Source |
Checkpoint |
Identifiant |
2088708 |
Date de publication |
2020-12-10 11:00:55 (vue: 2020-12-10 11:12:30) |
Titre |
Aligning Secure Remote Access to NIST Guidelines |
Texte |
With 80% of security professionals scaling up their remote access infrastructure, per Check Point research, certain controls should be applied to ensure that security is not compromised. Below are key guidelines recommended by the National Institute of Standards and Technology (NIST) in supporting standard users, privileged administrators, BYOD and third parties. Plan remote work-related security…
|
Envoyé |
Oui |
Condensat |
access administrators aligning appeared applied are below byod certain check compromised controls ensure first guidelines infrastructure institute key national nist not parties per plan point post privileged professionals recommended related remote research scaling secure security security… should software standard standards supporting technology third users work |
Tags |
|
Stories |
|
Notes |
|
Move |
|