Why identity-based, distributed controls are better suited to address cloud-era threats - Help Net Security

Why identity-based, distributed controls are better suited to address cloud-era threats - Help Net Security

With more and more IT resources moving to the cloud and remote work becoming a ubiquitous business practice due to COVID-19, perimeter-based security is undeniably becoming a weak link, especially since attackers have repeatedly demonstrated they can bypass firewalls and spread laterally within enterprise networks.



Zero trust


It’s time for a different approach – one that centers on user identity and risk rather than binary network connectivity. In addition, security must be enforced closer to end users, rather than backhauling traffic across the Internet to a centralized data center for inspection. Two complementary concepts have emerged that address these challenges.


The first has existed for several years and is now gaining real traction to address the security gap created by the disintegration of the network perimeter. Zero ..

Support the originator by clicking the read the rest link below.