By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Global News TodayGlobal News TodayGlobal News Today
  • World
  • Politics
  • Business
  • Technology
  • Science
  • Entertainment
  • Sports
  • Health
Reading: Remote Work Broke Traditional Endpoint Security: Why Security Is Shifting from Protecting Devices to Protecting Data – Cybersecurity Insiders
Share
Notification Show More
Font ResizerAa
Global News TodayGlobal News Today
Font ResizerAa
  • World
  • Politics
  • Sports
  • Business
  • Science
  • Technology
  • Entertainment
  • Home
    • Home 1
    • Home 2
    • Home 3
    • Home 4
    • Home 5
  • Demos
  • Categories
    • Technology
    • Business
    • Sports
    • Entertainment
    • World
    • Politics
    • Science
    • Health
  • Bookmarks
  • More Foxiz
    • Sitemap
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technology

Remote Work Broke Traditional Endpoint Security: Why Security Is Shifting from Protecting Devices to Protecting Data – Cybersecurity Insiders

Editorial Staff
Last updated: March 26, 2026 7:40 am
Editorial Staff
6 days ago
Share
SHARE

Endpoint security used to revolve around the assumption that work only happens on corporate devices within corporate networks. 
This assumption meant that security architectures were built to protect endpoints. IT teams focused on sending locked-down, company-owned laptops and protecting network boundaries, since at the time, they were the entire security perimeter.
That model used to suffice. But work has changed.
Today, organizations are made up of distributed teams and contractors who often work remote or hybrid. A lot of these users work from their preferred (and often personal) devices, sometimes juggling work for multiple organizations on those devices. They access work systems from home offices, public spaces, and co-working spots – introducing a myriad of new network connections into the mix. 
These flexible workforces have created a new reality; one in which endpoints and networks are now variable.
What does this mean for IT and security teams? That endpoint-centric security controls no longer cut it.
The Limits of Legacy Endpoint Security
As workforces have shifted to include more hybrid workers and contractors, many organizations have tried to extend endpoint control through technologies like unified endpoint management (UEM), mobile device management (MDM), endpoint detection and response (EDR), and other device-based monitoring tools.
These controls are important, but they have limitations – especially when more and more work is happening on unmanaged devices.
Why? Well, asking fractional workers to put invasive management software on their personal devices can raise privacy concerns and create operational friction.
But buying and shipping company-owned laptops to these external collaborators has also become increasingly impractical. Global hiring and contractor-based work models make it complex and expensive to provision, ship, maintain and recover hardware.
And virtual desktops, which have historically been used to secure data on unmanaged laptops, are also falling short. VDI relies on remote hosting and virtualization, which leads to frustrating latency and poor performance, especially for workflows that involve video conferencing and calling. It also comes with complex back-end infrastructure, making it costly and difficult to scale.
As work continues to become more distributed and dynamic, these endpoint-centric models are becoming unfeasible.
Securing the Work, Not the Entire Device
Since controlling entire endpoints is no longer effective, organizations need to shift their focus to protecting the environment where work actually happens.
In modern workflows, sensitive data is created, accessed, and shared across a myriad of applications, collaboration platforms, development tools and other SaaS systems. To ensure company data security, controls need to move closer to those environments.
Instead of trying to implement entire device control, organizations should focus on isolating and protecting company data from the underlying endpoint – any endpoint. This is made possible with secure enclave technology, which protects and isolates corporate applications and data within a company-controlled environment. Within the enclave, policies, monitoring and access controls are enforced – regardless of the device being used.
This model turns the device into a secure access point, as opposed to a security boundary.
By taking the secure enclave approach, organizations can support contractors and distributed employees using their own hardware while still ensuring company data security. Sensitive information stays inside the enclave instead of being stored directly on personal devices.
For CISOs, the goal is not to relax security requirements; it’s to apply them at the layer where work actually happens.
What Modern Security Needs to Deliver
Modern security models need to reflect how companies actually operate today: distributed teams, agile work environments, and a mix of managed and unmanaged devices.
Effective security strategies for modern workforces should enable:
1. Data containment
2. Consistent visibility and policy enforcement
3. Operational flexibility
Designing Device-Agnostic Security for Modern Workforces
Remote work did not just add complexity to enterprise security – it fundamentally changed its foundation.
The device is no longer the primary boundary of enterprise security, because modern work flows across locations, organizations and endpoints.
For CISOs, this shift is both a challenge and an opportunity.
Organizations that do not adopt device-agnostic strategies will find themselves fighting an increasingly uphill battle against workforce flexibility and operational complexity. 
Organizations that redesign security around protecting work itself can create architectures that are much better suited to today’s distributed workforces.
The goal is no longer to control where work happens. 
It is to ensure that wherever work happens, it happens securely.
 
 
 

source

Karpel: Growth Investment From Thompson Street Capital Partners To Expand Prosecutor Software Platform – Pulse 2.0
Small Business Tech News: Google Maps Gets A Big AI Upgrade – Forbes
Google's new Gemini update makes it easy to import memories from ChatGPT and Claude – the-decoder.com
Apple considers opening Siri to rival artificial intelligence services – marketscreener.com
France's Mistral raises $830 million in debt for AI data centre build-up – Reuters
Share This Article
Facebook Email Print
Previous Article US revises plans towards the Moon, fallout for Italian aerospace – Il Sole 24 ORE
Next Article Carnival (CCL) reports Q1: Everything you need to know ahead of earnings – MSN
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • World
  • Politics
  • Business
  • Technology
  • Science
  • Entertainment
  • Sports
  • Health
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
[mc4wp_form]
Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?