1 minute read

The Concepts of Zero-Trust Are Still Being Evaluated

Prasanth Prasad, the Director of Technology at Spire Solutions, says Zero-Trust has become a new market hype

How has the Zero Trust Network Architecture evolved since it was first coined in 2010?

Advertisement

Zero-trust has become a new market hype. There have been a lot of technological changes in solutions today to try and achieve Zero-Trust capability as this is proving to be a key strategy in achieving a robust cybersecurity architecture.

Do you believe that enterprise IT departments today require a new way of thinking because the castle itself no longer exists in isolation as it once did?

Organizations today need to define a zero-trust strategy and baseline identity processes and tools before embarking on deploying solutions. Gartner defines zero trust as a security paradigm that explicitly identifies users and devices, and grants them just the right amount of access so the business can operate with minimal friction while risks are reduced.

How can companies get started with zero trust?

Organizations must consider least privileged access, resource sensitivity, and the confidentiality of data secured within the zero-trust architecture while implementing zero trust. These ideas are not brand-new. In the past, numerous teams have attempted to implement least privileged access controls but ran into difficulties as they widened the scope and finer-grained the rules.

These problems do not exempt zero trust. To succeed with zero trust, businesses must plan, invest in people and resources, and refrain from viewing security as a one-

This article is from: