From cloud to edge computing, zero trust security is the factor that makes l’everywhere workplace possible. The pandemic has helped to change the normal concept of the working environment.

A recent survey by Gartner found that 90% of respondents will allow their employees to work remotely, even when most of the population will be vaccinated.

In everywhere workplace, employees can access applications and business data through different devices, wherever they are. While this has led to increased productivity, smart working has helped to expand the business attack surface, generating new challenges for IT teams.

In addition, despite the dizzying growth of cybersecurity threats, the low attention paid to the issue of security by employees is also added.

As Nayaki Nayyar, Executive Vice President and Chief Product Officer of Ivanti notes, the Secure Consumer Cyber Report 2021 found that the consumer uses his email or password to work for

In this scenario, how can IT departments guarantee the protection of all digital assets, defending workers from remotely from possible cyber attacks?

Zero trust security as a solution

The everywhere workplace requires constant and distributed security.

The solution lies in the adoption of zero trust security which, before allowing any access to the network, allows organizations to verify all assets and operations.

The verification includes rigorous authentication of users, device posture control and micro-segmentation of networks.

In addition, before granting access to the user, the zero trust model shall consider the whole context surrounding it. The employee can access sensitive data either through a device on a business network or using a personal smartphone with a public Wi-Fi network.

By implementing the zero trust model, companies can defend themselves against theft of credentials, re-use of passwords and the risk of cloning a user. In addition, if used correctly, zero trust protects the privacy of data and employees, eliminating any further concerns from companies.

Read our guide: 23 security solutions zero trust

Automation for an effective zero trust approach

Automation tools, which take into account the context, are the key component for the implementation of an effective zero trust authentication strategy.

Generally, automation tools include functions essential for zero trust security, such as continuous evaluation of the device posture, access control based on the roles and position of users. By ensuring the good health of the user and device, companies guarantee quickly and effectively accesses, reducing the operating cost.

With deep learning, optimised learning capabilities, businesses can detect proactively and predictively configuration errors, performance problems, application crashes and vulnerabilities on devices, putting you right before any kind of interruption occurs.

For example, notes Nayyar, Ivanti Neurons allows IT to question all edge devices, relying on sensor-based technology and common language processing, to obtain real-time information, throughout the company and in a few

The platform offers a quick operational vision, a real-time inventory and security configurations on all peripheral devices.

The future is automated

With the automation platform and zero trust technologies, companies can proactively detect and predict threats, protecting and automatically healing devices.

Ivanti Neurons customers experience a 50% reduction in response times to support calls, reducing IT team work and the number of vulnerable devices by up to 50%.

In addition, decreases in unexpected interruptions of 63%, reductions in the time of distribution of safety updates of

The zero trust security model offers a convenient solution, which can ensure protection of the workplace wherever it is located.

Companies, according to Nayyar, should move quickly to this type of solution, exploiting the latest technologies to mature its implementation. In addition to significantly reducing the risk of breaches, the zero trust strategy can offer secure, contextual and personalized user experiences in this new normality.

Leave a Reply

Your email address will not be published.

You May Also Like