Enhance Cybersecurity in the Work from Home Era

Deliver the added cybersecurity protection your business needs for ongoing remote working.

Your Attack Surface Has Expanded. What’s Your Next Move?

The COVID-19 pandemic ushered in a new era for cybersecurity. The increase in remote working is here to stay, and cybercriminals have exploited that shift. Businesses are struggling to monitor their expanded attack surface and it is now paramount that every business can fully secure its VPN environment to protect its “crown jewels.” CyGlass provides the added layer of protection required to thwart increasingly frequent and sophisticated cyberattacks originating through remote workers. Our Plan, Prioritise and Protect methodology allows you to quickly and easily adapt your cybersecurity approach to the changing dynamics of remote working.

HOW TO ENSURE CYBERSECURITY FOR REMOTE WORKING

  • Plan

    Improving network visibility gives you the information needed for proper cybersecurity planning. CyGlass uses machine learning to discover your network assets (machines), subnets, applications, users and continuous services. It combines this with business context you provide, such as importance or data classification (HIPPA, sensitive, etc.), to help you build the right policies for alerting and response actions. 

    Tips

    • Map out the critical assets that employees should and should not be allowed to access from the VPN, including which protocols are allowed (e.g., RDP or SSH).
    • Revisit new policies and implementations that occurred during the transition to remote working. Label the network to identify VPN activity.
  • Prioritise

    After baselining your network behaviour, CyGlass provides a threat score for every element on the network. The score helps analysts prioritize your analysts’ efforts and ensures they spend time on the most urgent issues. 

    Tips

    • Tag high-risk networks and those that should not have traffic. These can be used for policies to alert on activity that could be unauthorized by VPN users.
    • Keep a close eye on your VPN environment by segmenting the IP ranges that your VPN allocates addresses from. If you have multiple VPNs, label them with the same organisation name and use tags to distinguish them; or label them with separate organisation names and use a common tag to refer to all at once.
  • Protect

    Acting fast is the key to mitigating threats. With CyGlass, you can set policies that triage response based on the urgency and/or severity of a threat. Those responses may include alerts, alert escalations, blocking traffic on the firewall, suspending users or terminating a VPN session. 

    Tips

    • Build policies to alert you to threats and unauthorised activity, including unauthorised traffic to destinations that should not be accessed through the VPN and unusual failed login attempts.

Tips

  • Map out the critical assets that employees should and should not be allowed to access from the VPN, including which protocols are allowed (e.g., RDP or SSH).
  • Revisit new policies and implementations that occurred during the transition to remote working. Label the network to identify VPN activity.

Tips

  • Tag high-risk networks and those that should not have traffic. These can be used for policies to alert on activity that could be unauthorized by VPN users.
  • Keep a close eye on your VPN environment by segmenting the IP ranges that your VPN allocates addresses from. If you have multiple VPNs, label them with the same organisation name and use tags to distinguish them; or label them with separate organisation names and use a common tag to refer to all at once.

Tips

  • Build policies to alert you to threats and unauthorised activity, including unauthorised traffic to destinations that should not be accessed through the VPN and unusual failed login attempts.

IMPACTS OF WORKING FROM HOME ON CYBERSECURITY

WhitePaper

Maximize Your Cybersecurity in a Remote Working World

Be proactive about managing the increased risks of a continued work-from-home landscape. Discover how you can better secure your VPN environment.

Get Whitepaper
White paper snippet

CYGLASS ADVANTAGES FOR REMOTE WORK ENVIRONMENTS

App screenshot

VPN Network Labeling

Label high-risk networks and design policies that emphasise protection of these subnetworks and address ranges. You can also label networks that should be seeing no activity to highlight potential unauthorised access.

App screenshot

AI-Based Threat Analytics and Alerts

Ingest VPN logs into NDaaS to power AI-based analysis of threats and alerts on suspicious or anomalous events, such as unusual access times or locations and unusual number of failed logins.

App screenshot

Unique Policies for Your Remote Workforce

CyGlass NDaaS provides all of the information necessary to begin the first steps of incident response against ransomware. The analysis of the artefacts enabled by CyGlass leads to quicker remediation of attacks and reduces the likelihood of the real threat of the organisation falling victim to the ransomware attack a second time.

Dedicated Interface for Managing Alerts

Dedicated Interface for Managing Alerts

CyGlass can be up and running in minutes and provides meaningful insights to your network in hours. No additional people, hardware or software are necessary.

Icon of computer

Fast and Easy to Deploy

NDaaS from CyGlass is up and running in minutes with no additional hardware or software required. It integrates seamlessly with your existing cybersecurity tools and can be entirely managed remotely.

Cloud devices

See how simple it is to protect your organisation

Find out first-hand how CyGlass NDaaS can help your organisation see risks, stop threats and prove compliance.

Get a demo