In a multi-office scenario, how can an enterprise ensure work efficiency and secure data circulation?

In order to meet the needs of digital transformation and improve office efficiency, many companies have innovated their working models and introduced more collaborative office tools into their work processes. However, this also expands the external security exposure of the enterprise intranet. Enterprises urgently need to further strengthen the network security construction of the underlying infrastructure to prevent threats such as ransomware, phishing, and intrusion.

On May 25th, Tencent Security focused on office security problems in the period of enterprise digital transformation, and jointly organized "How to cost-effectively implement one-stop enterprise computer security management and control?" "Theme open class, invited Wu Yong, research director of TE Consulting and Industry Research Division, Liu Xianlei, senior product manager of Tencent Security Zero Trust, Dong Jialiang, security pre-sales expert of Gongxun Technology, and Miao Wenbo, senior architect of Tencent conference pre-sales, to discuss how to optimize Enterprise security architecture, improving security defense capabilities, and achieving a balance between security and business development provide new ideas and references for companies to achieve office security.

Under the trend of digital office, security is the foundation of innovation

Wu Yong, research director of TE Consulting and Industry Research Division, gave an in-depth interpretation of the industry trend of "AIGC+office", analyzed the security pain points in the collaborative office scenario of smart tools, and proposed industry solutions.

1. The introduction of digital technology makes the office present the trend of online, automation, intelligence and collaboration

With the development and innovation of software and hardware technology, digital office has become a major trend in the industry. More and more companies have upgraded digital office, and there are five major trends: the rapid evolution of hybrid office to borderless office; going overseas has become a huge opportunity; Create and promote the rapid industrialization of digital office; AIGC floods into digital office scenarios; AIOT security integration.

While smart office improves work efficiency, it also brings potential network security risks to enterprises. The multi-modal office mode attracts the attention of black industry, and problems such as virus threats and data leakage emerge in endlessly. Enterprises urgently need to think about security issues in information interaction, office collaboration, information resource collection and management, and how to solve these problems.

2. The way to break the digital office security: establish a unified security platform and transparent management

In response to the problems of collaborative office operations, corporate knowledge management, and information security mechanisms encountered in the intelligent office of enterprises, enterprises should establish an information protection strategy based on overall security, simplify the process of data security management, shorten the time for response and disposal, and realize The balance between "efficiency" and "safety". This strategy revolves around three "builds":

One is to build a unified platform based on security and policies;

The second is to build a unified business and data development platform based on the security and policy platform;

The third is to build a unified collaborative workbench on the basis of a secure and unified development platform, so as to realize the integration of security, business, and AIOT, and fully improve the application experience and collaboration efficiency.

There is a contradiction between overall office efficiency and security, and enterprises need to upgrade their security structures

Liu Xianlei, senior product manager of Tencent Security Zero Trust, focused on various office scenarios faced by enterprises during the digital transformation period, combined with Tencent's internal office security implementation practice, shared office model changes, technological innovations, and program output.

1. There is a problem in improving the office experience in enterprise IT, and Tencent’s internal practice of zero trust has been implemented first.

In order to solve the security and efficiency problems of remote office, Tencent launched the NGN (next generation network) project in 2017 to reconstruct the original office security terminal iOA with the concept of zero trust. "full-size" online office for employees.

After Tencent completed the migration of the zero-trust architecture of the office scene internally, Tencent integrated and exported the best practices, and precipitated a more versatile zero-trust security office product architecture, which can provide four major capabilities for enterprises:

In terms of trusted access, it provides services such as business stealth, authority management, dynamic access control, and global acceleration to help enterprises connect people and businesses in any location more efficiently, securely, and stably;

In terms of security management, provide customers with more refined and effective office security threat prevention capabilities, including asset management, vulnerability management, and asset compliance baselines;

In terms of threat protection, it can focus on pain point events/scenarios to create simpler and more effective threat protection capabilities, such as anti-virus, vulnerability defense, popular threat protection, etc.;

In terms of risk control, iOA is equipped with more comprehensive and easy-to-use threat traceability and risk control capabilities such as advanced threat detection, event investigation and traceability, which facilitates enterprises to trace and retain evidence afterwards and improve their own security strategies.

