{"id":109321,"date":"2020-04-16T06:00:43","date_gmt":"2020-04-16T13:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=109321"},"modified":"2021-09-12T22:50:36","modified_gmt":"2021-09-13T05:50:36","slug":"network-secure-access","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/04\/network-secure-access\/","title":{"rendered":"Working from Home During COVID-19: Secure Access for Remote Workers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">These last few weeks have been challenging for employees and employers alike \u2013 we have all had to manage the stress and concern of COVID-19 in our personal lives while trying to keep our organizations functioning. The speed and demand of transitioning many users to full-time remote workers is unprecedented, and many IT teams, applications and products are struggling to keep up. This experience may be the beginning of a permanent shift in how we approach working, with a renewed focus on the ability to scale up remote users while keeping security at the forefront.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the need to rapidly scale up, there are some important considerations for organizations as they begin this process. No matter what approach or vendor you select, two questions should be asked: <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-security-scale\/\"><b>how does your existing architecture scale<\/b><\/a><span style=\"font-weight: 400;\"> and <\/span><b>how effectively does it allow IT to create the granular policies that will secure my organization<\/b><span style=\"font-weight: 400;\">? Speed and agility are the focus right now, but long-term impacts like security, user experience and ease of management should also be considered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s consider this scenario: In the current climate, video streaming services have also had unprecedented demand and have needed to adapt quickly to scale up. If your favorite streaming service had to deploy individual DVD players into a shared data center to meet this demand, are they really capable of scaling rapidly? The same idea applies to your <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-sase\"><span style=\"font-weight: 400;\">secure access service edge<\/span><\/a><span style=\"font-weight: 400;\"> (SASE) or remote access provider, only in this instance, the impacts of slow scaling and poor performance have long-term implications.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/access\"><span style=\"font-weight: 400;\">Prisma Access<\/span><\/a><span style=\"font-weight: 400;\">, the Palo Alto Networks SASE solution, was purposefully architected to be truly <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/cloud-branch-security-sase\/\"><span style=\"font-weight: 400;\">cloud native<\/span><\/a><span style=\"font-weight: 400;\">, leveraging Infrastructure as a Service (IaaS) providers like Amazon Web Services and Google Cloud Platform to enable truly dynamic scale when it is most critical. Due to recent events, we have seen a drastic increase in utilization of Prisma Access. With a cloud-based foundation, the service has automatically scaled, as seen in the graph below.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<figure id=\"attachment_109622\" aria-describedby=\"caption-attachment-109622\" style=\"width: 1064px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1064\"><span class=\"ar-custom\" style=\"padding-bottom:46.71%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-109622 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/graph1-2.jpeg\" alt=\"This graph shows how Prisma Access automatically scaled in response to an increase in concurrent mobile users from March 4-25, 2020. \" width=\"1064\" height=\"497\" \/><\/span><\/div><figcaption id=\"caption-attachment-109622\" class=\"wp-caption-text\">Concurrent Mobile Users on Prisma Access from March 4 - 25, 2020<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Part of ensuring performance and user experience with any SASE product is global presence. Users need direct-to-internet connectivity for their critical SaaS applications such as Office365, Google G Suite and Salesforce.com. Users also expect to see web pages loaded in their regional dialect. For example, people in Spanish-speaking countries expect Spanish web pages, not French. If you are rapidly scaling SASE, consider the provider\u2019s global presence in regions that matter to your organization. COVID-19 has had a global impact and the ability to scale up globally is critical. As you can see in the diagram below, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/guides\/securing-remote-workforces-with-prisma-access\"><span style=\"font-weight: 400;\">Prisma Access<\/span><\/a><span style=\"font-weight: 400;\"> has scaled up worldwide automatically to help our customers conduct business effectively.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<figure id=\"attachment_109608\" aria-describedby=\"caption-attachment-109608\" style=\"width: 1064px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1064\"><span class=\"ar-custom\" style=\"padding-bottom:53.95%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-109608 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/graph2-1.jpeg\" alt=\"This graph shows how Prisma Access scaled up worldwide automatically. The information is broken down by region and covers the period from March 4-25, 2020. \" width=\"1064\" height=\"574\" \/><\/span><\/div><figcaption id=\"caption-attachment-109608\" class=\"wp-caption-text\">Prisma Access usage by region globally from March 4-25, 2020<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Now, let\u2019s talk about security with a real-life scenario. Say, for example, you live in San Francisco. Upon arriving at the airport to board your plane to Houston as expected, you have to go through security where you and your items are \u201cinspected.\u201d Now fast forward to when your trip is done and you head back to the airport to come home. This time, however, there is no security check and you and your items just board your plane. How secure do you feel?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Scale and performance are critical to business operations, but security must not be forgotten! The scenario above is how some products address private access, but just because the traffic is headed \u201chome\u201d to your data center or cloud resources, doesn\u2019t mean you shouldn\u2019t apply security policies. Recently, the sudden expansion of remote workers has left many organizations without enough laptops on hand. The time required to procure and image laptops only delays operations. Some organizations must allow users to use personal devices to access corporate resources in order to ensure productivity continues.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your SASE or remote access solution isn\u2019t inspecting this traffic, you are greatly increasing your attack surface. Full inspection for security and policy application is essential to ensure that business proceeds securely. The solution you choose needs to enable users to be productive while also ensuring they cannot accidentally upload malware or exfiltrate sensitive data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about how <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/secure-remote-workforces\"><span style=\"font-weight: 400;\">Palo Alto Networks is helping to secure and scale remote workforces.<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As organizations seek to provide secure access to newly remote workers, they need to consider scale, performance and security.<\/p>\n","protected":false},"author":663,"featured_media":108494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768,6765],"tags":[6888,7050,6833,102,6881],"coauthors":[6846],"class_list":["post-109321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","category-secure-the-enterprise","tag-branch-security","tag-covid-19","tag-prisma-access","tag-remote-access","tag-sase","sase_category-use-cases"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/IMG_2009.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=109321"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109321\/revisions"}],"predecessor-version":[{"id":120934,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109321\/revisions\/120934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/108494"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=109321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=109321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=109321"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=109321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}