ConnX AI-Secure – Collaboration Security – The 3 M Advantage

17
June, 2022
Author: Joyjit Ghosh
As team collaboration evolves from simple chat into a digital workplace hub – integrating chat, calling, video conferencing, documents, and application data — organizations are struggling to protect information contained within these environments. The reality is collaboration security chaos already plagues far too many organizations.

Aggressive penetration of workstream collaboration platforms in the enterprise has shifted over 50% of team communications to these collaboration platforms. Yet nearly 33% of all organizations still lack the capability to prevent or deter an insider incident or attack related to workstream collaboration applications. As insider accidents and inadvertent data breaches increasingly become the norm, investing in strong collaboration security has never been more vital. Mitigating risk in the workstream collaboration space covers a large surface area because it goes beyond traditional file and email data loss prevention (DLP) to include newer data types like chat streams, comments, meeting transcripts, etc.

Addressing collaboration security isn’t just another information security checkbox: apply too lax of a policy, and your business data will be at risk, but if too strict of policy is used, your business data will be driven into shadow IT solutions. The end goal of collaboration security is the art of achieving the right balance of usability and security, a balance that varies from company to company.

Why Collaboration Security is Unique

Preparing a framework and strategy is just the beginning. Collaboration and communication platforms pose constant risks that need to be monitored, measured, and managed efficiently. While it’s possible to apply a manual solution to this problem (e.g., address exposures through human intervention),  such an approach is not sustainable or scalable.  Approaching collaboration security effectively and efficiently requires intelligent software not only to manage problems as they occur but also to mitigate risk before an incident ever happens.

THE THREE M’S OF COLLABORATION SECURITY

The traditional model of controlling user and application policies, as well as permissions, have been found to be too cumbersome or over-reaching in the modern digital workplace. The normal IT top-down governance approach can sometimes cause users to shift to some level of shadow IT solution as a workaround.

One new InfoSec approach being advocated encourages enterprises to be much more forgiving regarding how they allow user behavior to initially dictate policy, and to then subsequently manage and remediate collaboration issues after the fact.

This is what ConnX AI-SECURE calls the Three M approach (Monitor, Measure, and then finally Manage) to collaboration security, which introduces a much more cooperative process for creating and implementing collaboration security policies. The model is a “trust but verify” approach used to monitor and measure behavior, first watch how users are using the WSC platform, and then decide if the usage pattern fits comfortably within the InfoSec framework for the organization.

Certainly, there will always be a minimum level of common-sense policies that get put in place from Day 1 to protect the organization.  However, for grey areas which quite often arise with new technologies (such as workstream collaboration), this Three M approach is proving to be effective in applying gentle manipulations to steer and coax employees toward a set of IT decisions and policies, rather than pushing users towards the adoption of unapproved platforms and applications.

Monitor: Rather than just quickly jump to a fix, IT first uses software tools to observe what is occurring in the multi- platform collaboration environment carefully.

Measure: Based on the analytics provided by the software tools, IT can compare the risk exposure profile that it sees with the pre-defined Workstream Collaboration policy. This then allows IT to measure and report on whether any corporate policies are being violated.

Manage: Both IT and end-users can jump into action to either remediate or to create a new policy if governance standards are being exceeded. In many cases, with proactive systems, either pre-defined workflows or AI workflows from software tools will be initiated well before any human touch or intervention is necessary.

CONCLUSION

As IT and security teams battle an influx of unsanctioned tech, the manual work required to effectively manage users while mitigating risk is becoming increasingly complex and time consuming. With the traditional security perimeter growing increasingly porous, threats are no longer purely external — 91% of organizations feel vulnerable to insider threats.

Collaboration security is not just important — it’s paramount.  To properly embrace collaboration security, IT and security teams should look to collaboration security tools that make it easier for users to take the right actions while streamlining the organization’s governance of workstream collaboration platforms as a whole.

When Edge-to-Edge Quality Matters, End-to-End Network Observability is Mission Critical

When Edge-to-Edge Quality Matters, End-to-End Network Observability is Mission Critical

You cannot manage what you cannot measure. It’s a phrase that is especially true when it comes to enterprise networking. The ability to understand what is happening at the edge of the network, down to the device and application level, with great granularity and confidence, is no longer a nice-to-have, but a must-have. That’s especially true with the growing popularity of WFH workforce models.

Clean Energy Industry Counts on Connectivity with AI at the Edge to Get to Net-Zero

Clean Energy Industry Counts on Connectivity with AI at the Edge to Get to Net-Zero

Driven by the urgent need to address climate change, the adoption of the UN’s Sustainable Development Goals (SDGs), and the rapid rise of Environmental, Environmental Social and Governance (ESG) standards for measurement, companies in the clean energy industry are some of the most prominent players in the sustainability world and are growing as they continue to replace fossil fuels, traditional nuclear reactors and other legacy sources of electricity.

The Key to Retail Multi-Cloud Management is AI in the Network, All the Way to the Edge

The Key to Retail Multi-Cloud Management is AI in the Network, All the Way to the Edge

The use of cloud technologies in the retail industry has never been more dynamic and promising. Very few enterprises today rely on a single cloud and instead choose cloud consumption based on the applications they are using and how their digitally transformed networks are designed. This is especially true for highly distributed retail companies with hundreds or thousands of physical locations and for those who are increasingly blending the online and in-store customer experience.

Mastering the Edge of Cloud Telco

Mastering the Edge of Cloud Telco

For employees working from home, whether customer-facing or internal, the only reliable and guaranteed media path has been a landline for decades. Phone and video calls over a home Internet link and average Wi-Fi network have been nearly impossible when it comes to a high-quality user experience. Why?