Skip to content

Mobility and Secure Remote Work

Your team works from everywhere. Corporate data and systems need to be just as secure in a coffee shop as they are in the office.

The way people work has permanently changed. Staff work from home, from cafés, from client sites, from airports, from hotel rooms. Devices connect to networks the organisation has never seen, over WiFi that was never designed with business security in mind. The expectation is that it all just works seamlessly, regardless of device, regardless of location.

Meeting that expectation while keeping corporate data and systems secure is not trivial. A VPN and a password no longer provide adequate protection. Modern remote work security requires a different architecture - one that enforces consistent policies regardless of where a device connects, verifies identity continuously, and protects corporate access whether the user is on a managed device in the office or on a personal iPad in a café.

Microsolve designs, implements, and manages secure remote work environments built on Fortinet SASE and Microsoft Entra ID to give your people the access they need and your organisation the control it requires.


Why Legacy Approaches Are No Longer Enough

Traditional remote access was built for a different era. The model was straightforward: employees connected from company hardware, over a VPN that routed all traffic back through the corporate network, to resources that lived on-premise. Security was built around the perimeter to control what comes in and out of the network, and you control the environment.

That model has three problems in 2026.

The Perimeter No Longer Exists

Applications live in Microsoft 365, in cloud platforms, in SaaS tools. Data moves between systems that were never inside the corporate network to begin with. Routing everything through a central network adds latency, degrades performance, and creates a chokepoint that scales poorly as remote work becomes the norm rather than the exception.

Devices Are No Longer All Company-Owned and Managed

BYOD (bring your own device) is standard practice in many organisations. Personal smartphones, tablets, and laptops access corporate applications alongside managed devices. A VPN-centric model has no reliable way to distinguish a well-managed corporate device from a personal device with an outdated operating system and no endpoint protection.

Users Expect A Seamless Experience

If the security tools create friction that manifests in slow connections, repeated authentication prompts, or content that is inaccessible from certain locations, users find workarounds. Shadow IT, personal cloud storage, forwarded emails; the workarounds to bad security experiences are typically less secure than the problem they were avoiding.

A modern secure remote work architecture solves all three. It delivers consistent security regardless of device type or network, without creating the performance and usability penalties of legacy VPN approaches.


What Secure Remote Work Actually Requires

Securing a remote workforce is not a single product decision. It is a layered set of controls with each addressing a different risk that work together to create a consistent, manageable, secure experience for both users and administrators.

Verified Identity Before Any Access

Before a remote user can access corporate systems, their identity needs to be verified. Not just with a password, but with context-aware authentication that assesses whether the sign-in attempt looks legitimate given the user's history, device, location, and behaviour.

Microsolve implements identity controls through Microsoft Entra ID, combining multi-factor authentication with Conditional Access policies that evaluate every sign-in attempt against a defined set of criteria. A sign-in from a known device, from a familiar location, at a typical time of day proceeds smoothly. A sign-in from an unrecognised device, from an unusual location, or with a compromised credential is challenged or blocked automatically, without requiring IT intervention.

This is not a restriction on how people work. It is a safety net that operates invisibly for legitimate users and actively blocks the compromised credentials and stolen accounts that are the most common entry point for attackers.

Device Health and Management

A verified identity is only as trustworthy as the device it is coming from. A managed, patched, protected laptop represents a significantly different risk profile from a personal device that has never had its security posture assessed.

Microsolve manages device health and compliance across Windows, iOS, and Android ensuring that:

  • Devices connecting to corporate resources meet defined security standards (current OS patching, endpoint protection active, encryption enabled)
  • Conditional access policies can assess device health as part of the sign-in evaluation, granting different levels of access to managed versus unmanaged devices
  • Corporate data on all mobile devices, including personal mobiles, is protected by mobile application management (MAM) policies preventing data from being copied to personal storage or unsecured applications
  • Remote wipe capability is available for managed devices containing corporate data if a device is lost or stolen

Network and Traffic Security (SASE)

The most significant architectural shift in remote work security is the adoption of Secure Access Service Edge (SASE). Where legacy VPN routed all traffic back through the corporate network, SASE moves the security controls to the cloud, applying them at the point of access rather than at a central chokepoint.