2. Integrate and output the best practice of zero trust, and create a SaaS version of iOA with one-click deployment

Tencent Security is based on Tencent's own digital transformation practice, combined with iOA's practical experience in landing millions of terminals, and provides a safe, convenient, and efficient next-generation zero-trust security office suite in the cloud in the form of SaaS. A safe and convenient office environment anywhere, free from the shackles of IT infrastructure, helps enterprises to transform safely.

There are hidden dangers in enterprise terminal office work, which puts forward higher requirements for secure access

Dong Jialiang, a security pre-sales expert of Gongxun Technology , based on the challenges faced by enterprises in terminal security office, proposed an integrated security office solution to help enterprises implement a zero-trust architecture.

1. The enterprise terminal office is facing the test of multiple threats, new formats, strong supervision, and new scenarios

Under the digital transformation, the emergence of new business forms and multiple office scenarios has put forward higher requirements for enterprise security. Coupled with increasingly severe threats and stricter supervision, enterprise business and IT structures have changed. Facing challenges such as compliance control, network attack, access security and identity control, and terminal management.

2. Tencent Security iOA zero trust solution helps enterprises close-loop security protection before, during and after the event

When systems such as terminal security management and control, identity management, and business security access are in a fragmented state, enterprises urgently need an effective way to tightly integrate these capabilities and cooperate with each other to achieve greater security effectiveness, that is, an integrated security solution.

Faced with the security, business, and management problems brought about by digital office, Tencent's iOA zero trust management system can provide terminal access management solutions based on identity security, link security, device security, access security, and application security, and deploy security capabilities. Help enterprises build a full-link trusted access architecture, and realize wide application in scenarios such as terminal management and control, terminal anti-virus, zero-trust office, and multi-cloud access.

The demand for collaborative office is prevalent, and the platform side must take good care of "information security"

Miao Wenbo, senior pre-sales architect of Tencent Conference , shared security-related content such as SSO login and content encryption based on years of industry practice and insights.

1. Tencent Conference builds an office security system to achieve safety and efficiency with both hands

Based on the needs of enterprises for multiple office models and office security, Tencent Conference has established five parts of security protection including external compliance management, internal basic protection, business security system, intelligence monitoring system and emergency response mechanism, and will integrate Tencent in the security field. The practical research is integrated into its own product system to ensure the stability, smoothness and safety of users' office work.

In terms of external compliance, Tencent Conference has daily security records and exchanges with the Ministry of Public Security and the Cyberspace Administration of China, and continues to conduct in-depth research on office security, participating in the formulation of relevant white papers and standards;

In terms of basic security, Tencent Conference provides routine security inspection, security protection, security audit and other services;

In terms of business security, Tencent Conference has established a comprehensive management and control strategy based on identity authentication, application security, and data security, which can ensure the confidentiality and leakage prevention of sensitive information during user use;

In terms of intelligence monitoring, Tencent Conference has realized daily monitoring of black production security dynamics through external intelligence monitoring, TSRC vulnerability intelligence collection, and targeted component vulnerability intelligence collection;

In terms of emergency response, Tencent Conference supports 7*24 hours of emergency duty, specific node directional support, and event analysis. When a security incident occurs, it can trace the source and resume the disk as soon as possible.

2. SSO single sign-on, reducing costs and increasing efficiency for enterprise office management

SSO is a mainstream business integration solution that realizes single sign-on through the exchange of user identity information between multiple systems. Users only need to log in once to access multiple systems without having to memorize multiple passwords. Tencent Conference uses the SSO method of docking with the corporate address book for login, allowing customers to log in to multiple products through a unified corporate account, reducing corporate costs and improving employee work efficiency. Specifically, it has the following four advantages:

First, it supports unified management of user rights and user accounts are managed locally by the enterprise to ensure the security of enterprise user identity login;

Second, support the unified operation and maintenance of enterprise accounts and post-meeting data analysis to help enterprise background managers simplify their work;

Third, it supports SSO login, supports convening meetings according to the organizational structure, and realizes rapid contact between people and organizations;

Third, it supports SSO login, supports convening meetings according to the organizational structure, and realizes rapid contact between people and organizations;

Fourth, it supports a variety of account protocols, supports corporate email and corporate domain name login, and supports third-party application activation, effectively improving the office experience.

Guess you like

Origin blog.csdn.net/qcloud_security/article/details/130952444