With the overwhelming need for your workforce to stay home, securing your Workday tenant while enabling their flexibility to access enterprise systems is one of the top priorities for your organization. Workday provides companies with the ability to define authentication rules specifying from where and how employees can access your Workday installation.
In addition to providing employees with access to your systems, you also need to protect these systems against malicious access attempts. Beyond securing the physical connections and devices as recommended by the U.S. Cyber Infrastructure and Security Agency (CISA), there are application-level configurations that can be put in place to further strengthen your organization’s network.