How to maintain flexibility in a hybrid working model, while securing access to resources and data for the right people
In recent years, “zero trust” has moved out of the realm of buzzwords to claim a permanent spot within modern information security. The pandemic is fueling zero trust prioritisation. Companies are planning to allow employees to work remotely at least part of the time after the pandemic. This acceleration of the adoption of mobile and cloud means that we cannot longer have a network perimeter-centric view of security. Instead, we need to securely enable access for various users – employees, partners, contractors, etc. – regardless of their location, device or network.
In today’s digital landscape, identity is the new perimeter. To meet the access and usability demands of modern users — and avoid becoming the next victim of a data breach or supply chain attack — organizations are moving towards a more robust and comprehensive security posture that’s centred around the zero trust principle of “never trust, always verify.” This requires companies to continually assess access privileges without adding friction for the user.
- Zero Trust Security
- Remote working
- Carmen CorazziniJournalist , Silicon
- Ernesto di MauroTerritory Manager for Italy, Greece, Malta and Cyprus , Okta