Advice, insights and tips on how to have a robust Plan B in place, so you can effectively rollout and implement remote access solutions.
If there’s one thing that is abundantly clear for businesses, it’s the need to be able to quickly adapt in order to let staff be productive from remote working environments. Remote working isn’t a new concept. In fact, it’s been a growing trend for the last decade. So, when considering business continuity, endeavour to make longer term solution investments that will provide future ROI.
Here are a few considerations on how your business might implement a robust remote working set up.
Ultimately, remote working allows staff to carry out their roles away from the office, and allows them to access the key tools that they require to do so. These tools could range from things like devices, data and applications, telephony and communications systems.
There are three key objectives for any remote working solution, these are:
In today’s computing environment, with applications and data typically provided by a mix of on-premise and cloud resources, the concept of remote access has changed. For many cloud-based applications, the key components should already be in place and battle tested by ‘business as usual’ operations. For on-premise applications the situation is usually more nuanced. Typically, an organisation will have some on-premise applications that are already served by a VPN, for regular remote working.
In a business continuity scenario this needs to scale at speed – taking in new use cases, new user communities and new applications. The good news is that there are many virtual appliance VPNs and remote access solutions available. These can be rapidly deployed to reliably scale access and securely to your users.
When working remotely, users expect to carry out their roles as usual, with minimum disruption or inconvenience. Ideally, access to apps, files and systems stay consistent.
A hotspot for this is authentication. Most applications come with a basic two factor authentication (2FA) option as standard. For office-based users, they probably only ever use a standard username and password. For remote access, this is simply not secure enough.
Best practice authentication solution takes into account factors above and beyond ‘do they have the right credentials?’ Modern MFA solutions consider a whole host of variable factors; how you log on, where from, what you are accessing, time, device used and so on. This is much more difficult for hackers to imitate, in order to gain access to your network, and is also less intrusive to the user.
Once the user has been authenticated it’s then possible to quickly sign them on to the other applications with no further action from the user themselves. This Single Sign-On works across cloud, hybrid and VPN access, to on-premise access. Not only does it simplify the user experience, it means less calls to the helpdesk and vastly improved security too.
In the event that a user requires remote access, IT would typically onboard an individual on to the remote access system manually. These processes are rarely scalable during a business disruption.
When large numbers of users are asked to work remotely, IT staff who themselves may not be able to make it into the office, must scramble to support these users, essentially creating a crisis within a crisis.
We advise that you scrutinise the practicalities of a deployment and of a business continuity scale up. Would your situation rely on hardware? Is significant admin involved? Will you receive technical external support? All important questions to consider.
One of the more frustrating and unforeseen limitations of scaling remote access solutions, is that they are typically licence-based or have capped user allowance.
Check to see if your remote access solution has a business continuity plan, reasonable use policy, or add-on which would allow you to temporarily flex user count, to accommodate a spike.
Rollouts and scale ups of remote access solutions are often time critical. If you don’t have the time or inhouse expertise to focus on the rollout, then outsourcing is a great way of achieving rapid deployment.
If you choose to outsource, be sure that they are familiar with, and accredited to work on the chosen technology solution.
If you’re in need of a quick, effective solution to scale up your remote access authentication, network bandwidth or security management, please get in touch. We’d be delighted to discuss how we could be of help.
© Copyright BlueFort Security Ltd.