Microsolve implements Fortinet's unified SASE platform (FortiSASE), which delivers:

  • Secure Web Gateway (SWG): all internet-bound traffic from remote devices is inspected and filtered through Fortinet's cloud-delivered security stack, regardless of the network the device is on. Corporate security policies are enforced whether the user is at home, in a café, or in an airport lounge
  • Zero Trust Network Access (ZTNA): application access is granted on a per-application basis to verified, compliant identities to replace broad network access with precise, controlled connectivity
  • Cloud Access Security Broker (CASB):  visibility and control over how corporate data is accessed and used in cloud applications, including unsanctioned SaaS usage
  • Firewall-as-a-Service (FWaaS): firewall-grade protection delivered from the cloud, applied consistently to all remote users without requiring traffic to hairpin through a corporate network

The result: a remote worker in a café with an unknown WiFi network receives the same level of security inspection and policy enforcement as a user sitting in the office, with better performance and no VPN client to manage.

Visibility and Monitoring

A secure remote work environment is only as effective as the visibility it provides. Microsolve's managed remote work service includes continuous monitoring of:

  • Device health and compliance status across the remote fleet
  • Sign-in activity: risky sign-ins, anomalous access patterns, impossible travel events
  • Application usage: including shadow IT and unsanctioned cloud service access
  • Security posture drift: devices falling out of compliance, policies that have changed, certificates and licences that need renewal

SASE: The Platform Behind Secure Remote Work

SASE (Secure Access Service Edge) has emerged as the dominant architectural approach for securing distributed workforces, with the global SASE market on track to triple in size by 2030 and Asia Pacific growing at over 22% per year. The reason is practical: SASE solves the core problems of performance, consistency, and visibility, that legacy remote access architectures cannot, in a single, cloud-delivered platform.

Microsolve builds remote work environments on Fortinet's unified SASE platform, which consolidates networking and security into a single solution managed through a single operating system (FortiOS) and a single agent (FortiClient). This means:

One Agent on the Device

No proliferation of security tools, each with its own management console and update cycle

Consistent Policies Across Every Location

The same security controls apply whether the user is in the office, at home, or on public WiFi

Performance-First Design

Traffic is inspected locally at the nearest Fortinet point of presence, not routed to a central corporate network, resulting in faster, more responsive access to cloud applications

Simplified Management

A single management plane for network and security, reducing the operational complexity of managing disparate point products

For organisations that already have Fortinet infrastructure on-site such as firewalls, switches, or SD-WAN, FortiSASE extends that security architecture to the remote workforce, using the same policies, the same management tools, and the same operating system. Security settings do not need to be duplicated and maintained separately for office and remote users.


Supporting Every Device Type

Remote work does not happen on a single device type. Corporate Windows laptops sit alongside personal iPhones and Android tablets. Field teams use mobile devices that never connect to a corporate network. Some staff bring their own devices while others use company-issued hardware that travels constantly.

Microsolve manages security across all device types in the modern workforce:

Windows (managed devices)

Full endpoint management through Microsoft Endpoint Manager (Intune). This includes device enrolment, compliance policy enforcement, application deployment, patch management, and remote wipe. FortiClient SASE agent deployed and managed centrally.

iOS (iPhone and iPad)

Mobile device management through Intune, with MAM policies that protect corporate data within managed applications without requiring control of the entire device. Corporate email, documents, and applications are protected even on personal devices, without impacting the employee's personal apps or data.

Android (managed and BYOD)

Android Enterprise enrolment for corporate-owned devices with full device management. For BYOD Android devices, work profile separation ensures corporate data is contained within a managed work environment - visible to and managed by Microsolve - while the personal profile remains private and untouched.

The approach is not one-size-fits-all. Microsolve designs the device management and SASE configuration to match the organisation's specific mix of device types, ownership models, and application requirements to ensure security is consistently applied without creating friction for users or complexity for IT.


Security That Works For People, Not Just For Policies

One of the most common failures in remote work security is the gap between what the policy requires and what employees actually do. Security tools that create friction, whether it be slow authentication, blocked applications, inconsistent access, or repeated credential prompts, are security tools that get bypassed.

Microsolve designs remote work environments with the user experience as a deliberate part of the brief. The goal is security that is invisible to a legitimate user going about their normal work and effective as a control without being an obstacle.

