Intelligent CISO Issue 58 | Page 62

BUSINESS SURVEILLANCE

HOW TO NAVIGATE YOUR CLOUD SOLUTION ADOPTION JOURNEY WITH CONFIDENCE

As cyberthreats continue to rise , it is critical for organisations to ensure greater protection and smoother experiences for their users . Rob Standing , Regional Director – Middle East , Turkey and Africa at Zscaler , explains how organisations can ensure a seamless approach to cloud solution adoption and reduce their exposure to attacks .

w

What is Zero Trust and how does its absence affect an organisation ’ s security ?
Zero Trust seems to be the buzzword in the market right now and can be interpreted differently by every organisation . There ’ s Zero Trust and
Rob Standing , Regional Director – Middle East , Turkey and Africa at Zscaler there ’ s SSE ( Secure Service Edge ) and many vendors claim to have the right solutions .
At Zscaler , however , we focus on securing the user and getting them to their destination in the fastest and most secure manner . So , Zero Trust to us is about giving individuals the least privileged access and how we ensure there ’ s no exposure of those individuals on any organisation ’ s network .
What are some of the benefits an organisation will enjoy by implementing the right Zero Trust platform approach ?
Our cloud solution – Zero Trust Exchange – services around 35 % of the Global 2000 and these customers are finding benefits in three areas : user experience improvement ; increased security posture ; and simplification around tool consolidation , network and architecture .
By implementing a Zero Trust platform , businesses create a one-stop shop for all their security needs and integrate with other providers . For us at Zscaler , this provides greater global protection for the user regardless of where they are or what device they ’ re using , resulting in a smoother experience .
How can an organisation build a Zero-Trust network model that mitigates increased cyberthreats ?
Trust is a journey . As businesses try to migrate away from typical security setups , knowing what to trust outside of their network parameter is an important factor . That ’ s why we ’ re starting with our core functionality – Zscaler Internet Access . This allows organisations and individuals to access the Internet , cloud services and private applications without making them publicly available . Our aim here is to replace VPN setups .
62 www . intelligentciso . com