MSP Success Magazine Special Edition: Lisa & Brian Johnson | Page 6

ZERO TRUST

How ThreatLocker Is Using “ Zero Trust ” To Change The Cybersecurity Game

M

SPs today are losing the battle . The size of the endpoint security market is about $ 9 billion a year . In 2021 , cybercrime and ransomware cost the world $ 6 trillion . In essence , it ’ s like cybercrime is the GDP of Japan and all measures of cybersecurity combined is the GDP of Somalia or Burundi .
When you have an entire industry that is outmatched while ransomware attacks are up 800 % and cybercriminals continue utilizing cryptocurrency that ’ s virtually undetectable , how do you flip the script and take back control of cybersecurity ?
According to Danny Jenkins , CEO and cofounder of ThreatLocker , it starts with “ zero trust ,” a network security model based on a strict identity verification process .
Danny says , “ In simple terms , zero trust means ‘ least privilege .’ Don ’ t give access where access isn ’ t required . Zero trust applies to different levels . At the application and file levels , you are only giving access to those who need access . At the network level , you ’ re thinking about what ports are open .”
DISPELLING THE MYTHS OF ZERO TRUST
MSPs and end-users who are hesitant to adopt a zero-trust model of cybersecurity often have a false perception of what it entails . They may think that the C-level executive who has always accessed an application will now be shut out entirely . That ’ s not the case . If someone in the organization routinely accesses an application or file , it makes perfect sense for them to still be able to access it .
“ When you roll out a cybersecurity solution like ThreatLocker , it learns what ’ s in your environment ,” says Danny . “ It will learn which applications and files are accessed and by whom . Then the MSP can either allow or deny access based on the findings .” Some also believe that the zerotrust philosophy is brand new and a far more aggressive approach to cybersecurity . That ’ s not entirely true .
Danny says , “ Zero trust is simply a framework . A target . Everyone already has some level of zero trust in their business . Do they have administration permissions ? Do they have a firewall that blocks inbound traffic ? Those are levels of zero trust .”
6 | MSPSUCCESS . COM