f |
e |
a |
t |
u |
r |
e |
Alasdair Anderson , VP of EMEA at Protegrity |
|
|
|
|
|
|
A Zero Trust framework is a valuable layer of cybersecurity defence ; however , it should be implemented with a keen overview of an organisation ’ s requirements and workflow . Without consideration , a Zero Trust framework and tacked-on applications to support business needs can snowball into a bloated and complex IT infrastructure – escalating business costs .
Whilst Zero Trust effectively de-risks applications , servers , and infrastructure , it does not protect data in the event of an attack . For some employees , it will decrease the blast radius of phishing emails or exposed credentials – however if the employee happened to be the CEO , this would be a different story . Now the threat landscape has become so hostile that a security breach is no longer a question of ‘ if ’ but ‘ when ’. Measures must be put in place to mitigate the risk of sensitive , valuable data falling into the wrong hands . The simplest answer is not to put another solution on top , but to take a more holistic approach .
Alasdair Anderson , VP of EMEA at Protegrity
In an age of increasing cyberthreats and sophisticated attacks , traditional perimeter-based security is no longer enough . Zero Trust , a security model based on the principle of ‘ never trust , always verify ,’ is transforming the way organisations protect their networks , data and applications . By continuously validating user and device access , Zero Trust minimises the risk of breaches and ensures that security remains robust , even in an increasingly complex digital landscape . In this feature , three industry experts from Protegrity , Xalient and 11:11 Systems explain how organisations can implement Zero Trust effectively without compromising user experience or creating unnecessary complexity in their IT infrastructure .
Integrating data-centric security measures into a Zero Trust framework enables organisations to derive the most cybersecurity value from the infrastructure , without disrupting employee workflow and locking away valuable , actionable data . Through applying Privacy Enhancing Technologies ( PETs ), data can be anonymised , ensuring that in the event of a breach , valuable data remains anonymous , and of little use to threat actors . This risk mitigation may enable organisations to consolidate their cybersecurity solutions , reducing costs .
Further , by incorporating data security into a Zero Trust framework , employee friction can be greatly reduced . Traditional Zero Trust measures often introduce friction , preventing employees from easily accessing the data they need , sometimes leading to delays of up to two weeks . As Protegrity ’ s research shows , 37 % of organisations wait one to two months to access sensitive data , while 32 % face delays of three to six months .
These waiting times can disrupt workflow , impact customer experience , and lower employee
Zero Trust alone isn ’ t enough to protect sensitive data in the event of a breach .
WWW . INTELLIGENTCISO . COM 37