In practice, this means:

SSO Through Entra ID

Users sign in once and access all their applications without repeated prompts, while every access event is still governed by conditional access policies

Transparent SASE Protection

FortiClient operates silently in the background. Users do not need to manage a VPN or take any action for their traffic to be secured

Sensible Conditional Access Policies

Policies designed to challenge unusual behaviour, not to interrogate every routine action from a known device at a known location

Consistent Performance

Cloud-delivered security that routes traffic efficiently rather than adding latency through a central corporate connection

Clear, Helpful Prompts

When access is challenged or blocked, users receive clear guidance on what to do, not cryptic error messages

The outcome is a workforce that works securely from anywhere. Not because they are forced to comply with friction-heavy controls, but because the security environment has been designed to be the path of least resistance.

Frequently asked questions

Is a VPN still adequate for remote work security?

A traditional VPN provides an encrypted tunnel between a remote device and the corporate network. It does not inspect or filter internet traffic, does not assess device health, and does not apply consistent security policies across cloud applications that do not route through the corporate network. For organisations with a significant remote workforce and cloud-based applications, VPN-only approaches leave significant gaps. SASE addresses these gaps by applying security controls at the cloud edge rather than at the corporate perimeter.

What is SASE and why does it matter for remote work?

SASE (Secure Access Service Edge) is a cloud-delivered architecture that combines networking and security into a single platform. For remote workers, it means consistent security policies are enforced regardless of which network the device is on - at home, in a café, at a client site. Traffic is inspected and filtered locally at a cloud point of presence rather than routed back through a central corporate network, resulting in better performance and more comprehensive security than legacy VPN solutions.

How does Fortinet SASE (FortiSASE) work?

FortiSASE delivers cloud-based security through a single agent (FortiClient) installed on the device. It combines a Secure Web Gateway for internet traffic inspection, Zero Trust Network Access for application-level connectivity, a Cloud Access Security Broker for cloud application visibility, and Firewall-as-a-Service, all managed through a single platform. For organisations already using Fortinet infrastructure on-site, FortiSASE extends the same security architecture and management to the remote workforce.

How do you secure employees working from a coffee shop or public WiFi?

With a SASE architecture, the security controls move to the device and the cloud, not the network. Whether a user connects from a trusted home network or an open café WiFi, all internet-bound traffic is inspected through the cloud-delivered security stack before it reaches its destination. The network the device connects to becomes irrelevant from a security enforcement perspective.

Can you manage security on personal devices (BYOD)?

Yes. Microsolve manages security on personal iOS and Android devices using mobile application management (MAM) policies through Microsoft Intune. On personal devices, a work profile is created that contains and manages corporate data and applications without accessing or controlling the employee's personal content. Corporate data in managed applications is protected against export to unsecured personal storage, regardless of device ownership.

How does conditional access work?

Conditional access policies, managed through Microsoft Entra ID, evaluate every sign-in attempt against a defined set of criteria including the user's identity risk level, the device's compliance status, the location and network, and the application being accessed. Access is granted, challenged (with additional authentication), or blocked based on that evaluation. This means security adjusts dynamically to the context of each access attempt rather than applying a static all-or-nothing control.

What happens to corporate data if a device is lost or stolen?

For managed devices, Microsolve can initiate a remote wipe through the device management platform to erase corporate data from the device. For BYOD devices enrolled under a work profile, the corporate work profile can be wiped independently of the personal profile, removing corporate data without affecting the employee's personal content.

Does this work for organisations that are already using Microsoft 365?

Yes. Entra ID is the identity platform for Microsoft 365, and Microsolve's conditional access implementation builds on the Entra ID configuration that is already part of the Microsoft 365 tenancy. FortiSASE integrates with Entra ID for identity-aware security policies. Organisations already in the Microsoft ecosystem are well-positioned to adopt this architecture without significant infrastructure changes.

Secure access from anywhere, for every device, every user, every time

Whether your team is working from home, from client sites, or from coffee shops, their access to corporate systems should be consistent, secure, and seamless. A remote work security review is the right starting point as it gives you a clear picture of where your current approach has gaps and what a well-designed environment looks like for your specific workforce.