› Forums › IoTStack › News (IoTStack) › 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network
- This topic has 1 voice and 0 replies.
-
AuthorPosts
-
-
October 30, 2019 at 9:37 am #36712
#News(General) [ via IoTGroup ]
3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network
Auto extracted Text……As mobile devices flood the enterprise (especially for a younger generation of workers), the internet of things (IoT) expands, and cybercriminals grow in both numbers and sophistication, many security professionals think zero trust is the safest approach to defending against constantly evolving network and data security threats.
What Is Zero Trust Security?
Forrester, citing a new environment in which “changes like mobility and big data have made ‘building stronger walls’ an expensive farce that will not adequately protect networks,” introduced the concept of zero trust, urging organizations to “make security ubiquitous throughout the network, not just at the perimeter.”
Zero trust refers to both a set of practices and a network design philosophy, which “demands that you build security into the DNA of your IT architecture by investing in situational awareness and developing robust vulnerability and incident management capabilities.”
In short, zero trust inverts the “trust but verify” approach to “verify and never trust.”
Achieve Zero Trust Security in 3 Steps
According to Forrester, organizations should ideally rebuild their networks “from the inside out,” starting with the “system resources and data repositories that we need to protect as well as the places where we need to be compliant.” But while rebuilding the network may be a desirable long-term goal, there are myriad ways organizations can gain the benefits of zero trust without embarking on a project of that magnitude.
Here are three steps you can take to introduce zero trust security principles into your organization.
Experts recommend implementing network microperimeters, such as a next-generation firewall and data security controls, so that intruders cannot access more than a defined subset of data, even if they are able to breach the perimeter defenses
Read More..
AutoTextExtraction by Working BoT using SmartNews 1.02456265934 Build 26 Aug 2019
-
-
AuthorPosts
- You must be logged in to reply to this topic.