The Office...
Relax, work securely at home. Photo by Dillon Shook on Unsplash

The Office...

...and How to Take it Home With You


Nirvana

Taking the office desk home

In the office, all employees have a “desk” on the corporate network where they can get on with their day job. But beyond the boundary of the corporate network lies the big bad Internet, where dragons lie in wait to catch the unwary. Since the day job inevitably means accessing the Internet in some way, some magical security gateway device is used to keep the dragons out. Nothing bad can get in. Nothing sensitive can leak out. Everyone can work in perfect safety.

The Home Workers

But then your employees want to work at home. They want to take move their “desks” out of the corporate network and into their home office. This sounds dangerous. What’s to be done to keep them happy?

Taking the desk home leaves the corporate network vulnerable

Instead of taking the desk out of the corporate environment, why not extend the corporate network out to their home environment, so even though they are physically at home, their “desk” is within the logical confines of the corporate network. This can be done, using virtual private network (VPN) technology. The employee is at home, but their “desk” is on the corporate network, where it can access all the line-of-business applications they need during the day. 

No alt text provided for this image

But there’s a potential snag. The employee’s home network is connected to the Internet, so their desk can be attacked by the dragons. If this happens, then the dragons are effectively on the corporate network and so have access to all the line-of-business applications and the desktops of all other employees.  This is called “split tunnelling” and gives better performance and more flexibility, but significantly weakens the corporate boundary.

No alt text provided for this image

The fix is to arrange that the employee’s desktop computer is connected to the home network in such a way that it appears an isolated outpost of the corporate network. This means the computer has no access to the Internet, even though the Internet is being used to give it access to the corporate network. With this in place, the employee working at home can only access the Internet through the corporate security gateway, just as they would if they were in the office. That all sounds great, but the picture doesn’t quite show how it works and there are a number of issues to be addressed, with the result there are a lot of maintenance costs and overheads.

No alt text provided for this image

In practice, another security device, the VPN server, is needed at the office boundary to allow the remote workers to get in. The workers at home connect their desktop computer to their home network, and their VPN client software makes a connection to the VPN server. This connection is then used to give the computer a virtual network interface that is joined to the corporate network. The computer’s operating system hides the connection from all the applications, so they can only see the virtual interface that puts them on the corporate network (all traffic passes down the tunnel into the corporate network). 

No alt text provided for this image

With this setup, the dragons ought not be able to get in, but they are stubborn beasts who don’t give up easily. First off, they might try to get into the employee’s computer through the connection it has to make to the Internet, though this is difficult because the computer is not listening for incoming traffic. Instead, they might go for the VPN server that lets employees access the corporate network, perhaps by stealing the credentials used by a legitimate employee to gain access. Another trick they might try is to steal an employee’s computer and then use it to access the corporate network, so measures such as disk encryption and biometrics are needed to prevent a lost machine being misused in this way.

No alt text provided for this image

Now things have got a lot more complicated than the original simple idea of extending the corporate network out to the employee’s home. There’s lots to go wrong, and in practice it does. The dragons win too often, so now organisations are adding yet more security defences around their line-of-business applications, to check that accesses are legitimate even when they come from the corporate network. This is “zero trust networking”, which means not trusting the network edge defences to keep the dragons out. But it still relies on authenticating the users, and if the dragons have taken control of the desktops there’s a good chance that they also control the credentials used to authenticate. That means yet more security measures are needed, like two-factor authentication, whenever line-of-business applications are used. Complexity is being piled on top of complexity, and if nothing else, support costs are rocketing as all those mechanisms need care and maintenance. 

A Simplified Approach

Does it have to be so difficult, expensive and inefficient? Maybe not, because we can now exploit the power of the cloud. Rather than take the employee’s desk into their home, we can take it into the cloud, in a separate bubble that’s an offshoot of the corporate environment. The employees sit at home with a simple device that gives them remote access to their virtual desktop in the cloud. This could be a cheap corporate laptop or the employee’s own machine, as it never holds any corporate data. 

No alt text provided for this image

Good strong authentication can be provided to access the cloud environment, but even so access to the virtual desktop is not as well controlled as access to the desktops back in the office. To compensate, the security gateway can be used to control access to both the Internet and corporate network. Nothing gets into, or out of, the main corporate network without passing through the gateway, so it and the critical line-of-business applications remain protected. The virtual desktops are accessed remotely, but their network is not exposed to the Internet and all data is exchange through the security gateway.

No alt text provided for this image

 If all your employees already have a corporate laptop with VPN access, and you have the necessary support infrastructure in place, you are in a good position. Otherwise VPN technology is not the smart choice. Virtual desktops in the cloud are easier to deploy, provide better security and the management overheads that do exist are largely carried by the cloud service provider. They are ideal for users with lightweight or occasional access needs and perfect for collaborative environments where users from different organisations must come together on neutral ground. To check if it’s the right approach for you, call Deep Secure to arrange a trial.

Finally, if you’re concerned your security gateway is not sufficiently magical to keep dragons out, talk to us about our advanced Threat Removal technology because, as Arthur C. Clarke’s 3rd law states, any sufficiently advanced technology is indistinguishable from magic, so you won’t be disappointed.

To view or add a comment, sign in

More articles by Simon Wiseman

  • Solving the Cross Domain Solution Problem

    There are lots of Cross Domain Solutions (CDS) on offer, but what are they, who needs them and why are they special?…

    6 Comments
  • 2020 Vision

    The Future Christmas seems to get earlier each year, and with it come the inevitable technology predictions for the…

    1 Comment
  • Surviving Links in Email

    The Problem with Links What’s the problem with the web links in email? You click them, they take you somewhere…

  • What’s the Best Way to Stop Malware?

    You Choose: Detecting when Malware Detection Fails or Removing all Malware without Detection Anti-virus products that…

    3 Comments
  • Can You Trust the Zero Trust Approach to Networking?

    Zero Trust is in some ways the latest cyber security fad, which means nobody really agrees on what it’s all about and…

    11 Comments
  • Managing Security Patch Management

    Patch management is an important part of cyber security, but it is hard. How can it be managed better? Patch management…

  • Content Security Measures

    Protecting against unsafe content in the physical world and cyber space 1. Background In the physical world we are…

    1 Comment
  • Cat photos take over Android phones

    Google have just announced a security flaw in the way Android devices handle PNG images. This is very bad.

    1 Comment

Others also viewed

Explore content categories