- Community Home
- >
- Services
- >
- The Cloud Experience Everywhere
- >
- Redefining the Workplace with Secure, Pervasive Ac...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Redefining the Workplace with Secure, Pervasive Access
Businesses are starting to see the workplace experience not just as a strong competitive differentiator in the market for talent โ though itโs certainly that โ but also as a key enabler for innovation and profitability (see my previous post Want to Drive Innovation and Profitability? Create a Great Employee Experience). To unlock these deep potentials of the workplace, itโs crucial to focus closely on employee needs โ which may sound like a given, but youโd be surprised how often companies structure their workplace transformations around the technologies rather than around the people.
Employees in the modern workplace are hungry for a more dynamic, collaborative experience. Theyโre deeply interested in how workplaces are structured, and theyโre aware of the possibilities on the technology side. They understand that the nature of work is changing. Low-complexity, repetitive tasks are now, typically, the domain of robots or automated workflows, and that will increasingly be the case as the AI revolution unfolds. Consider the typical office design from just five or ten years ago, which required you to sit in a cubicle, at your desk, connected via an ethernet cable. It was hard to move around your office space into different neighborhoods, and engage people in natural working styles. Paper-pushing was a big part of the job. Not so much nowadays; we've automated a lot of those workflows.
The new normal
Employees want pervasive access to enable that experience of working wherever they choose โ in work areas, office cafeterias, conference rooms. They want to be untethered from their desks so they can interact with people and their physical surroundings in much more dynamic ways. But beyond that, they want secure pervasive access. They need to know that they can trust the infrastructure theyโre using and that their work output isnโt going to be lost through some compliance issue, malware, fraud, or even theft.
Thinking about secure, pervasive access takes us beyond simply focusing on wireless vs. wired infrastructure. It means thinking about things like seamless identity access management (IAM) to simplify employeesโ access to the apps and data they rely on. It means building in data protection at the foundation level to provide not just reliable networking, but the trust and the security that employees need, consciously or subconsciously, to maintain high productivity levels.
Defending the borderless perimeter
Just as work spaces are adapting rapidly to new styles of collaboration and decision-making, security is evolving quickly, too. Not so long ago, if someone gained unauthorized access to a corporate building โ maybe by tailgating in behind an employee โ they could connect a laptop to the ethernet and get access to some or all of the companyโs IT assets. The unspoken assumption was, "Well, if you've gained physical entry to a building, you probably should be there. And in that case, you should have access to IT resources.โ
Those days are gone. Companies are now thinking in terms of a borderless perimeter. Rather than regarding physical spaces as defining the perimeter for security, we now seek to expand security across boundaries. It shouldnโt really matter whether you're inside company headquarters in the United States, or youโre at a branch in Japan, for example. The goal is to deliver the same level of advanced security regardless of where you access from, who you are, or what you're trying to do.
How to cast the net
To provide that kind of employee experience, security and IAM must become more context-sensitive. Contextual information enables you to design highly customized access to corporate resources and helps you defend against intrusions.
Letโs say an employeeโs personal identity โ weโll call the employee Alex โ is stolen through a phishing scam. Armed with that data, a bad actor might try to access confidential documents or manipulate servers.
By merging contextual security with the network infrastructure, we can leverage identities, locations, and activities dynamically to allow or disallow access. Essentially, the network can say "Alex typically logs on at 9:00 a.m., and accesses three different document shares. Today, he's logging in at a different time, he's trying to access different resources, and he's trying to do things that he's never done before. Plus, heโs logged in from a place thatโs 300 miles away from his usual location, and this is the first time he's done that." Those are major red flags. A decision-making algorithm kicks in and โ based on the companyโs specific policies and use cases โ denies access. That action has now shut down a crime that might have been committed under Alexโs name, even though Alex knew nothing about it.
Secure, pervasive access is a must-have for the next generation workplace, and itโs the foundation for an equally important goal: creating an environment that enables activity-based work anywhere, anytime, from any device. Iโll explain how companies can achieve that in my next blog.
In the meantime, learn more about HPE Pointnext Mobility and Workplace Services here.
Find us in Vegas!
See how Aruba and HPE Pointnext are helping customers create the modern workplace of the future, come visit us at Aruba Atmosphere, Vegas March 25-30 in the Innovation Zone.
Related Articles:
- 5 Steps to Better Identity and Access Management for Hybrid IT by security expert Jan DeClercq. Great tips for making sure IAM systems don't become a speedbump on your journey to hybrid agility.
- How to build a more effective workplace by experts Kitty Chow and Jordan Whitmarsh. Article focuses on digitizing the workplace, better work through design and introduces five basic steps of workplace transformation.
- 3 Benefits of Unleashing the Power of Intelligent Spaces by Jordan Whitmarsh. Blog takes a closer look at the magic available when digital and physical meet.
- How to Build a Modern, Secure Workplace using HPE & Microsoft 365 Technology by Expert Thomas Strasser. Thomas discusses some of the main strategies and technologies for responding to a modern companyโs needs. (Think data security & accessibility!)
Featured articles:
- How to build a more effective workplace
- 5 things the CIO needs to know about workplace diversity
- Would the 'right to disconnect' help workers in The City That Doesnโt Sleep?
- Want to know the future of technology? Sign up for weekly insights and resources
- Back to Blog
- Newer Article
- Older Article
- Deeko on: The right framework means less guesswork: Why the ...
- MelissaEstesEDU on: Propel your organization into the future with all ...
- Samanath North on: How does Extended Reality (XR) outperform traditio...
- Sarah_Lennox on: Streamline cybersecurity with a best practices fra...
- Jams_C_Servers on: Unlocking the power of edge computing with HPE Gre...
- Sarah_Lennox on: Donโt know how to tackle sustainable IT? Start wit...
- VishBizOps on: Transform your business with cloud migration made ...
- Secure Access IT on: Protect your workloads with a platform agnostic wo...
- LoraAladjem on: A force for good: generative AI is creating new op...
- DrewWestra on: Achieve your digital ambitions with HPE Services: ...