How to make your IT security go beyond your network – and make people your perimeter

How to make your IT security go beyond your network – and make people your perimeter

Webcast So-called zero-trust security architecture is essentially a real-life version of what everybody fails to get right in spy thrillers. While agents carefully check their perimeter, they forget the enemy could be right alongside them the whole time, working within their team for years.


In the real world, just as in your favorite movie or novel, an untrusted actor in a trusted network can often spell havoc for an organisation, costing money and and damage reputation for years, or end a business altogether.


This is where zero-trust security seeks to change the rules, and does this by reassessing exactly what’s meant by trusted and untrusted parts of the network. Rather than looking at the physical reality of the network itself, either on a fixed geographical and hardware level, or even on a wider cloud or mobile network, zero trust goes transcends traditional perimeters.


..

Support the originator by clicking the read the rest link below.