CLOUD & CYBER
Zero Trust has come of age Casey Cheyne , VP of cloud at IGEL Technologies warns : “ Businesses can no longer simply hand out a corporate managed laptop with a VPN connection required to access corporate resources when away from the office . Working from anywhere means we constantly need to access both work and personal IT services across a variety of devices and networks on a daily basis . Most of these endpoint devices are not company owned , yet security and data privacy are as important as ever .”
This , with the increase in the number of endpoints which could be compromised , he adds , means it is important to ensure all are secured and that any sensitive data that could reside on , or be accessed from , them is protected .
Along with the usual security tools to have on an endpoint , such as anti-virus software , dual factor authentication , local firewall and so on , organisations now need to do more . This is where the Zero Trust approach comes in .
The Zero Trust Network , or Zero Trust Architecture model was created back in 2010 by John Kindervag when he was a
“ Despite the positives of home working and BYOD being flexibility , agility and infrastructure cost savings , the lack of a coherent security posture and control over a company ’ s data are the main negatives ”
PETE BRAITHWAITE COO , KIT ONLINE
principal analyst at Forrester Research . This model is increasingly being implemented into the mainstream inside organisations owing to the growing pressure to protect enterprise systems and as attacks become more sophisticated .
Zero Trust is a concept centred on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access . With the current situation as well as BYO , this is becoming more of a go-to model .
Roger Grimes , a senior computer security consultant and cybersecurity specialist at KnowBe4 , agrees that Zero Trust is the
84 July 2021