Challenge
Viva is in the process of growing and expanding its fleet, with the goal of opening 15 new international destinations in less than 3 years. In parallel, adapting to market changes and in response to this growth, the airline has joined efforts to support teleworking, in addition to reorganizing its offices following the concept of open space, trusting in cybersecurity and taking endpoints outside the network perimeter. It was therefore necessary for all devices to have the same level of security, regardless of where they are located.
«We posed this challenge to Sofistic with our days numbered. We had decided that our office in Medellin would be located in a co-working space, so we needed to secure the endpoints outside the network perimeter so that the devices would provide the same level of security regardless of where they were located»
Solutions
«We decided to leverage the technology that was there and took on further the services.»
With these solutions, Viva was able to manage and secure computers from the cloud, without the need for domain controllers or VPN connectivity. And the company was able to ensure full compliance with device browsing control, software update control and threat protection on more than 400 devices.
Fabian Ramos reports that the implementation was completed in three weeks, so they were able to successfully inaugurate their new office, where they shared infrastructure with other companies, meeting the deadline.
Results
«We now have employees working from different cities and countries with the security guarantees we required»
Future actions
Cybersecurity continues to be one of the most important challenges facing the aviation sector in in the coming years.
Major threats have to be dealt with.
As with other critical infrastructures, the type of attacks - increasingly sophisticated - has made it necessary to change the paradigm to try to reduce potential risks in multiple areas (physical infrastructure, cloud services, web services, etc.).
Anticipating potential cyber threats remains the best security policy. For this reason, it is necessary to perform a complete vulnerability analysis in order to focus on the adoption of specific technologies, always with the goal of protecting organizations actively and in real time.