Intelligent CIO Middle East Issue 83 | Page 83

of VPNs , network firewalls or they could be cloudt cht lk

CLOUDFLARE EXPERT ON ZERO TRUST AND THE FUTURE CHALLENGES AND OPPORTUNITIES ORGANISATIONS CAN EXPECT

zAs organisations attempt to carry out broad network transformations , moving to a Zero Trust architecture is a critical initial step . Mohit Bijlani , Head of UK / IRE at Cloudflare , tells Intelligent CIO ’ s Mrigaya Dham about how Cloudflare ’ s approach differs from other vendors and the most significant risks it helps mitigate .

Zero Trust is a widely discussed of where actors are accessing applications or approach . How does Cloudflare think about Zero Trust ? this is a common fallacy . People think that Zero Trust Before discussing Zero Trust , we need to understand is a single product or piece of technology but that is how traditional IT security paradigms operate or have operated . With the right traditional IP security models several different security principles and technologies applied , what we recognise as the castle and moat with a Zero Trust network access , or zip DNA as it is concept , means the network perimeter is considered a relatively safe zone or the ‘ castle ’. Security controls were mainly applied to actors trying to gain access to resources and applications that resided within that network perimeter from the outside . In this case , those who were a part of the organisation within that network perimeter were trusted implicitly and given free rein along with access to almost everything .
In contrast , Zero Trust security architecture implies you should trust no one and nothing implicitly . Regardless resources from and agnostic of where those resources or applications reside . It is important to understand that
not the case . Instead , it is a framework that comprises
commonly referred to , being the driving principle . The market invariably uses these two interchangeably .
How does Cloudflare ’ s approach to providing ZT security differ from other vendors in this space ?
Firstly , a vendor landscape is typically two buckets – either vendors such as hardware appliance-based vendors , right point solution vendors , such as makers
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 83