Intelligent CIO LATAM Issue 06 | Page 40

FEATURE : ZERO TRUST
Modern organizations are embracing ‘ digital ’ and while there are countless benefits to this , it does create challenges when it comes to security as the traditional network perimeter is disappearing . Peter Newton , Senior Director of Product Marketing , Fortinet , tells us how a Zero Trust access approach is helping IT leaders gain insight into who and what is on the network in order to improve their organizations ’ security posture .

The most secure network is one that has no connections . Of course , that idea is not only impractical , it defeats the purpose of a network . The reality is that no network is an island and as businesses become more digital , networks inevitably become more complicated and dispersed . Today ’ s networks now have many ‘ Edges ’, so it ’ s much harder than it used to be to create a single defensible boundary . In the face of these changes , the traditional network perimeter is dissolving and it ’ s far more difficult to tell who and what can be trusted .

To respond to increasing threats , best practices now stipulate a ‘ trust no one , trust nothing ’ attitude toward network access . Protecting the network with this Zero Trust access ( ZTA ) approach means that all users , all devices and all web applications from the cloud must be trusted , authenticated and have the correct amount of access privilege ( and no more .)

Focusing on three key areas with an effective Zero Trust access strategy

40 INTELLIGENTCIO LATAM www . intelligentcio . com