Page 122 - Cyber Defense eMagazine October 2023
P. 122

The  endpoint  and  IAM  are  key  to  addressing  security  concerns  in  light  of  the  continuing  hybrid
            environment: hybrid workers and hybrid cloud usage. More surfaces to attack and a diversity of devices,
            locations, and level of security awareness on the part of remote workers all add up to more risk of a data
            breach, reputational damage to the organization and costly downtime.




            Data Security Begins with a more Secure Operating system on the Endpoint

            Protecting  this  mixed universe  of  devices,  remote  work,  and  hybrid  cloud  deployments  starts  at  the
            interface between the user and the access device, specifically the endpoint. Enterprises are finding that
            purpose built, security focused Linux based operating systems to be the  endpoint OS of choice. It’s
            designed with a lightweight, small modular footprint, is read only, and contains no persistent user profile.
            Its firmware files can be encrypted and partitioned to ensure the OS cannot be tampered with or modified
            by malicious applications or extensions. This is accomplished via a full chain of trust from the hardware
            to OS, all the way to the application layer, making it tamper-proof and inaccessible by ransomware.   It
            also allows  for  unmounted encrypted  backup  partitions  that aid  in  rapid  recovery  in  the event  of an
            unauthorized change to the OS.

            Since the OS operates independently of applications or services, it further reduces the attack surface by
            delivering only what is required for the usage model and removing anything unnecessary. A secure Linux
            OS supports local applications, hybrid cloud environments and virtualization platforms, including AVD,
            AWS,  Citrix,  VMware,  and  cloud  workspaces  as  well  as  SaaS  and  DaaS  services.  It  also  offers  IT
            efficiency by enabling over-the-air updates and patching, saving valuable IT staff time, and ensuring
            patches are deployed consistently across the enterprise.  In this model, if a device has internet access,
            it is part of the enterprise and fully managed and controlled.

            A secure Linux-based edge OS provides flexibility and security attributes that are driving global growth
            from an estimated $6.27 billion in 2022 to $22.15 billion by 2029, a CAGR of 19.8%, according to Fortune
            Business Insights.



            Mitigating Risk and Disruption via Cloud Workloads

            Minimizing attack surfaces, in addition to a secure Linux OS, requires moving applications and data off
            endpoint devices and storing them in the cloud. Every data file does not need to reside in the cloud, but
            any  sensitive  data  related  to  critical  business  operations,  and  to  employees  being  as  productive  as
            possible, should live in the cloud.

            Should an attack occur, employees will be able to continue work by accessing their files from the cloud,
            further ensuring business continuity.











            Cyber Defense eMagazine – October 2023 Edition                                                                                                                                                                                                          122
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   117   118   119   120   121   122   123   124   125   126   127