Technology Magazine May 2017 | Page 243

USA try to move laterally ,” explains Don O ’ Neil . “ But because we leverage a zero trust architecture with strong authentication , network segmentation , and application visibility , we can stop the attack at multiple levels . Even if a user ’ s laptop becomes compromised and controlled by an attacker , the hacker ’ s malware will not be able to move laterally on the network because the next generation firewalls will enforce segmentation and block any malicious traffic .” Four or five levels of security stop an intruder at the door . An additional safeguard is provided by segmentation : whether the network is accessed through a VPN , a corporate wired network ( LAN ) or a WLAN , or even a compromised IoT device , PwC ’ s solution controls how and what each user can access , the time of day they can access it , the device they use and their location at the time .
Vision restored So every device that connects to the network , workstations , cameras , servers , even an Internet of Things ( IoT ) device , has to recognized through a valid certificate , fingerprint or profile . This does not interfere with the companies that want to leverage
www . pwc . com 243