...

Work from Home

The COVID-19 pandemic has dramatically accelerated the move away from the physical office towards "work from home" (WfH). CrossLink ZTNA is a rapidly-scalable cloud solution with a seamless user experience to meet the challenges of the WfH paradigm.

The Home is the New Office...with New Risks

Influx of new remote users creates an influx of new attack points.

To meet the near overnight increase in demand for remote access and avoid business disruption, many enterprises found themselves with no choice but to grant broad access to all of their new remote users. However, granting unrestricted access provides new attack points into the enterprise, especially among new users not accustomed to the security demands of remote work. It's time to regain control with CrossLink ZTNA.

User-owned devices carry inherent risk.

Though many enterprises would typically arm their "road warriors" with enterprise-managed devices, the surge in remote work has meant a surge in user-owned devices. Establishing trust in these devices is paramount before granting access to enterprise resources. Failure to do so opens the door to large-scale data breaches and other attacks. CrossLink ZTNA ensures that trust is established at all points during the access lifecycle.

Enterprise agility requires an agile cloud-based solution.

The explosion of working from home meant enterprises had to double or triple their remote access capabilities overnight. Those who relied on legacy technologies like VPN could simply not respond with the required agility the meet the increased demand. CrossLink ZTNA is a fully cloud-based solution designed for agility and flexibility, rapidly scaling on-demand as the needs of the enterprise change.

"A recent Gartner survey to CFOs found that 74% of organizations plan to increase the number of employees that permanently work from home postpandemic."

Source: Gartner — How Security Product Leaders Should Respond to the 4 Phases of Covid-19 (2020)

Why CrossLink for WfH

...

Leverage User Devices

Leveraging user-owned devices requires enterprises to ensure that these devices are trusted both before and during the access lifecycle. CrossLink ensures that consistent health policies are applied to all types of devices, both mobile and non-mobile. Vendors that fail to fully attest devices prior to granting access open up channels for attack into the enterprise. Vendors that do not adhere to the tenets of zero-trust and grant access on a restricted basis likewise open up channels for attack into the enterprise.

Learn more

Seamless User Experience

For many employees, this marks the first time that they are working away from the office. These users don't want to know where enterprise resources are or how to access them; they simply want to work as if they were in the office. CrossLink offers a seamless user experience that makes the access control infrastructure entirely transparent to the user. No agent to launch. No hurdles to jump over.

Learn more

...
...

Agility and Fast On-Boarding

CrossLink is a cloud-based service that is built like the cloud: agile, distributed, redundant, and massively-scalable. As the needs of the enterprise change, CrossLink quickly adapts. Extensive integration with identity providers (IdP) and other enterprise services ensure that users can be on-boarded in minutes, with out-of-the-box support for strong authentication to ensure a trusted user identity.

Learn more

Simplified Management

CrossLink Policy Discovery Engine automatically monitors and learns the access requirements of users, reducing the burden on enterprise IT to manually define access policies. Leveraging machine learning to dynamically construct access control profiles, CrossLink greatly reduces operational costs and ensures that the enterprise remains responsive as the user environment changes.

Learn more

...

Not All ZTNA Solutions are Created Equal

ZTNA products that fail to address the following criteria will not be able to fully meet the demands of the new work environment:

 
CrossLink
Other Vendors
Support for all applications and protocols—including all IP-based protocols—out-of-the-box, enabling remote users to work from home as if in the office.
?
Fine-grained device health attestation both before and during the entire access lifecycle, ensuring that potentially dangerous user-owned devices never have access to the enterprise network.
?
Seamless user experience that makes access control entirely transparent to the user, enabling them to focus on what matters: business objectives.
?
Cloud-based solution that can scale quickly as the access needs of the enterprise change.
?
Tools to simplify management and creation of access control profiles, reducing the complexity and operational costs associated with the large influx of new users.
?
Extensive alerting, auditing, and reporting capabilities to ensure visibility and control of new remote users.
?

Ready to embrace the home as the new office?