9 9. Technology trend: protecting against more 10 sophisticated threats 10. Technology trend: establishing a 11 SonicWALL Clean VPN Conclusion 12

Introduction Once, the key drivers for telecommuting were productivity and flexibility the so-called work-life balance that many workers strive for. Those soft benefits still exist, but, increasingly, financial considerations such as gas prices, the credit crisis and hard cost savings drive telecommuting programs. Telecommuting programs also help companies strengthen the loyalty of their workers. Whether driven by hard or soft benefits, telecommuting programs have one core requirement: give telecommuters secure access to corporate networks, applications and data. For workers at remote sites, IT and corporate security managers must select secure remote access technologies to make telecommuting not just viable, but safe. The following pages offer an overview of the top 10 business and technology trends in telecommuting. It s been a perfect storm. Rising gas prices, leading-edge technology, and the push for work-life flexibility have all come together in the past 12 months to create a pretty dramatic increase in telework across the U.S. and Canada. 1 1

1. Business trend: reigning in operating expenses In the big picture, telecommuters help companies lower their operating costs. When telecommuters use their own space, power and cooling to work from home, savvy employers adjust their facilities practices to pocket that savings. Hot desking involves one desk shared between several people who use the desk at different time. A primary motivation for hot desking is cost reduction through space savings up to 30% in some cases. 2 The Canadian Telework Association (CTA) puts some numbers to the hot desking phenomena, suggesting that employers need one less office for every three telecommuters or about $2,000 per teleworker per year. AT&T saved $550 million by eliminating or consolidating office space ($3,000 per office) in its telework program, CTA states. About 25% of IBM s 320,000 workers worldwide telecommute from home offices, saving $700 million in real estate costs, per the CTA. 2

2. Business trend: finding and retaining talent Economic conditions such as inflation, rising gas prices, military relocations, the housing downturn are affecting many workers and their families. In a May 2008 online survey, the Telework Coalition found that 87% of respondents would limit a job search based on potential commute costs. For businesses, telecommuting breaks barriers to reaching staffing pools in geographic areas with lower salaries or higher talent concentration. Telecommuting programs can cement employee loyalties. Sun Microsystems says its telecommuters cite the Open Work program as the No. 1 reason they would recommend Sun. By reducing job turnover, employers also eliminate costs of training new hires. 37% of IT workers say they d accept up to a 10% lower salary to work full-time from home. 3 3

3. Business trend: meeting regulatory compliance In recent years, businesses have been required to comply with more industry and government regulations, such as Sarbanes-Oxley, HIPAA, Gramm-Leach-Bliley and PCI. In general, the goals of such regulations are to protect customer information from unauthorized access, or to safely present corporate information to the public. Telecommuters are not excluded from these compliance mandates, so the viability of a telecommuting program requires having technology in place that both monitor telecommuting workers and onsite employees: to ensure the identity of who is accessing data. appropriately restrict access to sensitive data. correctly segregate users, resources and communications. verify procedural integrity with effective audit trails. The total cost of identity theft approaches $50 billion per year. 4 4

4. Business trend: preparing for disasters Disaster recovery has become an increasingly important objective in the era of globalization. An outage at a distant, but strategic, power facility can cripple work, not just locally, but at every other company location. The continuing trend of outsourcing exposes the company to outages that affect their outsource partners. By definition, telecommuting distributes employees away from central offices. Central offices may be knocked out through power outages, weather, traffic jams or localized disturbances. Even a few miles make a difference in those situations, when companies can operate business as usual, maintaining revenue streams and delivering an always on image with customers, partners and investors. When things get busy, like in a weather event, we can send an e-mail to all [at-home] agents asking them to log in to help. The response is immediate we don t have to wait for them to come in. 5 5

5. Business trend: working green A company s carbon footprint includes employee business travel by car, airplane, rail and other public transportation. Energy for heating, cooling and electricity also count. Carbon emissions from consuming goods and services also may be included. Fortunately for the environment, going green often reduces both carbon footprints and costs. How does telecommuting affect carbon footprints? In many cases, telecommuters are simply shifting energy consumption from the employer s building to their own homes. However, recent research by Sun reports that its telecommuters use roughly half as much energy at home as they do in the office. Broadband and collaboration software could could increase the number of telecommuters from 10% to 20% of the U.S. workforce over the next 10 years and reduce carbon emissions in the U.S. by 45 million tons annually. 6 6

6. Technology trend: accessing broadband everywhere As the number of homes with broadband Internet access grows, working from home becomes more viable. Telecommuters can work more effectively with broadband connections because enterprise applications run closer to real-time when accessed over a fast connection instead of dial-up. Broadband also makes VoIP (Voice over IP, or Internet phone) and other bandwidth-hungry new applications viable when they would not be with a slower connection. In mid-2008, Gartner Inc. put broadband access from U.S. homes at 54% 7, and even higher in six European Union nations (Netherlands, Switzerland, United Kingdom, France, Sweden, and Belgium) plus South Korea, Hong Kong, Canada, Singapore and Taiwan. By 2012, Gartner sees broadband connections in 77% of U.S. homes. 7

