Before the pandemic, organizations took a castle-and-moat approach to cybersecurity. They used corporate firewalls to protect the network, ensuring on-premises devices, systems and data were secure. But that approach no longer works.\n\nNow enterprise IT teams are adapting to a new IT landscape with a workforce mostly or entirely remote indefinitely. More applications and storage are moving to the cloud. And cybercriminals, watching these changes unfold, are focusing their attention on new targets and new forms of attack. The hybrid workforce has caused the traditional enterprise IT environment to be turned inside out.\n\nIn this article, we look at security challenges related to managing clients (IT endpoints, including servers, desktops, laptops, tablets, and smartphones) in the inside-out enterprise.\n\nClient security\n\nIn the inside-out enterprise, employee endpoints are out of sight and likely out of date in their software patches. Worse, cybercriminals know that employees are more vulnerable working in their remote offices than they are on premises behind a corporate firewall. They\u2019re crafting phishing messages and other types of attacks specifically aimed at isolated employees.\n\nAccording to ITProPortal, almost three-quarters of businesses in the U.S. and the U.K. have suffered some kind of data breach because of a phishing attack in the past year, according to email security company, Egress.\n\nBeyond discovering, updating, and patching remote endpoints, IT organizations need a way to:\n\nHere, too, IT departments need visibility into and control over endpoints without requiring VPN connections. If an endpoint is under attack, you can\u2019t expect an employee to launch a VPN connection back to headquarters. IT teams need to be able to access the endpoint as-is \u2014 and without launching a new network connection that could potentially hasten the spread of malware.\n\nWithout requiring a VPN connection, client security software should be able to:\n\nCase study: containing a ransomware attack at Ring Power\n\nThe benefits of real-time, distributed client management became clear recently to Ring Power Corp., a heavy-equipment dealer based in Saint Augustine, Florida.\n\nWhen a manager clicked on a phishing email, the company was hit by a ransomware attack that shut down all 150 servers in the company\u2019s data center and crippled the 2,300 endpoints its employees relied on for their daily work.\n\nFortunately, the company had just purchased Tanium solutions for client management, including modules for asset discovery and inventory, risk and compliance management, sensitive data monitoring, and threat hunting.\n\nWith help from Tanium, Kevin Bush, VP of IT, and his 10-person team were able to\n\ncompletely disinfect and restore Ring Power\u2019s IT infrastructure in a matter of weeks. And they did so without paying the ransom \u2014 in fact, without ever communicating with the attackers at all.\n\nInstead of negotiating a payment, they shut down systems, isolated their backups to ensure they weren\u2019t corrupted by malware, physically collected all endpoints from the company\u2019s 26 locations, and disinfected every system. They also installed Tanium on every endpoint. Operations resumed with clean and secure endpoints.\n\n\u201cTanium brings visibility to one screen for our whole team,\u201d Bush says. \u201cIf you don\u2019t have that kind of visibility, you\u2019re not going to be able to sleep at night.\u201d\n\nDownload the full Ring Power case study here.\n\nTransformation brings opportunity\n\nAny type of transformation brings challenges, but it also comes with opportunity. By overcoming the challenges, IT organizations can:\n\nThe enterprise IT landscape has changed forever. But with the right tools and strategy for client management, this change can serve as the catalyst for more robust IT security for employees everywhere, so that at any location on any device, employee productivity remains better than ever.\n\nLearn how Tanium\u2019s client management solution can help your organization overcome these security challenges in today\u2019s inside-out enterprise.