Field adjusters, sales staff and agents, traveling executives. The number of road warriors and home officers demanding access to corporate data and applications continues to increase at many companies. Yet insurers actually are ahead of the curve in providing that access, according to Chris Kozup, analyst at META Group. We find insurance more advanced than other industries, he says.

Providing remote access is one thing; securing it is quite another. Security is only as good as the weakest link, says Randall Palm, director of IT at the Computing Technology Industry Association (CompTIA). And typically, the weakest link in remote access is not the security technology itself. Rather, it is the difficulty in controlling the hundreds or thousands of endpoints (the various devices by which users access corporate networks and information) IT departments could manage more easily if those devices always were behind the firewall.

Securing the Endpoint

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.