Teleworking is here to stay. Employees, and more so candidates, see the ability to work from home an important factor to consider when selecting an employer. For many, it is more valued than basic salary. For an organization, it is important to embrace this shift in the work paradigm by maximizing its positive aspects but as well by minimizing it bad sides. The IT support group, in troubleshooting but as well in managing and monitoring this important work tool that computer became, plays a essential role in the employee's satisfaction at work.
Wouldn't it be a dream that problems are detected, analyzed and corrected even before the user take notice? Or, should the user calls for help, that an initial assessment is automatically performed even before the help expert starts working on the issue? All this, while your security tools check, test, or otherwise asses the compliance of the remote workstations. But for this to be possible, the computers must be accessible all the time from a myriad of tools, most of which were carefully selected for supporting computers located at the office. A permanent access method is thus necessary.
This permanent access must have the following attributes:
A typical, VPN based, continuously running tunnel would pose an unacceptable risk. More so if it is established by the remote device without the user having to login into the device. Login out of a compromised or hacked computer would not stop exposing central resources to a malicious software running in the computer. To eliminate all risks, the access transport mechanism shall:
When the above characteristics are met, a secure permanent access can be setup without increasing the cybersecurity risks.
The first solution that comes to mind is obviously using a VPN. Another alternative is desktop sharing tools, such as logMein. All these tools are great and play essential roles but do not meet the criteria that must be met to be used as a permanent access methodology.
Our solution sets up a permanent Websocket based transport connection, running over HTTPS. This connection runs between the remote workstation and an access gateway, which typically runs at the IT central site. No Internet based access gateway is used or necessary.
Central tools, including command line and remote desktop tools, natively use this transport connection. The data is simply carried between these tools and the remote devices without the risks associated with a traditional networking solution, such as a VPN. Software running at the remote device can not initiate communication toward anything using this transport mechanism.