Remote work is the new paradigm where the current health environment requires employees to complete work-related tasks through remote internet connections. This new telework model can benefit employees due to the geographic freedom, the reduction in commute, and flexible schedule. There are also occasions in which remote work may be the only option for continued operations. When emergencies happen that prevent employees from being productive in the office, organizations need solutions that enable business continuity, supporting employees as they work from alternate locations. The transition to the teleworker model opens users and companies up to a myriad of security threats including malware, all forms of phishing attacks and many more. The Fortinet Security Fabric addresses remote worker scenarios with three primary levels of connectivity. If you have technical questions or need assistance contact us at firstname.lastname@example.org.
The Need for Remote Worker Security
Types of Teleworkers
The general user is the base level of secure access that everyone in the organization should have, to be used when traveling or working from home.
Power users are employees who need a consistent, secure connections to the corporate network from their designated remote work location.
Super users are the most demanding remote workers that require the highest levels of security or application performance for their work.
The general user profile for teleworking is the base level of secure access to the company network that everyone in the organization should have. This enables employees to utilize corporate resources and safely traverse the internet from a remote location such as their home, a coffee shop, an airport, or customer location. Power users and super users also need this capability when they are away from their home office. It addresses both the need for a secure and private connection across the public internet, as well as the ability to verify identity to the organization when connecting to the network, sensitive applications, or protected data.
Connect securely from remote locations to ensure that communication stays private even as it travels across open networks. FortiClient Fabric Agent provides the VPN tunnel back to the head office.
Our support site provides existing FortiGate customers a robust set of resources, including quick start documents and how-to videos covering the native FortiGate VPN capabilities.
The power user profile is for employees who will spend extended periods of time on the corporate network and provides for easier access and secure connectivity from their designated remote work location. Power users benefit from a secure, always-on connection to the head-end firewall. This creates a secure solution that is easy to manage and use. Identity verification is still recommended for access to sensitive applications and protected data.
FortiAP can deliver flexible and secure connectivity while being managed remotely by a FortiGate next-generation firewall (NGFW). The security policies of the firewall can be applied to the wireless traffic, while an encrypted tunnel from the access point protects that traffic across the internet.
Super users are those with elevated credentials or access to critical business information. Keeping their work activities secure is a high priority for the organization. This solution effectively turns the remote work location into a small branch office of the company. As with all employees, identity verification are still recommended for access to sensitive applications and protected data. A VPN client is recommended for work outside of the remote location.
Deploying a FortiGate NGFW provides a super user with the highest levels of security available for remote locations. With secure traffic tunnels as well as application control and traffic inspection, a low-end FortiGate NGFW provides several levels of protection, backed by artificial intelligence (AI)-driven security processes.
Essential Reading - Remote Worker Solutions
The Head End
Supporting the various types of remote workers requires both security and management tools to operate at scale. Below are the technologies that enable business continuity for a remote workforce: