Access and Feeds

Security: Zero Trust Enables Flexibility and Agility

By Dick Weisinger

Zero trust is security that focuses on the authentication of individuals rather than relying firewalls and perimeter protection. Previously organizations implemented security by focusing on securing a network segment. Zero trust, on the other hand, focuses on strong authentication that can guarantee the identity and privileges of users.

Zero trust is more flexible because it allows access to any application or part of your environment from any user, device or location, if the user is properly authorized. It enables organizations to better detect and respond to risks.

With perimeter-based security methods, the focus is on preventing unauthorized users access, but once a user gains access, there is much less security. Zero-trust environments continually track and monitor netowrk activities, looking for anomalies. User movements are tracked, their activity is logged, and their actions are analyzed.

Reiner Kappenberger, product management director at Micro Focus, said that “now that people are working at home there are different threats in that environment. So zero trust is even more critical in today’s world, where people are removed from the office and may be so for some time to come.”

Richard Archdeacon, advisory CISO at Duo Security, said that “zero trust can address the agile needs of a modern organization. Zero trust allows a far more flexible and agile way of working and accessing corporate resources for users. It allows organizations to become more agile as they move to the cloud and change their IT backbone. It will become the way security is architected.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on DotNetKicks.com
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)

Leave a Reply

Your email address will not be published. Required fields are marked *

*

thirteen − eight =