Business Continuity Management / Disaster Recovery , Cloud Security , COVID-19

Securing the Work-From-Home Workforce

Sudip Banerjee of Zscaler Says Cloud Security Is an Alternative to VPNs
Sudip Banerjee, director of Transformation Strategy in Asia-Pacific, Zscaler

The COVID-19 pandemic has introduced new risks for enterprises as employees access corporate networks and applications from home.

See Also: OnDemand | The State of Security 2021

It has forced enterprises to adapt in order to maintain security but also ensure employees can continue to work. While some cloud-focused companies were prepared to make the quick transition, others have not fared so well, says Sudip Banerjee, director of Transformation Strategy in Asia-Pacific with Zscaler.

Banerjee says some companies have relied on VPN gateways for remote employees to log onto the company network. But scaling up VPN infrastructure to accommodate a huge increase in users is very difficult, he says.

Other organizations have moved cloud security solutions, which sits in between users and software-as-service applications such as Office365 or internal applications. Those companies are able to broker those connections safely, he says.

In this video interview in advance of a virtual roundtable, Banerjee discusses:

  • How companies have adapted their models for accessing apps;
  • What types of threats enterprises are facing;
  • How enterprises can reduce risks around remote workers.

Sudip Banerjee is director of Transformation Strategy in Asia-Pacific with Zscaler. Before joining Zscaler, Banerjee worked as group CTO for Reliance Capital.

To learn more about the event, please visit the registration page.


About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.