Welcome!

Containers Expo Blog Authors: Stefan Bernbo, Pat Romanski, Moshe Kranc, Elizabeth White, Derek Weeks

Related Topics: Containers Expo Blog, Wearables

Containers Expo Blog: Article

Limos and Laptops: Why and How to Provide Safe Access from Untrusted PCs

Hidden costs of IT policy can help justify Desktop Virtualization

The perceived security risk of granting access from untrusted PCs such as airport kiosks,hotels or even home computers has outweighed the benefits of broad remote access for many enterprises. As a result, those companies typically have IT security policies that dictate only a corporate laptop with the IT supported corporate image plus a VPN can gain access from outside the corporate network. While this policy does provide a certain level of security, it also contributes to many hidden costs both tangible and intangible.

Most IT shops are well aware of the visible costs associated with this policy as it relates to purchasing and maintaining laptops, plus the burden of supporting IPsec VPNs. While laptops are easily justified for road warriors and remote workers, the business case for “day extenders” is less clear, especially when considering the TCO of a laptop being two times that of a typical office PC. In addition to the direct costs of purchasing laptops, there can be significant indirect costs due to security, increased theft, breakage and associated lost productivity during repair and replacement. These recognized costs contribute to additional corporate policies that limit laptops to certain job levels and responsibilities.

But what about all those “potential day extenders” and others that don’t fit the job description with a real mobile requirement for a corporate laptop?  What is the cost of not providing remote access to these employees?  Certainly there is the opportunity cost of lost productivity, when compared to office employees that do have remote access who often find themselves spending an hour or more daily catching up on email or preparing for the next days deadline. Try calculating the value of these potentially productive hours times the number of employees without remote access to start to quantify the impact. How about the human resource impact of limiting employee remote access? Consider the job satisfaction impact of being continuously stuck at the office working overtime when all that is really required is access to email and a few critical applications. Or, how may sick days are logged by employees when it’s really a sick kid at home that can’t be left alone? Just as bad, coming to work while sick and spreading it to others. Most managers would rather have their employee at home online and productive as well as a less stressed employee without conflicting family priorities. What about business continuity?  When these employees stay at home due to snow days or hurricane warnings, again there is additional quantifiable business impact and unnecessary lost productivity.

Here is another example of a hidden cost that is real but completely overlooked because it does not come from the IT budget. In New York City it’s common corporate policy for professionals who work past 8:00 PM to be provided a car service or limo ride home. Look around Manhattan streets any workday evening, and it’s obvious this is a common occurrence. Look a bit further at what is keeping these “potential day extender” employees at work, and the chances are many of them are stuck at the office working on a few mission critical applications on an office PC and possibly because they are working on sensitive data that must stay inside the enterprise. If these same employees had the option of completing their day on their home PC on their own schedule, chances are they would gladly pass up the late night limo rides. This may be a bit of an extreme example, but further investigation into the full impact of IT policy at other enterprises may turn up analogous costly scenarios. So, recognizing the potential benefits of allowing access from otherwise untrusted PC’s, let’s explore the downside. The basic risks of providing remote access from any PC - trusted or not - includes the potential loss of sensitive corporate data, and additionally the damage that could be done by allowing a hacker or malware inside the corporate network.

Loss of sensitive data through remote access can happen in numerous ways; it could be careless or inadvertent employee usage of web based corporate email on public systems which may leave traces of confidential information or even full documents from reading or editing email attachments. Keystroke loggers can also collect ID and passwords that allow a hacker to later gain unauthorized access to corporate networks wreaking havoc or silently stealing critical information. Limiting access from only trusted corporate laptops with a managed image can reduce the some of these risks, however this policy also can introduce new risks including stolen laptops or employees using un-trusted networks to gain access. In addition, for employees who don’t have a corporate laptop or don’t want to carry one home everyday, the practice of emailing a document to a insecure personal public email account can be commonplace, yet very difficult to prevent.

Keeping out malware and hackers is the other significant driver for restricting access from untrusted PC’s. It is easy to recognize the risk of providing full network access via an IPsec VPN to a home PC that can be infected with unknown worms and virus which could traverse the network connection directly to corporate datacenter servers. For those with teenagers at home using the family home PC this risk is certainly understandable.  Additional risks are also possible by utilizing IPsec VPN’s that require multiple ports to be open to the datacenter resulting in management overhead and risk of error. The Corporate laptop can reduce some of these risks by managing the installed image and assuring current spyware and anti-virus scans are routinely run. The IPsec VPN risk and overhead can also be reduced by implementing SSL-VPN’s that can limit the open ports and providing a single managed proxy for all traffic entering the datacenter.

So is it possible to provide access from an un-trusted PC that is as safe or safer than a corporate laptop with a VPN? It is very important to consider the reference point, not the ultimate secure environment but rather a standard corporate laptop with an IPsec VPN. As discussed above this reference environment does have inherent risks, starting with distributed sensitive data that could be exposed if a laptop is stolen or even simply left unattended. Windows password protection can now be easily broken with hacker boot CD's that allow the logon password to be reset and gain full access to the laptop contents. Some hacker tools even provide the ability to revert to the original password so the breach is undetected. Aside from loss of corporate data, corporate laptops are also susceptible to providing a hacker full network access. Silent installs of keystroke loggers from attachments or simple web site viewing. This risk is reduced depending on the effectiveness of the corporate spyware and antu-virus scans and policies; however there are also trade-offs regarding user impact, policy enforcement, and scanning frequency.

