Cyber Security

Is Zero Trust Critical for Effective Security?

Zero Trust security has been around for several years, but the concept has recently started gaining traction as a technology product. As businesses now operate from remote locations, they are forced to undergo digitization. 76% of these enterprises have seen an increase in the number of personally owned devices connected to their network. Therefore, Zero Trust has now become a necessity for most companies. In this article at DarkReading, Dan Blum explains why Zero Trust is vital for secure remote working.

How Effective is Trusted Perimeter?

“Businesses that had robust remote access and/or cloud security strategies before COVID-19 have found it relatively easy to ramp up teleworking,” explains Dan. As many companies are moving employees out of the office to cut cost and reduce downtime, remote work is bringing new security challenges to organizations. Untrusted networks and unhealthy devices are connected to the enterprise network. Today, CISOs are made to rethink the fundamentals of perimeter centric and trust-based security and how it protects applications, users, data, and devices critical to the enterprise. Moving the focus of security away from the perimeter is no longer an option.

How to Implement Zero Trust?

Deploying Zero Trust is often perceived as a complicated and costly process. However, you can build Zero Trust upon your existing architecture without replacing your current technology. Besides, Zero Trust is also quite simple to implement and maintain. The following steps will help you identify where you are and where to go next:

  • Identify the protect surface
  • Map the transaction flows
  • Build a Zero Trust Architecture
  • Create a policy around the architecture
  • Monitor and maintain

As companies adjust to the ‘new reality,’ security remains a tough balance. Deploying Zero Trust architecture provides companies the flexibility in work arrangements, the security of continuous monitoring, and the ability to adapt to disruption.

To read the original article, click on

Related Articles

Back to top button

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.