What security measures should businesses prioritize to support secure remote work?
With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?
In our company, we use only company devices for workers at home and VPN appropriate clients to control the internet flows towards our company firewall.
A behavioral endpoint product is recommended. This product is likely to cooperate with your corporate signature-based antivirus.
Any good product could be used in that way. We chose well known Israel products, combined with our standard US products, at that time.
Community Manager at a tech services company with 51-200 employees
Real User
Oct 6, 2020
@Philippe Panardie Thanks for your input! I agree that there isn't one answer. Do you have recommendations of specific solutions that companies should consider?
Security is a multi-layered problem and as always the human end is the weak layer
Increasingly I believe the human layer-layer8 needs more attention. This requires getting the basics right. How are we allowing external devices into our networks? DO we own these devices? VPN Tunnels?
Or are creating a virtual working place and focus on IAM?
This is BYOD on steroids and multiplies the attack zone. A line has to be drawn and a Trust Zone created. Traditional devices have native encryption so we allow them as trusted devices and use their native encryption. Then other policies are made. Does the employee have access to good internet(In Africa this is an issue) or do they have to go to a coffee shop or some such place? A good behavioral endpoint product will help. In some cases a company intranet. Microsoft teams are proving very accessible in Africa.
Find out what your peers are saying about Microsoft, Proofpoint, Check Point Software Technologies and others in Email Security. Updated: January 2026.
Firewalls serve as a crucial line of defense against cyber threats by monitoring and controlling incoming and outgoing network traffic.
Firewalls analyze network traffic based on pre-defined security rules to block unauthorized access, providing a barrier between trusted internal networks and untrusted external networks. They are essential for organizations seeking to protect their digital assets.
What are some critical features of Firewalls?
Intrusion Detection: Monitors...
There is not a single answer.
In our company, we use only company devices for workers at home and VPN appropriate clients to control the internet flows towards our company firewall.
A behavioral endpoint product is recommended. This product is likely to cooperate with your corporate signature-based antivirus.
Any good product could be used in that way. We chose well known Israel products, combined with our standard US products, at that time.
@Philippe Panardie Thanks for your input! I agree that there isn't one answer. Do you have recommendations of specific solutions that companies should consider?
Wearing a mask while accessing your service is not a joke hardening tunneling protocols and uses the most updated one it's kind of like wearing masks.
@Omer Mohammed great analogy!
Security is a multi-layered problem and as always the human end is the weak layer
Increasingly I believe the human layer-layer8 needs more attention. This requires getting the basics right. How are we allowing external devices into our networks? DO we own these devices? VPN Tunnels?
Or are creating a virtual working place and focus on IAM?
This is BYOD on steroids and multiplies the attack zone. A line has to be drawn and a Trust Zone created. Traditional devices have native encryption so we allow them as trusted devices and use their native encryption. Then other policies are made. Does the employee have access to good internet(In Africa this is an issue) or do they have to go to a coffee shop or some such place? A good behavioral endpoint product will help. In some cases a company intranet. Microsoft teams are proving very accessible in Africa.