BrandPost: Zero Trust Part 2: Implementation Considerations

BrandPost: Zero Trust Part 2: Implementation Considerations

Zero Trust is not just one technology or solution; it comprises a series of technologies, policies, and protocols along a journey toward secure access and data protection.

Although the journey may take time — on average, 1.4 years for companies to adopt a Zero Trust architecture, according to the latest IDG Security Priorities study — it’s all doable.

With that in mind, here are steps toward implementing Zero Trust.

A piece of advice at the outset: “Don’t do too much too fast,” says Wolfgang Goerlich, CISO Advisor with Cisco. “Have specific goals, meaningful use cases, and measurable results.”

To read this article in full, please click here



Support the originator by clicking the read the rest link below.