The sudden shift to remote working has caused an equally rapid change as security teams adapt to the explosion in VPN usage and an increase in unmanaged devices remotely accessing systems. At the same time cloud deployed VDI usage is climbing while SaaS collaboration and file sharing apps—especially Office 365—become even more critical.
Join this webcast to examine five areas that attackers will target and your best practices to re-gain visibility and control across your remote worker attack surface:
- Remote access tools
- File sharing tools
- SaaS tools
- Connections from unmanaged systems
- DNS and split VPNs