• Latest
  • Trending
Using Zero-Trust to Secure Dissolving Network Boundaries

Using Zero-Trust to Secure Dissolving Network Boundaries

January 18, 2022
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Wednesday, 27 September, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Using Zero-Trust to Secure Dissolving Network Boundaries

by ITECHNEWS
January 18, 2022
in Leading Stories, Opinion
0 0
0
Using Zero-Trust to Secure Dissolving Network Boundaries

Today’s network perimeter has evolved as workloads have moved to the cloud while non-managed, mobile devices have become the norm rather than the exception. The location of applications, users and devices are no longer static, and data is no longer confined to the corporate data center. Gaps in visibility and protection continue to widen as the attack surface evolves, forcing companies to leverage multiple, disconnected tools to see and secure everything.

The proliferation of cloud computing, mobile device use and the internet of things (IoT) has dissolved traditional network boundaries. Zero-trust can help address the resulting gaps in security and increase the protection of data and devices. 

YOU MAY ALSO LIKE

ATC Ghana supports Girls-In-ICT Program

Vice President Dr. Bawumia inaugurates ICT Hub

Zero-Trust Protocols

The protocols for a zero-trust network ensure that specific rules are in place to govern access and are based on the type of user, location and other variables. If the security status of any connecting endpoint or user cannot be resolved, the zero-trust network will deny the connection by default. If the connection can be verified, it will be subject to a restrictive policy for the duration of its network access.

Zero-trust networks operate under the least-privilege principle, in which all programs, processes, devices or users are limited to the minimum privileges required to carry out their functions. Access rights don’t need to be too restrictive as they are balanced against privileges that can range from full access to no rights at all, depending on the circumstances.

It’s important to point out that zero-trust is not a technology—it’s a holistic approach to network security. Automated technology is a necessary tool for obtaining access, scanning and assessing threats, adapting to behavior changes and continually reevaluating confidence in communications. However, achieving a zero-trust architecture (ZTA) in today’s threat landscape does require some form of automation, especially in support of dynamic policy, authorization and authentication.

Choosing the Right Path on your Zero-Trust Journey

A zero-trust architecture can be designed and executed in several different ways. The journey will depend on an organization’s use cases, business flows, risk profile and the business function of the network.

Many organizations have found traditional detection and prevention technologies no longer sufficient to mitigate the threats posed by opportunistic actors. Information into how previous attacks were carried out only provides so much help. The key is to plan for the worst and assume a breach has occurred. This means organizations need to consider that all networks—and their applications and devices—are insecure. Both users and devices must be continuously authenticated and granted access to resources through disciplined verification.

To help support this, it is recommended that organizations aim to implement a holistic zero-trust approach that focuses on safeguarding critical digital resources and assets. Yes, no one solution will get organizations there, but focusing on identity management and zero-trust segmentation will point enterprises in the right direction.

Benefits of Proper Zero-Trust Implementation

Organizations that implement the zero-trust model can utilize the right mix of authentication and microsegmentation to create a much more robust barrier against attackers targeting an organization. By using zero-trust and its core foundations of microsegmentation and enforced authentication via identity providers, organizations can fully visualize networks and resources. This helps to ensure relevant least-privilege and secure access to corporate resources and control all aspects of network security across cloud and on-premises applications and services. 

Zero-trust provides the visibility, control and threat inspection capabilities necessary to protect networks from ransomware, targeted attacks and the unauthorized exfiltration of sensitive data. Every organization looking to establish secure “trust boundaries” according to the zero-trust security model can improve their overall security posture. As a result, organizations gain better visibility across users, devices, containers, networks and applications because verification of their security status is required with every access request.

When approached the right way, zero-trust can help enterprises become more resilient, reduce cybersecurity risk and drive digital transformation initiatives to move their business forward. Don’t connect people to a network, don’t build a moat with firewalls and VPNs—instead, focus on a zero-trust strategy and implementation where users are connected to applications, not the network.

Source: Sundaresan
Via: Security Boulevard
Tags: Zero-Trust
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version