Find the right approach to browser security
Most Searched
Traditional security approaches are flawed, costly, and overwhelming for security teams. Menlo Security is different. It’s the simplest, most definitive way to secure work—making online threats irrelevant to your users and your business.
Video
Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over.
eBook
Traditional network security wasn’t built to address today’s complex enterprise environments. SASE fixes that problem.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.
Buyer's Guide
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise.
Share this article
Press Release
Three-quarters rely on traditional VPNs for remote access while a third also use Zero Trust as part of their remote access strategy; Over half plan to reduce third party/contractor access to systems due to security risks
Mountain View, California—October 13, 2021 – A report launched today by Menlo Security, a leader in cloud security, highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report—which surveyed 500+ IT decision makers in the U.S. and the U.K., including a third at C-level – looks at attitudes to securing remote access to applications and resources and the adoption of Zero Trust solutions.
While most respondents (83%) say they are confident in their strategy for controlling access to applications for remote users, three-quarters are re-evaluating theirs in the wake of new ways of working and the growth in cloud application use. While half of employees are currently working remotely or adopting a hybrid approach, around two-fifths (42%) are expected to continue in 12 months’ time.
According to the findings, three-quarters (75%) of organizations continue to rely on VPNs (virtual private network) for controlling remote access to applications, which rises to 81% for organizations of 10,000+ employees. For around a third (36%) of organizations a Zero Trust approach also forms part of their remote access strategy.
“Most businesses claim they are confident in their remote access security yet are still relying on VPNs—an inherently insecure way of doing things because they give access to everything on a network,” said Mark Guntrip, senior director, cybersecurity strategy at Menlo Security. “Implementing Zero Trust network access provides users with access to only those applications and resources needed to do their job. Adopting this approach across everything changes your whole security mindset.”
The top reason for implementing a Zero Trust solution is improved security, according to 60% of respondents, regardless of whether they are using it or not. One third (32%) point to ease of use, while speed of access and scalability are both more widely recognized among those already adopting a Zero Trust approach. Significantly, 40% of respondents believe that implementing a Zero Trust solution places less pressure on IT.
Despite overall confidence by global IT decision makers in the robustness of their strategy for controlling application access for remote users, Menlo Security’s research also shows that:
Menlo’s Mark Guntrip adds: “As the internet becomes the new corporate network, controlling user access to private applications has become more important than ever. Organizations need to evolve their thinking from providing connectivity to the entire network to segmenting access by each individual application. The right Zero Trust approach will ensure seamless access between users and the applications they are authorized to use, while all other applications are invisible, preventing lateral discovery across the network.”
For more information on this report, please visit.
Menlo Security has a clientless-first approach to implementing Zero Trust Network Access, enabling organizations to secure access to applications from all devices – including managed, unmanaged, and mobile devices. This approach minimizes the workload on IT and security for deployment, while maximizing the security posture of the company. The clientless-first approach can be augmented with a client for use cases that specifically require client-based access.
Unlike many ZTNA solutions that cannot monitor traffic being sent and received between an end user and a controlled application, Menlo Private Access ensures that security policy is always enforced by remaining inline between the end user and protected applications; utilizing our Elastic Isolation Core as a control point to prevent sensitive data loss and stop potential malware from reaching the endpoint.
Survey Methodology
The survey was conducted among 545 IT decision makers from organizations with 1,000 or more employees across the U.S. (265) and U.K. (280). One third of respondents (31%) were C-level and the top three industry sectors were Manufacturing (15 percent), Banking & Finance (14%) and Healthcare (14%). Sapio Research conducted interviews online during August and September 2021 using an email invitation and an online survey.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security’s isolation-powered cloud security platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end user-experience. Menlo Security is trusted by major global businesses, including Fortune 500 companies and eight of the ten largest global financial services institutions, and is backed by Vista Equity Partners, Neuberger Berman, General Catalyst, American Express Ventures, Ericsson Ventures, HSBC, and JP Morgan Chase. Menlo Security is headquartered in Mountain View, California. For more information, please visit www.menlosecurity.com.
U.S.Samantha SmoakPAN Communications[email protected]
U.K.Paula Averley or Louise BurkeOrigin Communications[email protected]
To talk to a Menlo Security expert, please complete the form.