security

As Cyberthreats Grow More Sophisticated, Can Zero Trust Protect … – BizTech Magazine


“It’s difficult to understand what’s actually in your environment, which systems should be talking and which systems actually are talking,” Salzberg says. “That whole analysis has always been a challenge and continues to be, but it’s fundamental for zero trust.”

A variety of tools can help organizations establish the elements of zero trust, including multifactor authentication, segmentation and microsegmentation, single sign-on solutions, secure web gateways, and encryption. As they work to deploy these and other tools in a zero-trust environment, organizations must understand that this approach is a continuing pursuit.

“Zero trust is something organizations want to include in how they build and implement new applications and start to work on retrofitting old applications into the new model,” Salzberg says.

“Some people think it’s like a light switch that you can just turn on, that you can just do this and have zero trust,” Candillo adds. “It’s certainly not like that. It’s building a foundation and getting the tools and implementing them in the environments where it makes sense.”

UP NEXT: Best practices for deploying zero trust in your mobile environment.



READ SOURCE

Readers Also Like:  Motorola Solutions acquires IPVideo for enhanced safety security tech - IT Brief Australia

This website uses cookies. By continuing to use this site, you accept our use of cookies.