Based on this corporate laptop and IPsec VPN reference point, many enterprises are considering the alternatives and the benefits of a broader access strategy. Many have  turned to SSL-VPN's initially due to the support advantages over IPsec VPN's and more recently in combination with End-Point Security enforcement software. Many of these solutions are being implemented on both corporate laptops as well as home PC's. The benefit is enforcement of corporate policies for untrusted PC's: if the endpoint security test passes, then access is granted. A common limitation of many vendors' offerings is the remediation steps required when the test fails. Does your company really want to take over support for home PC's? A few vendors including Citrix do offer policy-based controls that can provide useful and sufficient access to certain applications and functions.

Exploring deeper the scenario of providing safe access from a untrusted PC, some enterprises may not accept the practice to allowing sensitive corporate data on anything but a corporate controlled asset. Providing network access even under controlled environments can still pose an increased risk.  Security tokens from companies like RSA or Gemalto provide One Time Passwords ( OTP ) that can foil keystroke loggers however employees need to have the token to gain access. Recently "Soft" Tokens or Cell phone texting OTP's from companies like SMS Passcode can provide secure authentication without an additional device. In addition to "Two Factor " authentication the safest implementation is to restrict access to the most secure "eyes only" access policy. For example, Citrix XenDesktop can easily be configured to enable access to a virtual desktop with all the required applications to work on, yet only SSL encrypted pixels and keystrokes are passed over the internet. Additional functions like local printing, local file access and Cut & Paste can be easily disabled by the IT administrator, yet the user is able to effectively get their "extended day" work complete. This " eyes only " configuration also minimizes potential threats to the datacenter by transmitting only the ICA protocol which is benign to transmitting worms, and as a result is unattractive to hacker exploits. Other solutions also exist based on VNC and RDP that can provide server based access with limited or no data getting to the client. Many companies are now considering Desktop Virtualization solutions such as providing a locked-down corporate Virtual Image that can be isolated and run directly on an un-trusted PC or hosted centrally (VDI) with a secure SSL-VPN connection.

So as evidenced above, much can be done to provide safe access from otherwise untrusted PCs. In fact, when compared to the benchmark standard, the VPN connected corporate laptop it is possible to configure a solution that is arguably as safe as or even safer than the typical corporate laptop scenario. Many leading enterprises are now considering the practice of providing employees an allowance to buy whatever PC or laptop they wish for remote access instead of having to deal with a multitude of unique requests. This is often referred to as BYOC " Bring Your Own Computer ". In an uncontrolled environment this could turn into a support and security nightmare. However, when deployed in conjunction with some of the solutions mentioned above, the scenario can turn out to be a win-win for employees and IT. So the time may be right to reconsider the de-facto remote access policy at your company, and consider a Desktop Virtualization strategy that includes all the costs. Chances are you can find more productive ways to spend money than late night limo rides.

More Stories By Chris Fleck

Chris Fleck is Vice President of Emerging Solutions at Citrix Systems. Chris started his career at IBM working across multiple engineering and product organizations leading to Business Unit Exec of the IBM Industrial Computer Group. As a pioneer of new technologies, Chris founded an IBM spin-off to commercialize the initial Server Blade products as CEO of OmniCluster Technologies. At Citrix Chris is responsible for Emerging Solutions and is involved with or leading strategic initiatives at the company. You can follow him on Twitter and his blog at TechInstigator.com

@ThingsExpo Stories
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business...
SYS-CON Events announced today that GrapeUp, the leading provider of rapid product development at the speed of business, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market acr...
SYS-CON Events announced today that Ayehu will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara California. Ayehu provides IT Process Automation & Orchestration solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication, and recovery from cyber security breaches. Ayehu provides customers greater control over IT infras...
SYS-CON Events announced today that Datanami has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datanami is a communication channel dedicated to providing insight, analysis and up-to-the-minute information about emerging trends and solutions in Big Data. The publication sheds light on all cutting-edge technologies including networking, storage and applications, and the...
Artificial intelligence, machine learning, neural networks. We’re in the midst of a wave of excitement around AI such as hasn’t been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. Will this time be different? Most likely. Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Furthermore, the funding and research going into AI now comes from a wide range of com...
SYS-CON Events announced today that EnterpriseTech has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. EnterpriseTech is a professional resource for news and intelligence covering the migration of high-end technologies into the enterprise and business-IT industry, with a special focus on high-tech solutions in new product development, workload management, increased effi...
In this presentation, Striim CTO and founder Steve Wilkes will discuss practical strategies for counteracting fraud and cyberattacks by leveraging real-time streaming analytics. In his session at @ThingsExpo, Steve Wilkes, Founder and Chief Technology Officer at Striim, will provide a detailed look into leveraging streaming data management to correlate events in real time, and identify potential breaches across IoT and non-IoT systems throughout the enterprise. Strategies for processing massive ...
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organi...
SYS-CON Events announced today that Cloud Academy named "Bronze Sponsor" of 21st International Cloud Expo which will take place October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara, CA. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud com...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
SYS-CON Events announced today that TMC has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo and Big Data at Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Global buyers rely on TMC’s content-driven marketplaces to make purchase decisions and navigate markets. Learn how we can help you reach your marketing goals.
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists looked at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deliver...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 21st Int\ernational Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their ...
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...