manage remote workers better in 3 easy steps

34
Manage Remote Workers Better in 3 Easy Steps

Upload: jumpcloud

Post on 28-Jul-2015

197 views

Category:

Business


0 download

TRANSCRIPT

Manage Remote Workers Betterin 3 Easy Steps

Around the world, working remotely increased 79.7% between 2005 and 2012 (Global Workplace Analysts)

WHY?

MONEY (obviously)

$$

$

$$

A typical business is estimated to save $11,000 per remote worker (telecommuter) a year; and telecommuters save between $2,000 and $7,000 a year.

What about efficiency and happiness?!?!

Telecommuting has also been linked to increased productivity and greater employee satisfaction.

It’s easy to see that leveraging remote workers helps a business move at a faster pace.

! But isn’t it dangerous?

! Yes, it is!

Without proper security, remote working can make businesses vulnerable to security breaches. It can also be a hassle to manage.

Lucky for you,we’re here to help!

“The gap between BYOD use and BYOD policies is both staggering and frightening.”Alan Shimel,CEO at The CISO Group

3 Stepsto ensure that the networks, applications, and devices used in telecommunications are accessible and secure:

“The gap between BYOD use and BYOD policies is both staggering and frightening.”Alan Shimel,CEO at The CISO Group

Step 1:Gain Management / Controlof Remote Devices

The Old Fashioned Way:

Using Microsoft AD and building aVPN tunnel between the device and the home office.

It was a tough time to be an IT Admin.

The Modern Way:

Effectively manage remote workers and devices withbridging technology.

The Modern Way:

It all takes place on the cloud…But you can still use Microsoft AD!

The Modern Way:

An agent is placed in each remote device, which acts as a bridge back to the central directory.

The Modern Way:

Admins get full control over each remote device from their central AD instance without getting a headache!

Step 2:Secure Access to YourRemote Network

Employ directory services in order to gain new security powers! Including...

1. Rotating passwords

2. Account lockout

3. Local firewall configurations

4. Browser privacy

5. Security settings.

IT admins simply create a script and then can execute it on all of their devices.

Step 3:Provide Access to Both Internal and External Applications

Far away employees still needtheir IT resources to be close-up.

Remote workers must have access to to their tools and to critical information while still remaining secure.

How to manage remote device access securely

1 Establish centralized access management with a directory

1 Establish centralized access management with a directory

2 Configure both client and server so the directory can control authentication and authorization

1 Establish centralized access management with a directory

2

3

Configure both client and server so the directory can control authentication and authorization

Secure communication between client and server

This can be done with secure HTTP, via IMAPS or other secure protocols, or by encrypting and tunneling communications through a VPN.

And that’s how order is restored to chaos… in the land of IT.

Follow the steps, implement bridging technology and a Directory-as-a-Service and you too can manage your remote workers around the world…

Key Takeaway:

...like a superhero from his secret hideout.

Check out our entire eBook: The Guide to Doing More Faster. Now with IT Control

In this eBook, thought leaders Gene Kim (author and DevOps evangelist), Rajat Bhargava (CEO JumpCloud), Ben Kepes (Forbes contributor), Alan Shimel (DevOps.com Executive Editor) discuss actionable steps for how modern IT teams build decentralization into their organization while maximizing the security that their IT team needs to keep their organization safe.