7. Technology trend: collaborating via Web 2.0 New applications such as wikis and VoIP are key enablers of online collaboration so that employees don t have to be in the same location to work together. For telecommuters, remote collaboration is a huge productivity gain, as proven by the growth of Web conferencing for meetings. Today Web meetings have become commonplace within companies that have distributed workforces, whether in remote offices or home offices. Web meetings not only boost collaboration but keep remote workers from feeling isolated from central office contact. In terms of office culture, outsourcing and extended supply chains have given many organizations new lessons in real-time collaboration online or by phone with suppliers, partners and outsourcers. Now employees can apply those skills to collaborate with each other remotely. Web 2.0 applications are already present on the majority of corporate networks, whether they ve been formally or centrallyapproved or not, through bandwidth and time-based restrictions. 8 8

8. Technology trend: mobilizing communications Falling prices and greater horsepower of smartphones, PDAs, other handheld (Blackberry, Symbian) devices, as well as laptop computers, have put the technology of telecommuting within the reach of many organizations and their workers. In one poll 9, however, 70% of respondents admitted to accessing corporate data over wireless posing a great concern for network security. In corporations, PDAs tend to be managed (even issued) by corporate IT, so they are more likely to be configured to access the corporate network securely. Smartphones are most often owned by the employee and then used to access the company network for work. Both types of devices open corporate networks to new threats, not the least of which is that small devices are easier to lose than larger ones. Plus IT departments are responsible for smartphones without controlling them. 82% of smartphone owners said they use their devices to read business e-mail, 80% surfed corporate Web sites, and 61% accessed enterprise data. 10 9

9. Technology trend: protecting against more sophisticated threats No longer are culprits simply brilliant teens or other amateurs. Organized crime has moved into the Internet age. To growing hacker sophistication, add the reality that tough economic times force companies to cut their work forces, potentially creating a new class of security threats: disgruntled ex-employees. What if those unhappy ex-employees become potential partners to professional hackers? Secure Sockets Layer virtual private networks (SSL VPNs) form the basic security requirement for secure telecommuting, and also address the growing sophistication of hacker attacks and the organizations behind them. Telecommuting, which on the surface might seem to open new security vulnerabilities, should not, if enterprises insist on secure remote access technology. Not only are attacks on networks growing more sophisticated, but the cyber-criminals are become more sophisticated in organizing themselves. 10

10. Technology trend: establishing a SonicWALL Clean VPN A clean VPN approach establishes intelligent layers of secure remote access, gateway firewall, and policy control by integrating SSL VPN and Unified Threat Management (UTM). To be practically effective, a clean VPN must be able to: Detect Protect Connect the integrity of users, endpoints and traffic from beyond the traditional network perimeter. applications and resources against unauthorized access and malware attacks. authorized users with appropriate resources seamlessly and easily in real time. SonicWALL has strategically positioned itself as an industry leader in pioneering clean VPN technology solutions for organizations of all sizes by enabling the managed integration of its award-winning Secure Remote Access, Network Security Appliance and Global Management System product lines. The SonicWALL Clean VPN solution unites next-generation SSL VPN and UTM technologies to enforce granular applicationlayer access policies while comprehensively inspecting all traffic at the gateway, while simultaneously correlating event information to streamline and enhance security efficiencies. 11

Conclusion The technology enablers of telecommuting include reliable secure remote access, wider access to broadband Internet, new collaborative applications, and the popularity of PDAs and smartphones, as well as heightened public awareness of global warming and the original push from employees seeking better balance between their work and family lives. Trends in both business and technology are increasingly making telecommuting a reality. 12

How Can I Learn More? Download the Whitepaper 10 Telecommuting Trends Download the Whitepaper Teleworking and the New Economy Opt-in to receive SonicWALL Newsletters For feedback on this e-book or other SonicWALL e-books or whitepapers, please send an e-mail to feedback@sonicwall.com. About SonicWALL SonicWALL is a recognized leader in comprehensive information security solutions. SonicWALL solutions integrate dynamically intelligent services, software and hardware that engineer the risk, cost and complexity out of running a high-performance business network. For more information, visit the company Web site at www.sonicwall.com. 1 Anne C. Ruddy, president, WorldatWork (August 2008) 2 Hot desking, Wikipedia, (http://en.wikipedia.org/wiki/hot_desking). 3 The Dice Report, June 2008. 4 Federal Trade Commission - Identify Theft Survey Report (September 2003) 5 Call Centers Come Home, HR Magazine, January 2007. 6 Broadband Services: Economic and Environmental Benefits, American Consumer Institute, 2007. 7 Gartner press release, July 24, 2008. Leichtman Research Group puts U.S. penetration at 53%, Leichtman, press release June 25, 2008. 8 Mark Bouchard, Missing Link Security Services 9 Information Week (July 2007) 10 Information Week (February 2008) 2008 SonicWALL, the SonicWALL logo and Protection at the Speed of Business are registered trademarks of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Specifications and descriptions subject to change without notice. 11/08 SW 488