- Tram Ho
The new context requires new skills, and new problems also arise: from equipment, internet connection with bandwidth capacity to meet requirements, to applications and software to meet business requirements and convenience. facilitate exchange… In addition, it is necessary to ensure that individuals and departments can interact with each other and with the familiar working environment, or the ability to access common resource storage spaces. … But all will turn to disaster if one thing is missing – safety.
“Being safe and feeling safe allows us to do more, be more creative and believe more in the technology that connects us all,” said Mr. Vasu Jakka – Vice President in charge Microsoft Security, Compliance, and Identity.
A New Approach to Enterprise Security Issues
In the context of remote work or hybrid work environments, employees are one of the biggest security holes in the enterprise. According to a recent survey conducted by Kaspersy, more than half of businesses believe that their cybersecurity risks are internal. Along with that, the top three concerns about protecting a business’s cybersecurity are related to employees or human error, including: inappropriate data sharing via mobile devices (47%) ; losing a mobile device puts the organization at risk (46%); and employees using IT resources inappropriately (44%).
Addressing this issue, Microsoft has repeatedly mentioned resetting security, identity, and compliance. Accordingly, the company believes that security is not “applying” a standard system from the outside, but the components of the security system (network security, identity and compliance…) need to be tightly integrated right into the products and platforms businesses are using, thereby ensuring seamless in managing safe access, data security, meeting regulatory and protection requirements from threats.
According to Vice President Vasu Jakka, Microsoft is constantly working to help organizations and businesses adapt and adapt to security innovations, to provide the best protection, detection, and response in the environment. our multi-cloud, cross-platform environment as well as enabling security professionals to stay ahead of attacks. All of these enhancements are seamlessly integrated in Microsoft 365 Defender, which provides detection and response capabilities for identities, endpoints, cloud apps, email, and documents.
Siemens and the “problem” of safer, more flexible remote working
Siemens – a “name” in the world technology village, has more than 140,000 employees, distributed in more than 125 locations across 43 countries, working remotely from 2 to 3 days a week has become a standard practice. standard.
When Covid-19 broke out and employees were forced to work from home, the need for remote communication spiked, Siemens deployed Microsoft Teams “speedy” to provide solutions for collaboration, meetings, calls, scalable and reliable real-time information sharing.
For more than a decade, Siemens employees have only used an on-premise communication solution. 2020 saw a strategic decision, as it moved to the cloud with Microsoft 365 and used Teams as the company’s primary collaboration platform as part of that transition.
To meet tight security requirements, Siemens used Microsoft Endpoint Manager endpoint security solutions to remotely manage employees’ work devices, including phones, tablets, and laptops. It is a comprehensive cloud-based endpoint security solution with risk-based vulnerability assessment and management, reducing attack surface levels and automating investigation and remediation. dress.
Tiago Charréu, Global Head of Microsoft Teams Deployment at Siemens, said: “Through Teams, all of our employees can more securely connect with customers, partners and suppliers through permissions. access as an approved guest”.
Thanks to quick IT planning and transparent and transparent Teams implementation, Siemens employees have maintained a normal level of productivity when switching to Teams to work from home. Meeting room technicians also save a lot of time when they do not have to monitor equipment and troubleshoot problems and focus on core business priorities.
Source : Genk