ConnX AI-Secure – Collaboration Security – The 3 M Advantage

17
June, 2022
Author: Joyjit Ghosh
As team collaboration evolves from simple chat into a digital workplace hub – integrating chat, calling, video conferencing, documents, and application data — organizations are struggling to protect information contained within these environments. The reality is collaboration security chaos already plagues far too many organizations.

Aggressive penetration of workstream collaboration platforms in the enterprise has shifted over 50% of team communications to these collaboration platforms. Yet nearly 33% of all organizations still lack the capability to prevent or deter an insider incident or attack related to workstream collaboration applications. As insider accidents and inadvertent data breaches increasingly become the norm, investing in strong collaboration security has never been more vital. Mitigating risk in the workstream collaboration space covers a large surface area because it goes beyond traditional file and email data loss prevention (DLP) to include newer data types like chat streams, comments, meeting transcripts, etc.

Addressing collaboration security isn’t just another information security checkbox: apply too lax of a policy, and your business data will be at risk, but if too strict of policy is used, your business data will be driven into shadow IT solutions. The end goal of collaboration security is the art of achieving the right balance of usability and security, a balance that varies from company to company.

Why Collaboration Security is Unique

Preparing a framework and strategy is just the beginning. Collaboration and communication platforms pose constant risks that need to be monitored, measured, and managed efficiently. While it’s possible to apply a manual solution to this problem (e.g., address exposures through human intervention),  such an approach is not sustainable or scalable.  Approaching collaboration security effectively and efficiently requires intelligent software not only to manage problems as they occur but also to mitigate risk before an incident ever happens.

THE THREE M’S OF COLLABORATION SECURITY

The traditional model of controlling user and application policies, as well as permissions, have been found to be too cumbersome or over-reaching in the modern digital workplace. The normal IT top-down governance approach can sometimes cause users to shift to some level of shadow IT solution as a workaround.

One new InfoSec approach being advocated encourages enterprises to be much more forgiving regarding how they allow user behavior to initially dictate policy, and to then subsequently manage and remediate collaboration issues after the fact.

This is what ConnX AI-SECURE calls the Three M approach (Monitor, Measure, and then finally Manage) to collaboration security, which introduces a much more cooperative process for creating and implementing collaboration security policies. The model is a “trust but verify” approach used to monitor and measure behavior, first watch how users are using the WSC platform, and then decide if the usage pattern fits comfortably within the InfoSec framework for the organization.

Certainly, there will always be a minimum level of common-sense policies that get put in place from Day 1 to protect the organization.  However, for grey areas which quite often arise with new technologies (such as workstream collaboration), this Three M approach is proving to be effective in applying gentle manipulations to steer and coax employees toward a set of IT decisions and policies, rather than pushing users towards the adoption of unapproved platforms and applications.

Monitor: Rather than just quickly jump to a fix, IT first uses software tools to observe what is occurring in the multi- platform collaboration environment carefully.

Measure: Based on the analytics provided by the software tools, IT can compare the risk exposure profile that it sees with the pre-defined Workstream Collaboration policy. This then allows IT to measure and report on whether any corporate policies are being violated.

Manage: Both IT and end-users can jump into action to either remediate or to create a new policy if governance standards are being exceeded. In many cases, with proactive systems, either pre-defined workflows or AI workflows from software tools will be initiated well before any human touch or intervention is necessary.

CONCLUSION

As IT and security teams battle an influx of unsanctioned tech, the manual work required to effectively manage users while mitigating risk is becoming increasingly complex and time consuming. With the traditional security perimeter growing increasingly porous, threats are no longer purely external — 91% of organizations feel vulnerable to insider threats.

Collaboration security is not just important — it’s paramount.  To properly embrace collaboration security, IT and security teams should look to collaboration security tools that make it easier for users to take the right actions while streamlining the organization’s governance of workstream collaboration platforms as a whole.

Challenge at the Edge: The Importance of High Fidelity in Customer Service Environments

Challenge at the Edge: The Importance of High Fidelity in Customer Service Environments

There is a reason why the MSP industry continues to grow faster than nearly every other segment in technology and telecom – it is called the cloud. The Managed Service Providers that made the leap to the cloud early are growing at a rapid pace, replacing what used to be called “IT Outsourcing.” Small, medium, and large MSPs are in a great position to attract customers and serve them far better and for far less money and risk than the classic, traditional “outsourcers” that had the means to build massive, shared infrastructure.

ConnX Selected as Top Innovator in Cloud Collaboration

ConnX Selected as Top Innovator in Cloud Collaboration

ConnX, an innovative multiservice communication platform integrator and managed service provider, today announced it has been recognized by the organizers of Enterprise Connect, the leading conference and exhibition for enterprise communications and collaboration in North America. Enterprise Connect brings corporate IT decision makers together with the industry’s vendors, channel partners, analysts, and consultants to focus on the issues central to enterprise communications and collaboration.

ConnX and Nectar Partner To Bring Next-Level Quality of Experience Assurance to Enterprises With Extreme Intelligence at the Edge

ConnX and Nectar Partner To Bring Next-Level Quality of Experience Assurance to Enterprises With Extreme Intelligence at the Edge

ConnX, an innovative multiservice communication platform integrator and managed service provider, and Nectar Services Corp., the leader in delivering actionable insights for the cloud collaboration and contact center markets, today announced the availability of an advanced edge experience assurance solution, designed to ensure every voice and collaboration interaction is excellent on every endpoint and every step of the way.

Born in the Cloud, Built on AI: Juniper and ConnX Bring Next-Level Performance and User Experience to the Edge

Born in the Cloud, Built on AI: Juniper and ConnX Bring Next-Level Performance and User Experience to the Edge

The WAN edge is critical to supporting the best user experiences from client-to-cloud, a challenge that was fundamental to Juniper Networks’ acquisition of 128 Technology at the end of 2019. That transaction created what was arguably the most unique and innovative technology in the SD-WAN space since its inception, by bringing indispensable insight and control to Juniper and, more importantly, to the Managed Service Providers (MSPs) who are transforming mission-critical, distributed enterprise networks for their global customer bases.

Cybersecurity Must Be a Forethought for Retailers on the Road to Digital Transformation

Cybersecurity Must Be a Forethought for Retailers on the Road to Digital Transformation

Digital transformation has helped revolutionize industries through the introduction of innovative technology, but it certainly had its most profound impact on the retail sector. Digitalization sparked the rise of e-commerce, with the market currently valued at $3.3 trillion and predicted to reach $5.4 trillion by 2026. Furthermore, the vast array of devices and applications has allowed retailers to create new, immersive, and personalized customer experiences (CX), both for in-store and online shopping.