sb-eu logo
Story image

Bring Your Own PC security to transform businesses within five years - Gartner

Bring Your Own PC security will transform businesses within the next five years, according to a new report from Gartner.

The 2020 Gartner. Inc. Hype Cycle for Endpoint Security features two technologies that will have transformational impact on global businesses within the next 10 years. 

The analyst firm says Bring your own PC* (BYOPC) security will reach mainstream adoption in the next two to five years, while it will take five to 10 years for mainstream adoption of secure access service edge (SASE) to take place.

“Prior to the COVID-19 pandemic, there was little interest in BYOPC,” says Rob Smith, senior research director at Gartner. 

“At the start of the pandemic, organisations simply had no other alternative. The urgent need to enable employees to work from home and a lack of available hardware bolstered its adoption globally. Gartner clients said their adoption of BYOPC is up from less than 5% in 2019," he says.

In this year’s Hype Cycle, BYOPC security and SASE reached the Peak of Inflated Expectations. The wide and sudden adoption of BYOPC has become a necessary security strategy that requires CISOs and security leaders to put in place specific security practices. 
 
BYOPC Security and SASE At the Peak

“CISOs and security leaders should expect the need to support BYOPC to be dependent upon a long-term work-from-home strategy, as well as security tools needed for a BYOPC environment,” says Smith.

“They need to prioritise their security practices, including enabling multifactor authentication (MFA) for all access to any corporate resource regardless if virtual or not, and if cloud or on-premises," he explains. 

"Organisations must contain all cloud application data and disallow local storage or upload of local data from any BYOPC device, as this could infect the cloud system. They also need to virtualise access to any traditional on-premises application.”

As BYOPCs are often infected with malware or ransomware and fall victim to phishing attacks, IT must limit and control access by offsetting the PC hardware investment with critical security technologies such as MFA, cloud access security broker (CASB), zero trust network access (ZTNA), virtual desktop infrastructure, and desktop as a service.

“Without investment in these technologies, IT faces a much higher potential cost in the form of ransomware,” Smith says.

“It is also critical that IT works with HR, legal, and workers councils to develop a proper work-from-home policy.”

Also, at the peak this year, SASE allows any endpoint to access any application over any network in a protected manner. SASE delivers multiple capabilities such as SD-WAN, secure web gateways, CASB, next-generation firewall and ZTNA.

 Joe Skorupa, distinguished research vice president at Gartner, says, “Although SASE is relatively new, the COVID-19 pandemic has fostered the need for business continuity plans that include flexible, anywhere, anytime, secure remote access, at scale, even from untrusted devices.

“As SASE services are cloud-native — dynamically scalable, globally accessible, multitenant and including zero trust network access, they are driving its rapid adoption," he says.

"Over the last three months, SASE has been adopted by more than 40% of global remote workers.”

SASE enables IT infrastructure & operations (I&O) and security teams to deliver a rich set of secure networking and security services in a consistent and integrated manner to support the needs of digital business transformation, edge computing and workforce mobility.

“Mobile workforce, contractor access and edge computing applications that are latency sensitive are three likely opportunities,” adds Skorupa.

Story image
Cybersecurity trends to look out for: Extortion among the top threats in 2021
Cyber-crime is evolving, driven by emerging trends — 2021 may be the first year when data extortion officially becomes the main threat to businesses worldwide.More
Story image
ExtraHop reveals methods used by attackers in SUNBURST breach
The network detection and response company says between late March and early October 2020, detections of probable malicious activity increased by approximately 150%, including detections of lateral movement, privilege escalation and command and control beaconing.More
Story image
WatchGuard rolls out updates to bring greater security to MSPs
"WatchGuard Cloud’s continued evolution is lowering the barrier to entry for MSPs to add security to their portfolios and solidifying it as the management platform of choice for the security channel.”More
Story image
CIOs massively underestimate Secure Shell risks - study
While CIOs say they are concerned about the security risks SSH machine identities pose, Venafi data indicates they seriously underestimate the scope of these risks. More
Story image
Cyber criminals target education sector as remote learning increases
“Unfortunately, until all students are back in the classroom full-time, educational institutions will continue to be a popular target for criminals."More
Story image
Endace and Corelight step in to enhance incident response workflows
Endace and Corelight have entered into a strategic partnership to deliver security teams with insights and detailed forensic data to further enable rapid incident response.More