{"id":7893,"date":"2020-09-15T00:00:00","date_gmt":"2020-09-15T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2020\/09\/15\/securing-remote-workforce-is-top-security-priority-gartner-2\/"},"modified":"2021-12-20T18:52:50","modified_gmt":"2021-12-20T18:52:50","slug":"remote-workforce-security","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/","title":{"rendered":"Remote Work Security: Priorities &amp; Projects"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<p>Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. <a href=\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\">Privileged access management (PAM)<\/a> topped the list in <a href=\"https:\/\/www.esecurityplanet.com\/networks\/-security\/security-projects-cisos-should-consider-gartner.html\">2018<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/-security\/gartner-top-it-security-projects-2019.html\">2019<\/a>. This year, after the COVID-19 pandemic forced nearly half of workers to telecommute, Gartner&#8217;s focus has now turned to securing the <a href=\"https:\/\/elearningindustry.com\/corporate-training-lms-remote-employee-onboarding\" target=\"_blank\" rel=\"noopener noreferrer\">remote workforce<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>As if to underscore the point, Gartner analyst Brian Reed unveiled the list of top security projects for 2020-2021 at Gartner&#8217;s Security &amp; Risk Management Summit &#8211; held virtually this week a few months after the annual in-person event was canceled because of the pandemic.<\/p>\n<p>Remote workforce security, Reed told attendees, &#8220;is the single greatest existential imperative for all organizations in the wake of COVID-19.&#8221;<\/p>\n<p>He later added, &#8220;If you can only do one project, focusing on securing your remote workforce and going back and looking at some of those changes we might have made earlier in the year would be a really good use of time.&#8221;<\/p>\n<p>Among the issues security teams should examine are whether they&#8217;re granting too much access or not enough. One sign of the latter might be users bypassing security to get their jobs done.<\/p>\n<p>Other remote security considerations include job function, device type, the kind of application and data being accessed, whether in the cloud or on-premises, and the user&#8217;s location. That last consideration should also include an assessment of the company&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">compliance<\/a> with local labor and privacy laws.<\/p>\n<p>The challenge with remote workforce security, Reed said, is to craft a <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero-trust strategy<\/a> that enables business while securing remote workers &#8211; and that means making sure that both managed and unmanaged devices can securely access applications.<\/p>\n<p>He listed 14 vendors that can potentially help: Akamai; Cato; Cloudflare; Cisco; Cyxtera; Google Cloud; InstaSafe; Meta Networks; Microsoft; Okta; Pulse Secure; Perimeter 81; and Zscaler.<\/p>\n<h2>COVID-19 creates new security threats<\/h2>\n<p>The rapid move to telework has revealed security weaknesses in remote desktop protocol (RDP), <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">VPN<\/a> and <a href=\"https:\/\/www.ringcentral.co.uk\/gb\/en\/blog\/video-conferencing-software\/\" target=\"_blank\" rel=\"noopener\">videoconferencing solutions<\/a> and forced security teams to develop new protocols for remote endpoint management and <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patching<\/a>, said Gartner senior research director Jonathan Care.<\/p>\n<p>Before the pandemic, security was designed around the notion that remote work was the exception, so when COVID-19 led to a dramatic surge in <a href=\"https:\/\/traqq.com\/blog\/telecommuting-what-is-it-and-how-to-get-started\/\">telecommuting<\/a>, always-on VPNs and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/\">BYOD<\/a> suddenly became urgent issues.<\/p>\n<p>Rising threats because of the pandemic include coronavirus-related <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-security\/\">business email compromise (BEC)<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/#phishing\">phishing<\/a> scams, including SMS phishing (\u201csmishing\u201d) and credential theft attacks, he said. Nation-state actors have launched <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">advanced persistent threats (APT)<\/a> against healthcare and essential services by using scan and exploit techniques and password spraying to take advantage of unpatched vulnerabilities.<\/p>\n<h2>Remote access security technologies<\/h2>\n<p>Gartner analyst Rob Smith will also discuss remote access security in a Sept. 16 presentation at the conference.<\/p>\n<p>Smith says enterprises should avoid using always-on VPN unless they have to. He recommends three technologies for remote workforce security:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/casb-security-vendors\/\">CASB<\/a> for SaaS applications, which can help both security and performance<\/li>\n<li>A zero-trust network architecture (ZTNA) that includes strong <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity<\/a> and authentication controls and the ability to <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">control access<\/a> based on device<\/li>\n<li>Virtual desktop infrastructure (VDI) for untrusted devices or users<\/li>\n<\/ul>\n<p>He cautions that some information gathered via <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\">mobile device management (MDM)<\/a>, such as GPS data and installed apps, could violate privacy laws.<\/p>\n<p>Any solution has to be scalable and be able to prioritize critical users, he said.<\/p>\n<h2>Top security projects and spending priorities<\/h2>\n<p>Last year&#8217;s list of top security projects included five holdovers from 2018, but Reed&#8217;s 2020-2021 list is largely new, with only two carryovers from 2019: Risk-based <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerability management<\/a> and cloud security posture management.