Intelligent CIO LATAM Issue 06 | Page 43

FEATURE : ZERO TRUST strategy is understanding what happens when devices leave the network . When they aren ’ t logged into the network , users may browse the Internet , interact with others on social media and receive personal emails . After being online , once they re-join the network these users can inadvertently expose their devices and company resources to threats they may have picked up , such as viruses and malware .
Controlling managed devices when they go off the network is challenging . Thanks to cloud services , people can disconnect their device from the network at one location and reconnect it at another . Or they might start working on one device and continue on another .
To contend with these challenges , endpoint security must be part of any ZTA solution . It should provide off-network hygiene control , including vulnerability scanning , web filtering and patching policies . It should also provide secure and flexible options for virtual private network ( VPN ) connectivity .
Trust no one and leverage an effective Zero Trust access strategy
The more people and devices that connect to a network , the less secure a traditional perimeter-based approach becomes . Every time a device or user is automatically trusted , it places the organization ’ s data , applications and intellectual property at risk . CISOs need to shift the fundamental paradigm of an open network built around inherent trust to a Zero Trust model with rigorous network access controls that span the distributed network .
By selecting integrated and automated tools , CISOs can help overcome the key challenges of Zero Trust access : knowing who and what is on the network , controlling their resource access and mitigating the risks of that access . p

BY SELECTING INTEGRATED AND

AUTOMATED TOOLS , CISOS CAN HELP OVERCOME

THE KEY CHALLENGES OF ZERO TRUST ACCESS .

www . intelligentcio . com INTELLIGENTCIO LATAM 43