Cyber security can be the only industry with annual revenue over $ 100 million that fails periodically spectacularly.
So far, any attempt to provide high security has followed the same trajectory: the promise and then the crash. However, it looks like Google has managed to find the security formula.
In 2009, Google along with other major businesses was the object of a sophisticated attack, called Operation Aurora. Attack of Chinese government origin, companies responded by increasing security perimeter with more VPN and firewalls.
Google developed a completely new security architecture based on the assumption that anyone inside the firewall is as suspicious as those who seek access to the network. This architecture was called Zero Trust. After launching this security strategy, companies such as VMware, Cisco and Palo Alto Network began using the new generation of firewalls. All of these strategies support the Zero Trust thesis.
But today, 9 years later, the publication of the Zero Trust strategy requires the application of another technology, which is recognized by experts as Next Generation Access (NGA). Access control technologies are critical. On the other hand, micro-segmentation technologies or microperimeters enable the organization to "better" isolate from threats and more effective network control.
Network Technologies for Zero Trust have some specific capabilities, which for NGA include:
- Correlation between access and users (who does what, where and why)
- Single sign-on for the user (the key is simplifying access control)
- Multi-fact Authentication (Threats Reduced Exponentially)
- Technical integration to improve security in the network layer
Any organization applying a security strategy of the Zero Trust type should also consider using the NGA. Network-only focus or data leaves room for potential attacks on access controls, which lead to the failure of strategic security goals.
Technologies allow greater control over what users do in the network and more effective implementation of existing policies for all of the key components of a Zero Trust strategy. Taken from Russian cyberattacks in US infrastructure, the best solution to tackle threats is the application of a Zero Trust strategy, ahead of potential cyber crises.
What do you think about "Zero Trust" strategy?
#security #zerotrust #NGA #VMware #Cisco #PaloAltoNetwork
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit