Why Secure Remote Working?

The world as we know it has changed, and so has your business. In this new world, staying productive means staying connected. Employees must be able to work anywhere, with any device, and access any application.

The Remote Workforce is here to stay. However, this new working culture is more susceptible to attacks as more connected devices enter the workplace.

Businesses must re-calibrate their security approach around remote user and access. Evology can help unify your approach to securing your remote workforce across the following areas:

Endpoint Protection

Complete security solution built to protect user PCs and laptops from today’s complex threat landscape. 

Mobile Threat Detection

Securing employees’ mobile devices to keep corporate data safe across all attack vectors. 

Email and Office Security

Securing Email, Office 365 and Google Workspace productivity applications from malicious content.

Secure Internet Browsing

Browser protection for web based threats, including zero-day phishing, malware and corporate password misuse.

Secure Remote Access

SASE architecture to connect any user or branch to any resource, anywhere, without compromising security.

Unified Management

A simple centralised platform to manage all elements of security for your remote workforce.

Complete Endpoint Protection

Computer and Paper

Prevent the most imminent threats to your endpoints such as ransomware, phishing or drive-by malware, while quickly minimising breach impact with autonomous detection and response. 

Phishing Protection – Prevent credential theft with Zero-Phishing technology that identifies and blocks the use of phishing sites in real-time. Sites are inspected and if found malicious, the user is blocked from entering credentials. Zero-phishing protects against previously unknown phishing sites and corporate credential re-use.

Block malware coming from web browsing or email attachments before it reaches the endpoint, without impacting user productivity. Every file received via email or downloaded by a user through a web browser is sent to the Threat Emulation sandbox to inspect for malware. Files can also be sanitized using a Threat Extraction process (Content Disarm & Reconstruction technology) to deliver safe and cleaned content in milliseconds.

Gain runtime protection against ransomware, malware, and file-less attacks, with instant and full remediation, even in offline mode. Once an anomaly or malicious behaviour is detected, block and remediate the full attack chain without leaving malicious traces. Anti-Ransomware identifies ransomware behaviours such as encrypting files or attempts to compromise OS backups and safely restores ransomware-encrypted files automatically. 

Automated attack containment and remediation: Once an attack has been detected, the infected device can be automatically quarantined to prevent lateral infection movement and restored to a safe state. 

Threat Hunting: powered by enterprise-wide visibility and augmented by globally shared threat intelligence from hundreds of millions of sensors, collected by Check Point’s ThreatCloud™. With the Threat Hunting capability, you can set queries or use predefined ones to identify and drill down into suspicious incidents and take manual remediation actions. 

Mobile Protection

Remote workers are accessing corporate data from their mobile devices at an increasing rate. These devices carry vast amounts of personal and corporate data, which if compromised places your business at significant risk of data breach.

Using market-leading Mobile Threat Defence solutions we keep your corporate data safe by securing employees’ mobile devices across all attack vectors: apps, network and OS, without impacting user experience or privacy.

App Protection 

Prevents malware from infiltrating mobile devices by detecting and blocking the download of malicious apps in real-time. Check Point’s unique behavioural Risk Engine runs applications in a cloud-based environment to determine if an app is malicious, leveraging machine learning and AI, sandboxing, advanced static code flow analysis, anomaly detection, and app reputation.

Network Protection 

On-device Network Protection – allows businesses to stay ahead of emerging threats by extending Check Point’s industry-leading network security technologies to mobile devices. 

Mobile Protection offers a broad range of network security capabilities, including: 

  • Anti-Phishing with Zero-Phishing: Blocks phishing attacks across all apps, both from known and unknown zero-day phishing sites, and sites that use SSL 
  • Safe Browsing: Blocks access to malicious sites from any web browser, leveraging the dynamic security intelligence provided by Check Point’s ThreatCloud™ 
  • Conditional Access: Blocks infected devices from accessing corporate applications and data, independent of UEM solutions 
  • Anti-Bot: Detects bot-infected devices and automatically blocks communication to command-and-control servers 
  • URL Filtering: Mark websites as “blocked” or “allowed”, preventing access on any browser to websites deemed inappropriate by an organisation’s corporate policies 
  • Protected DNS: Allows administrator to manage and control all mobile device’s DNS preferences. The service protects end-users privacy and prevents MiTM attacks & DNS Spoofing of plain text DNS messages. 
  • Wi-Fi Network Security: Detects malicious network behaviour and Man-in-the-Middle attacks, and automatically disables connections to malicious networks. 

OS and Device Protection

 Ensures devices are not exposed to compromise with real-time risk assessments detecting attacks, vulnerabilities, configuration changes, and advanced rooting and jailbreaking.

Secure Remote Working - Email and Office Security

Email & Office security provides businesses with complete protection for both Email, Microsoft and Google productivity applications and constantly adapts and evolves to the ever-changing threat landscape.

Block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise (BEC) using AI-trained engines

Built-in security is not enough to stop advanced phishing attacks that involve meticulous social engineering techniques designed to deceive and manipulate end-users. Email & Office protection deploys as the last line of defence and secures inbound, outbound, and internal emails from phishing attacks that evade platform-provided security. The solution inspects the communication’s metadata, attachments, links and language, as well as all historical communications, in order to determine prior trust relations between the sender and receiver. It also inspects internal communication in real time in order to prevent lateral attacks.

Block malicious attachments before they reach users’ mailboxes, without impacting business productivity

Using Threat Emulation and Extraction to sandbox and block first-time seen malware in addition to cleaning files and eliminates potential threats to deliver a safe file version to users in under 2 seconds.

Protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)

Email & Office security detects sensitive data sharing via email and other productivity applications and immediately limits data exposure. When data is shared through email or other productivity suite applications, the subject, body, attachments, credit card details or competitive information is examined and blocked to prevent data leaks, based on your security policies.

Prevent advanced account takeover attacks by augmenting authentication processes

Email & Office uses technology to prevent unauthorised users and compromised devices from accessing your cloud email or productivity suite applications. Email & Office security intercepts attackers using machine-learning algorithms, which analyse user behaviour and feed off sources such as mobile and endpoint on-device detection of OS exploits, malware and network attacks, SaaS native APIs, and Check Point’s ThreatCloud.

Secure Internet Browsing

Secure Browsing enables users to safely browse the internet no matter where they are. It protects organisations and their employees from web-based threats by inspecting all SSL web traffic directly on the endpoint, using an innovative nano agent deployed within any browser. It prevents users from visiting zero-day phishing sites, downloading zero-day malware, accessing non-compliant websites, and reusing corporate passwords for non-business web content. 

Secure Internet Browsing delivers fast and private web access without re-routing and decrypting SSL traffic in the cloud or through an on-premises appliance.

Protects browsers from zero day attacks:

Prevents advanced threats in downloaded web content: Every file downloaded through a browser is sent to a Threat Emulation® sandbox and inspected for malware. Simultaneously, Check Point’s proactive Threat Extraction®, delivers a sanitised version of the file in milliseconds.

Blocks zero-day phishing sites designed to steal user credentials: Prevent credential theft by using Check Point’s Zero-Phishing® tech­nology to identify and block both known and unknown phishing sites. Sites are inspected within the user’s browser, analysing page visuals, text, and domains. If the site is found to be malicious, the user is blocked from entering their credentials. The result is the broadest phishing protection on the market.

Prevents misuse of corporate passwords: Re-using corporate passwords on unauthorised or non-business sites puts organisations at risk. Users may be targeted to gain access to corporate credentials for malicious purposes. Access to business services are kept safe when workers are blocked from re-using their corporate credentials on non-business-websites.

Reduces the attack surface by blocking access to websites deemed inappropriate by company policies: Secure Browsing URL filtering controls access to millions of websites by category, users, groups and machines to protect users from malicious sites to enforce a safe web browsing experience.

Secure Remote Access

Secure Remote Working - Remote Access

Using Secure Access Service Edge (SASE) architecture, connect any user or branch to any resource, anywhere, without compromising security. Powered by 11 cloud-delivered security services, your business can access a secure and fast local connection, anywhere.

  • Client-less access – Provides employees and contractors secure and easy access to any corporate application (including web applications, databases, remote desktops, and SSH remote terminals), with simple SaaS-like access from any web browser and any device (even mobile and home PCs).
  • Client-based access – Utilises a VPN agent to provide full network-layer access to corporate networks and applications.

AI driven SASE that’s built to prevent

Unifies all critical SASE components, including networking and 11 security products to provide end to end security including Next Generation Firewall, Secure Web Gateway and advanced sandboxing.

Zero Trust Network Access (ZTNA) to corporate applications, providing the right people in the right context, the least privileged access to applications, reducing your attack surface

Easy to deploy and manage

Security administrators can easily deploy the solution in less than five minutes from the cloud and benefit from enhanced visibility including full audit trails of user activity

Cloud-based management provides unified policy control, coupled with global visibility into threats and user activity in addition to Single-click branch office security, tightly integrated with leading SD-WAN services

Secure your everyone

Choice of client-based and client-less connectivity to address a broad range of secure remote access use-cases with built-in single sign on access to web applications, remote desktop and cloud servers.

High performance networking with less than 50ms latency and a 99.999% uptime SLA

Unified Management

A single management platform designed allows administrators to manage all areas of security for the remote workforce in one place. Providing your business with:

Real Time Threat Prevention

Stay ahead of attackers with real-time threat prevention technologies across all environments, using more than 60 patented threat prevention engines.

  • Network-based threat prevention for security gateways with best-in- class IPS, AV, post-infection BOT prevention, sandboxing and malware sanitisation.
  • Endpoint detection and response with anti-ransomware, AV, post- infection BOT prevention, endpoint sandboxing and forensics.
  • Advanced mobile threat prevention protects devices from threats to the OS of the device, its apps, and networks
  • Posture management, native workload protection, public and private network security, visibility and threat hunting, Office 365 email security, branch cloud security and branch virtual security.

Shared Threat Intelligence

Using Check Point’s ThreatCloud, the world’s largest cyber threat intelligence database, businesses can leverage artificial intelligence to anticipate unknown attacks and uncover new vulnerabilities, handling 86 billion transactions daily. ThreatCloud’s rich intelligence powers the dozens of threat prevention engines, with the interconnectivity between all components delivering consistent protection across an organisation’s entire environment.

Centralised Management, Unified Policy and Seamless Integration

Unified management helps organisations deliver agile and secure IT, which can adapt as business requirements change. All of the Secure Remote Working components highlighted above use the same common software platform, controlled and monitored by the same management system, and share the same threat intelligence. This means that security policies, monitoring and threat prevention is consistently updated and applied across the entire IT infrastructure.

Next Steps

There are a number of options available that can shape around your business needs, including free trials of any of the components above or a secure remote working review with one of our friendly experts. If you want to learn more about how we can help with securing your remote workforce, get in touch by clicking the link below.