Security Assessment for Remote Workforce data sheet

Data sheet
SERVICE OVERVIEW
The COVID-19 pandemic has driven business leaders to transform operating models and adapt business operations to continue to
deliver value and meet Customer expectations. The rapid adoption of new enterprise and consumer-grade technologies, combined with
the continued and exponential growth in use of cloud services and explosion of connectivity, enables enterprises to continue operations
even with a stay-at-home workforce. This rapid change, however, puts significant pressure on the security posture of the enterprise and
significantly increases its risk exposure.
Business and security operations face increased challenges resulting from remote workforce, including:
Remote access challenges leading to relaxation of security controls to meet demand
Limited to no supply of approved devices forcing the adoption of BYOD
Insuicient mobile device management capabilities to enforce policy compliance
Adoption of unapproved and insecure collaboration tools by employees
Storage of sensitive organizational data on untrusted devices
Co-mingling of corporate and personal computing resources on remote devices
Increased exposure to COVID-19 phishing attempts
Some of these security risks are not new but have been exacerbated by the pressure to adopt cost-eective and minimally tested solutions
to sustain business operations. Security programs and risk management practices need to be updated to support the shift to work from
home and the rapid adoption of new tools and technologies. Some of the key questions that need to be addressed include:
Does the business have visibility into and understand the risks resulting from the shift to work from home?
What policies, procedures, and technology changes are needed to support business objectives?
How does the business prioritize and manage the identified risks eectively?
Does the business understand the risks they are accepting?
The HPE Security Assessment for Remote Workforce service helps organizations take an objective look at their organization’s security and
continuity of operations resources and practices. The service combines the P5 model—people, policies, processes, products, and proof—and
the Center for Internet Security (CIS) Top 20 Critical Controls to evaluate certain control properties to help assess security-related controls of
the organization operating with a remote workforce.
HPE SECURITY ASSESSMENT FOR
REMOTE WORKFORCE
Check if the document is available
in the language of your choice.

Summary of content (3 pages)