<\/p>\n<p>Besides security for work at home employees, the other new security projects recommended by Reed include:<\/p>\n<ul>\n<li>Platform approach to <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">detection and response<\/a> &#8211; a comprehensive approach spanning endpoints, the cloud and networks, similar to the XDR approaches of Palo Alto Networks and others<\/li>\n<li>Simplified cloud access controls<\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-set-up-and-implement-dmarc-email-security\/\">DMARC<\/a> email security<\/li>\n<li>Passwordless authentication<\/li>\n<li>Data classification and protection<\/li>\n<li>Workforce competencies assessment<\/li>\n<li>Automating security risk assessments, a market led by CyberSaint, Emergynt, InnoSec, Lucideus and others<\/li>\n<\/ul>\n<p>Before tackling those top projects, Reed said enterprises should get the basics right &#8211; itself no short list:<\/p>\n<ul>\n<li>Endpoint and server protection<\/li>\n<li>IAM and administrative controls<\/li>\n<li>Log monitoring<\/li>\n<li>Backup\/restore<\/li>\n<li>Patch and vulnerability management<\/li>\n<li>Perimeter security controls<\/li>\n<li>Email security controls<\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\">End user training<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\">Sensitive data handling<\/a> controls<\/li>\n<li>Risk assessments<\/li>\n<\/ul>\n<p>Just as interesting as the top projects list was the projects Gartner analysts considered that didn&#8217;t make the list:<\/p>\n<ul>\n<li>Employee monitoring and surveillance technologies<\/li>\n<li>Threat attribution services<\/li>\n<li>Automated threat hunting<\/li>\n<li>Cyber-range and cyber-simulation systems<\/li>\n<li>Chatbot-based security awareness and education<\/li>\n<li>Biometric credential detection\/protection<\/li>\n<li>Quantum everything<\/li>\n<li>Secure access service edge (SASE)<\/li>\n<li>Cyber-physical security \u2014 drone detection, temperature detection<\/li>\n<\/ul>\n<p>Reed also noted that IT security spending priorities (chart below) have likely changed from Gartner&#8217;s long-term forecast issued last year, which predicted that CASB, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encryption<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a>, access management, <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">SIEM<\/a>, tokenization, vulnerability assessment, secure email gateways, DLP and <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-web-application-firewall-waf-vendors\/\">WAF<\/a> would post the top growth rates in the security market through 2023.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/securing-remote-workforce-is-top-security-priority-gartner_5fad0c1cd1d70.png\" alt=\"Gartner security spending\" width=\"800\" height=\"434\" \/><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6d2a431a6e-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d2a431a6e\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d2a431a6e\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d2a431a6e\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d2a431a6e\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d2a431a6e\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d2a431a6e\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list in 2018 and 2019. This year, after the COVID-19 pandemic forced nearly half of workers to telecommute, Gartner&#8217;s focus has now turned to securing the remote workforce. As if to underscore [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":192,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[21,19,16],"tags":[31716],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[378,375,379,393],"class_list":["post-7893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-endpoint","category-trends","tag-remote-workforce-security","b2b_audience-awareness-and-consideration","b2b_product-endpoint-security","b2b_product-security-management","b2b_product-threats-and-vulnerabilities","b2b_product-virtual-private-network-vpn"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Remote Work Security | Top Priorities &amp; Projects for 2022<\/title>\n<meta name=\"description\" content=\"Securing the Remote Workforce is listed as Gartner&#039;s top priority. Explore the top Security Projects for 2021.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Work Security | Top Priorities &amp; Projects for 2022\" \/>\n<meta property=\"og:description\" content=\"Securing the Remote Workforce is listed as Gartner&#039;s top priority. Explore the top Security Projects for 2021.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-15T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-20T18:52:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"601\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Remote Work Security: Priorities &amp; Projects\",\"datePublished\":\"2020-09-15T00:00:00+00:00\",\"dateModified\":\"2021-12-20T18:52:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\"},\"wordCount\":822,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png\",\"keywords\":[\"remote workforce security\"],\"articleSection\":[\"Cloud\",\"Endpoint\",\"Trends\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\",\"name\":\"Remote Work Security | Top Priorities & Projects for 2022\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png\",\"datePublished\":\"2020-09-15T00:00:00+00:00\",\"dateModified\":\"2021-12-20T18:52:50+00:00\",\"description\":\"Securing the Remote Workforce is listed as Gartner's top priority. Explore the top Security Projects for 2021.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png\",\"width\":601,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Work Security: Priorities &amp; Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote Work Security | Top Priorities & Projects for 2022","description":"Securing the Remote Workforce is listed as Gartner's top priority. Explore the top Security Projects for 2021.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/","og_locale":"en_US","og_type":"article","og_title":"Remote Work Security | Top Priorities & Projects for 2022","og_description":"Securing the Remote Workforce is listed as Gartner's top priority. Explore the top Security Projects for 2021.","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/","og_site_name":"eSecurity Planet","article_published_time":"2020-09-15T00:00:00+00:00","article_modified_time":"2021-12-20T18:52:50+00:00","og_image":[{"width":601,"height":400,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png","type":"image\/png"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Remote Work Security: Priorities &amp; Projects","datePublished":"2020-09-15T00:00:00+00:00","dateModified":"2021-12-20T18:52:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/"},"wordCount":822,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png","keywords":["remote workforce security"],"articleSection":["Cloud","Endpoint","Trends"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/","name":"Remote Work Security | Top Priorities & Projects for 2022","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png","datePublished":"2020-09-15T00:00:00+00:00","dateModified":"2021-12-20T18:52:50+00:00","description":"Securing the Remote Workforce is listed as Gartner's top priority. Explore the top Security Projects for 2021.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-02.png","width":601,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Remote Work Security: Priorities &amp; Projects"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7893"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7893"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/192"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7893"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7893"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7893"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}